Download as pdf or txt
Download as pdf or txt
You are on page 1of 45

LESSON 7

Cybercrimes,
Internet Threats
and Internet
Safety
OBJECTIVES

After successful completion of this module, the student can be


able to:

⮚Understand the concept of cybercrimes and differentiate them


from traditional crimes;
⮚Identify common types of cybercrimes, such as hacking,
phishing, identity theft, and online harassment;
⮚Explore various internet threats, including malware,
ransomware, online scams, etc.; and
⮚Learn about proactive measures to enhance internet safety.
What is Cyber?
Cyber – is used to denote
anything related to computer
systems, the internet, virtual
environments, or electronic
networks.
Common terms and
concepts that incorporate
the prefix "cyber" include:
Common terms and concepts that incorporate
the prefix "cyber" include:

1. Cybersecurity: The practice of


protecting computer systems,
networks, and data from
unauthorized access, attacks, or
damage.
Common terms and concepts that incorporate
the prefix "cyber" include:

2. Cybercrime: Criminal activities


that are carried out using
computers or the internet, such as
hacking, online fraud, and identity
theft.
Common terms and concepts that incorporate
the prefix "cyber" include:

3. Cyberattack: An intentional and


malicious action taken to
compromise or disrupt computer
systems, networks, or data.
Common terms and concepts that incorporate
the prefix "cyber" include:

4. Cyberspace: The virtual


environment where digital
communication, information
exchange, and online activities
take place.
Common terms and concepts that incorporate
the prefix "cyber" include:

5. Cyberbullying: The use of


electronic communication to
harass, intimidate, or threaten
individuals, often through social
media or messaging platforms.
Common terms and concepts that incorporate
the prefix "cyber" include:

6. Cyberwarfare: The use of digital


technology and tactics to conduct
military or espionage operations in
the online domain.
Common terms and concepts that incorporate
the prefix "cyber" include:

7. Cybersecurity Awareness:
Promoting knowledge and
practices related to protecting
personal information and digital
assets from cyber threats.
Common terms and concepts that incorporate
the prefix "cyber" include:

8. Cybercriminals: may use


computer technology to access
personal information, business
trade secrets or use the internet for
exploitative or malicious purposes..
Republic Act No. 10175
Cybercrime Prevention Act of
2012 is a law in the Philippines
approved on September 12,2012
which aims to address legal
issues concerning online
interactions and internet.
Republic Act No. 10173
Data Privacy Act of 2012 is
an act protecting individual
personal information.
COMMON FORMS OF CYBERCRIMES:

1. Phishing/Spoofing – the act of


sending multiple emails to multiple
users in hopes of having a number
of them clicking on the links or
malwares attached to the email.
COMMON FORMS OF CYBERCRIMES:

2. Blackmail/Extortion – the act of using


the Internet to threaten or damage
someone’s reputation to extort money or
anything else of value. This can be avoided
if you are aware of what you should post
on the Internet.
COMMON FORMS OF CYBERCRIMES:

3. Accessing Stored
Communications – or hacking;
the act of obtaining unauthorized
access to data from a computer
network.
COMMON FORMS OF CYBERCRIMES:

4. Sports Betting – the act of


wagering on any sports event over the
Internet. In some countries, gambling
(including sports betting) is illegal
even if you are doing it over the
Internet.
COMMON FORMS OF CYBERCRIMES:

5. Non-Delivery of Merchandise –
the act of devising a scheme wherein
a culprit posts an item or service for
sale over the Internet and once the
transactions have been done, does
not really give the item or service.
COMMON FORMS OF CYBERCRIMES:

6. Electronic Harassment – the


act of anonymously using the
Internet to harass, abuse,
threaten, or annoy other people.
COMMON FORMS OF CYBERCRIMES:

7. Child Pornography – the act of


using the Internet to show child
pornography. This act is highly
punishable by law.
COMMON FORMS OF CYBERCRIMES:

8. Prostitution – the act of


using the internet to engage
in prostitution.
COMMON FORMS OF CYBERCRIMES:

9. Drug Trafficking – the


act of selling illegal
substances using the
Internet.
COMMON FORMS OF CYBERCRIMES:
10. Criminal Copyright Infringement – the
act of piracy mainly for financial gain. In late
2014, the number one pirate website, The
Pirate Bay, was raided for the second time
due to years of pirating movies, music,
games, books, and other software. These
kinds of websites earn money through
advertising.
COMBATTING CYBERCRIMES
1. Network Security. Before a hacker can
get through the unauthorized files he or
she is targeting, the hacker has to get
through several security measures like
firewalls, secure connections, passwords,
anti-malwares, and data encryptions. The
Disadvantages of ICT 177.
COMBATTING CYBERCRIMES
2. Investigation. URL tracing and logging
are used by websites to track your unique
IP addresses. This can be used by
investigators to trace hackers. In piracy,
trackers are used to identify IP addresses
currently sharing a pirated file.
COMBATTING CYBERCRIMES

3. Penalties. More and more laws


are being created and
implemented today. Penalties
include both a fine and
imprisonment.
INTERNET THREATS

1. Malware – (stands for malicious


software) - is a set of instruction
that run on your computer and
make your system do something
than an attacker wants to.
a. Steal personal information
b. Delete files
c. Click fraud
d. Steal software serial numbers
e. Use your computer as relay
DIFFERENT KINDS OF MALWARE
a. Virus – program designed to replicate
itself and transfer from one computer to
another. A computer virus is a piece of
malicious computer code that attaches
itself to a software program, email or
computer file without your permission.
DIFFERENT KINDS OF MALWARE
b. Worm – a malicious program that
transfers from one computer to another
by any type of means. Often, it uses a
computer network to spread itself. For
example, the ILOVEYOU worm (Love
Bug Worm) created by a Filipino.
DIFFERENT KINDS OF MALWARE
c. Trojan – a malicious program that
is disguised as a useful program but
once downloaded or installed, leaves
your PC unprotected and allow
hackers to get your information.
DIFFERENT KINDS OF MALWARE
d. Spyware – a program than runs in
the background without you knowing it
(thus called “spy”). It has the ability to
monitor what you are currently doing
and typing through keylogging.
DIFFERENT KINDS OF MALWARE

e. Adware – a program
designed to send you
advertisements, mostly as
pop-ups
INTERNET THREATS

2. Spam – unwanted
email mostly from bots or
advertisers. It can be
used to send malware.
INTERNET THREATS
3. Phishing – its goal is to acquire sensitive
personal information like passwords and
credit card details. This is done by sending
you an email that will direct the user to visit a
website and be asked to update his/her
username, password, credit card, or personal
information.
Internet Safety – refers to the
online security or safety of people
and their information when using
the internet. The Internet is a
public place and it is up to you to
protect yourself.
TIPS TO STAY SAFE ONLINE

1. Be mindful of what you share online and


what site you share it to.
2. Do not just accept terms and conditions;
read it.
3. Check out the privacy policy page of a
website to learn how the website handles
the information you share.
TIPS TO STAY SAFE ONLINE

4. Know the security features of the social


networking site you use. By keeping your
profile private, search engines will not be
able to scan your profile.
5. Do not share your password with
anyone.
TIPS TO STAY SAFE ONLINE

6. Avoid logging in to public


networks/Wi-Fi. Browsing in “incognito
(or private) mode”, a feature of the
browser, will not protect you from
hackers.
7. Do not talk to strangers whether
online or face-to-face.
TIPS TO STAY SAFE ONLINE

8. Never post anything about a future


vacation. It is similar to posting, “Rob
my house at this date.”
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
TIPS TO STAY SAFE ONLINE

11. Install and update an antivirus


software on your computer. Use only
one anti-virus software to avoid conflict.
12. If you have a Wi-Fi at home, make it
a private network by adding a password.
TIPS TO STAY SAFE ONLINE

13. Avoid downloading


anything from untrusted
websites.
14. Buy the software; do not
use pirated ones.
TIPS TO STAY SAFE ONLINE

15. Do not reply or click links


from suspicious emails.

You might also like