Download as pdf
Download as pdf
You are on page 1of 11
evar Daren LESSON 2 ONLINE SAFETY, SECURITY,-ET AND ETIQUETTE (PART::1) ONLINE SAFETY AND SECURITY — en What is cybercrime? Sources: + https://www.britannica.com/topic/cybercrime — ~ ——— ~ https dictionary convbrowsefeybererime CURRENT SSUES: CYBERCRIME IN THE PHILIPPINES SONA: Cybercrime Law, layong panagutan ang mga gumagawa ng krimen sa internet (2012) GMA News YouTube. Retrieved January 20, 2017, from cybercrime i there a need for the Philippines to have a law? Cybercrime Prevention Act of 2012 | RA10175 AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFORE AND FOR OTHER PURPOSES Cybercrime law is essential to upholding the protection of every individual, business, and government that can be a victim of these crimes. It ensures the safety of our information, money, — > and families. What crimes were punishable under the Cybercrime Prevention Act of 2012 (R.A. 10175)? + Child Pornography + Libel + Aiding or Abetting in the Commission of Cybercrime + Attempt in the Commission of Cybercrime. What crimes were punishable under the Cybercrime Cybersex- The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration. What crimes were punishable under the Cybercrime Prevention Act of 2012 (R.A. 10175)? Computer-Related Identity Theft - occurs when someone steals your personal information—such as your Social Security Number, bank account number, and credit card information. What crimes were punishable under the Cybercrime Prevention Act of 2012 (R.A. 10175)? Prevention Act of 2012 (R.A. 10175)? Cybersquatting - unauthorized registration and use of Internet domain names that are identical or similar to trademarks, service marks, company names, or personal names. The perpetrator registers and uses intemet domain names that are identical or similar to company names (e., GoOgle.com instead of Google.com), personal names, trademarks, product names, service marks, and so on, with malicious intent to profit from the actual brand/trademark owner in one way or another. What crimes were punishable under the Cybercrime Prevention Act of 2012 (R.A. 10175)? Unsolicited Commercial Communications - include voice mails or SMS made via telecommunications service for the purpose of informing about, soliciting or promoting commercial transaction bordering on product, service, or investment ‘A common scenario is yout mobile or office phone ringing for a few brief minutes from an unknown number. Upon answering, the caller hangs up to try and get you to return the call What issues were raised against the Cybercrime Prevention Act of 2012? Were those concerns justifiable? Why or why not? (a)Offenses against the confidentiality, integrity and availability of computer data and systems: (1) Illegal Access. - The access to the whole or any part of a computer system without right. (2) Illegal Interception. CURRENT ‘SSUES: CYBERCRIME IN THE PHILIPPINES news? Give a brief description of these laws? Aside from RA10175. RA 9995 | ANTI-VOYEURISM ACT | Anti-Photo and Video Voyeurism Act of 2009 It provides protection tothe victim who consents to the gexual act of any similar actly and the recording of it but rat tothe copying and reproduction of said material and holds the offender liable for vilating such provision. What cybercrime- related laws were mentioned in the given news? ea brief description of these laws? Aside from RA10175... RA 9262 | VAWCI| Anti-Violence Against Women and Their Children Act of 2004 State values the dignity of women and children and guarantees full respect for human rights. The State also recognizes the need to protect the family and its members particularly women and children, from violence and threats to their personal safety and security What cybercrime- related laws were mentioned in the given news? Give a brief description of these laws? Aside from RA10175... Article 353 of the Revised Penal Code/ LIBEL| Libelis defined as public and malicious imputation ofa crime, or of a vice or defect real or imaginary, or any act omission, condition status, or eicumstance tending fo cause the dishoner, cise. or contempt of 8 natural Ot juridical person, orto biacken the memory ofthe deed, Libel laws are classified as crimes against hone, which Seek to protect an individual aganst unjust attacks aganst the character and reputation of fis person. What cybercrimes were mentioned in the given news? Give a brief explanation of each crime. Computer-related Forgery - impersonation of legitimate individuals, authorities, agencies, and other entities online for Call center agent charged under cybercrime law .(2014) ABS-CBN News YouTube. Retrieved January 20, 2017, from lo (CYBERCRIME IN THE PHILIPPINES. = How Cyberctminals Use Nude Videos for (2015), ABS-CEN News, YouTube Retired Wet ace the punishments fF Wolating the Ant CBN News toc ‘Voyeurism Act” METIQUETTSE etiquette for the internet. It describes the ruies of conduct tor Sspertsu aral x woriz Crshad at tot idtias a lots taal i Perea eae aa Se Rn ag Nee ah One Lr Pea E rena SMC a ae Ser ort) Neca ee uae Mur ete area ae Rene Reine Perera ait a Rule 2: Be ethical PUR CR OM Per ean Sern Co Penis Youneed to rememberthat Metra Nes metic ns li) Sree CMS PSU a tet entry enc) eda aa Rule 3: Know where you are Cee err) See a Ce Mad Ce RS! EAST 1 ST Rey eee RN Ce eect mee rs Peers lan Bees eae Rule 4: Respect other people's time and data limits Raa ene ig) COCR MeN spendeadingyourposting Pea Ce et eeu eur Ena vae nt Rts Seng Renu rerenrtir tenis! Petes cure aa Bee mea) Ce eats Say Co} SN nC ee Pret RR RT) about and make sense eves EOS oe tt Rule 6: Share expert knowledge Peete ai PRS Tarn) ee eee tg Cee nema) Sauna EOS Se ean ua at Rule 7: Keep disagreement healthy PEC ates recur e Gener] eee eats Renee MA aC) pee Rn eRe he tsp ong Suter i Petree aaa Rule 8: Respect other people's privacy Berea Ra ord Coch ee a Peas er RT PoC ee RUA eR Rees Ta Rome ram) Carey Ce tet Td Pee aCe RL) te nttcy Perea a aa Rule 9: Don't abuse your power PCR Td OU ee Peo Pe ete aes Prenat PR eee al PSRs a Re ease] EOYs eat Rule 10: Be forgiving of other people's mistakes Pag aCe Peers ns Cuan Ty — Cee ema iT) block PRT CCT] Re Came eC Pre eat me te eae tey IN SCIENCE. Pre ere, ee aes Peer Rec Cr eee an Tamed Ee Ear) cd crc ENN) Cae CeCe) row a8 e) 5c ACU ter ect: Pew ae rt eet a a Cen ed CUS U Ly Cad stereotypes and to Pee eee eM Chee) Ce ec ed Pe ec td aero m et la Pec Re ear) Breet be RRM Cerca eet tera Pm eae ere ees er Retiree onic) Puree eet eee) erate re ts terminology Netiquette BS ae att rere gees er eer Mer PRM) peo Sa MSU uu Easy Cou participating online aft, eae i ee MC Td mee Sar Le rae ect ee tc Cera eke tar Rereen ene Mares Netiquette also involves CO Mc e cat od Ru Retinol octet] Pepe Deseret Cee see mee LESSON 2 ONLINE SAFETY, Sael Uae ET AND ETIQUETTPART 38). “DANGERS ON THE INTERNET”. Es usu eer Rees te cen eer een ty Pete eee a eos a Peete es Me om Ue eu cena Gr RON a ten ee eR Rete cota Poe PHARMING in Harder to identify Eosier to identify + Targets multiple people at Targets one person at atime atime Mali 0 inbox Malicious code installed computer Requires users to manually click a link to activate code Automatically redirect without requiting users to click a link Types of Spyware ei Adware Keyloggers oa | Mobile Spyware [=| Password Stealers Virus vs Worm Comparison How to detect a virus or a worm? Oe Ree ; Se (enous pases INCREASED POWER CONSUMPTION (OU GET OTHER TYPES OF MALWARE Difference Between Viruses, Worms, and Trojans (Table 2-2) Oe ace Aen ace 1) Thou shalt not use a computer to harm other people. Oe ee ee ees ee ema 3) Thou shalt not snoop around in other people's files OM ore en cgrc 5) Thou shalt not use a computer to bear false 6) Thou shalt not use or copy software for which you have not paid Diet eg es ce neg ee enero Puerta 9) Thou shalt think about the social consequences of the program you write, 10) Thou Bean ea ead

You might also like