evar Daren
LESSON 2
ONLINE SAFETY, SECURITY,-ET
AND ETIQUETTE (PART::1)
ONLINE SAFETY AND SECURITY
—
en
What is cybercrime?
Sources:
+ https://www.britannica.com/topic/cybercrime
— ~
———
~ https dictionary convbrowsefeybererime
CURRENT SSUES:
CYBERCRIME IN THE PHILIPPINES
SONA: Cybercrime Law, layong panagutan ang
mga gumagawa ng krimen sa internet
(2012) GMA News
YouTube. Retrieved January 20, 2017, from
cybercrimei there a need for the Philippines to have a
law?
Cybercrime Prevention Act of 2012 | RA10175
AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE
PREVENTION, INVESTIGATION, SUPPRESSION AND THE
IMPOSITION OF PENALTIES THEREFORE AND FOR OTHER
PURPOSES
Cybercrime law is essential to upholding the protection of every
individual, business, and government that can be a victim of
these crimes. It ensures the safety of our information, money,
— >
and families.
What crimes were punishable under the Cybercrime
Prevention Act of 2012 (R.A. 10175)?
+ Child Pornography
+ Libel
+ Aiding or Abetting in the Commission of Cybercrime
+ Attempt in the Commission of Cybercrime.
What crimes were punishable under the Cybercrime
Cybersex- The willful engagement, maintenance, control, or
operation, directly or indirectly, of any lascivious exhibition of
sexual organs or sexual activity, with the aid of a computer
system, for favor or consideration.
What crimes were punishable under the Cybercrime
Prevention Act of 2012 (R.A. 10175)?
Computer-Related Identity Theft - occurs when someone
steals your personal information—such as your Social
Security Number, bank account number, and credit card
information.
What crimes were punishable under the Cybercrime
Prevention Act of 2012 (R.A. 10175)?Prevention Act of 2012 (R.A. 10175)?
Cybersquatting - unauthorized registration and use of
Internet domain names that are identical or similar to
trademarks, service marks, company names, or personal
names.
The perpetrator registers and uses intemet domain names that are identical or
similar to company names (e., GoOgle.com instead of Google.com), personal
names, trademarks, product names, service marks, and so on, with malicious
intent to profit from the actual brand/trademark owner in one way or another.
What crimes were punishable under the Cybercrime
Prevention Act of 2012 (R.A. 10175)?
Unsolicited Commercial Communications - include voice
mails or SMS made via telecommunications service for the purpose
of informing about, soliciting or promoting commercial transaction
bordering on product, service, or investment
‘A common scenario is yout mobile or office phone ringing for a few brief
minutes from an unknown number. Upon answering, the caller hangs up to try
and get you to return the call
What issues were raised against the Cybercrime
Prevention Act of 2012? Were those concerns justifiable?
Why or why not?
(a)Offenses against the confidentiality, integrity and
availability of computer data and systems:
(1) Illegal Access. - The access to the whole or any part of a
computer system without right.
(2) Illegal Interception.
CURRENT ‘SSUES:
CYBERCRIME IN THE PHILIPPINESnews? Give a brief description of these laws? Aside from
RA10175.
RA 9995 | ANTI-VOYEURISM ACT |
Anti-Photo and Video Voyeurism Act of 2009
It provides protection tothe victim who consents to the gexual act of any similar actly and the recording of it but
rat tothe copying and reproduction of said material and holds the offender liable for vilating such provision.
What cybercrime- related laws were mentioned in the given
news? ea brief description of these laws? Aside from
RA10175...
RA 9262 | VAWCI|
Anti-Violence Against Women and Their Children Act of 2004
State values the dignity of women and children and guarantees full respect for human rights. The State also
recognizes the need to protect the family and its members particularly women and children, from violence and
threats to their personal safety and security
What cybercrime- related laws were mentioned in the given
news? Give a brief description of these laws? Aside from
RA10175...
Article 353 of the Revised Penal Code/ LIBEL|
Libelis defined as public and malicious imputation ofa crime, or of a vice or defect real or imaginary, or any act
omission, condition status, or eicumstance tending fo cause the dishoner, cise. or contempt of 8 natural
Ot juridical person, orto biacken the memory ofthe deed, Libel laws are classified as crimes against hone, which
Seek to protect an individual aganst unjust attacks aganst the character and reputation of fis person.
What cybercrimes were mentioned in the given news? Give a
brief explanation of each crime.
Computer-related Forgery - impersonation of legitimate
individuals, authorities, agencies, and other entities online for
Call center agent charged under cybercrime law
.(2014) ABS-CBN News
YouTube. Retrieved January 20, 2017, from
lo
(CYBERCRIME IN THE PHILIPPINES.= How Cyberctminals Use Nude Videos for
(2015), ABS-CEN News, YouTube Retired
Wet ace the punishments fF Wolating the Ant CBN News toc
‘Voyeurism Act”
METIQUETTSE
etiquette for the internet. It
describes the ruies of conduct tor
Sspertsu aral x woriz
Crshad at tot idtias a lots taal i
Perea eae aa
Se Rn ag
Nee ah One Lr
Pea E rena
SMC a ae
Ser ort)
Neca
ee uae Mur
ete area ae
Rene Reine
Perera ait a
Rule 2: Be ethical
PUR CR OM
Per ean Sern Co
Penis
Youneed to rememberthat
Metra Nes metic ns li)
Sree CMS
PSU a tet entry
enc)
eda aa
Rule 3: Know where you are
Cee err)
See a Ce Mad
Ce RS! EAST 1 ST
Rey
eee RN
Ce eect mee rs
Peers lanBees eae
Rule 4: Respect other people's time
and data limits
Raa ene ig)
COCR MeN
spendeadingyourposting
Pea
Ce et eeu eur
Ena vae nt Rts
Seng
Renu
rerenrtir tenis!
Petes cure aa
Bee mea)
Ce
eats Say Co}
SN nC ee
Pret
RR RT)
about and make sense
eves
EOS oe tt
Rule 6: Share expert knowledge
Peete ai
PRS Tarn)
ee eee tg
Cee nema)
Sauna
EOS
Se ean ua at
Rule 7: Keep disagreement healthy
PEC ates
recur e Gener]
eee eats
Renee MA aC)
pee Rn eRe he
tsp ong
Suter iPetree aaa
Rule 8: Respect other people's privacy
Berea Ra ord
Coch ee a
Peas
er RT
PoC ee RUA eR Rees
Ta Rome ram)
Carey
Ce tet Td
Pee aCe RL)
te nttcy
Perea a aa
Rule 9: Don't abuse your power
PCR Td
OU ee Peo
Pe ete aes
Prenat
PR eee al
PSRs a
Re ease]
EOYs eat
Rule 10: Be forgiving of other people's
mistakes
Pag aCe
Peers ns
Cuan Ty —
Cee ema iT)
block
PRT CCT]
Re Came eC
Pre eat me te
eae tey
IN SCIENCE.
Pre ere,
ee aes
Peer Rec Cr
eee an
Tamed
Ee Ear)
cd
crc
ENN)
Cae
CeCe)
rowa8 e) 5c
ACU ter ect:
Pew ae rt eet
a a Cen ed
CUS U Ly Cad
stereotypes and to
Pee
eee eM Chee)
Ce ec ed
Pe ec td
aero m et la
Pec Re ear)
Breet
be
RRM Cerca
eet tera
Pm eae
ere ees
er Retiree onic)
Puree eet eee)
erate re ts
terminology Netiquette
BS ae att
rere gees
er eer Mer
PRM)
peo
Sa
MSU uu Easy Cou
participating online aft,
eae i
ee MC Td
mee Sar Le
rae ect ee tc
Cera eke tar
Rereen ene Mares
Netiquette also involves
CO Mc e cat od
Ru Retinol
octet]
Pepe
Deseret
Cee see mee
LESSON 2
ONLINE SAFETY, Sael Uae ET
AND ETIQUETTPART 38).
“DANGERS ON THE INTERNET”.Es usu
eer Rees te cen eer een ty
Pete eee a eos a
Peete es Me om Ue eu
cena Gr
RON a ten ee eR Rete cota
Poe
PHARMING in
Harder to identify Eosier to identify
+ Targets multiple people at Targets one person at atime
atime
Mali 0 inbox
Malicious code installed
computer Requires users to manually
click a link to activate code
Automatically redirect
without requiting users to
click a link
Types of Spyware
ei
Adware
Keyloggers
oa | Mobile Spyware
[=| Password StealersVirus vs Worm Comparison
How to detect a virus
or a worm?
Oe Ree
; Se
(enous pases
INCREASED POWER CONSUMPTION(OU GET OTHER TYPES OF MALWARE
Difference Between Viruses, Worms,
and Trojans (Table 2-2)
Oe ace Aen ace
1) Thou shalt not use a computer to harm other people.
Oe ee ee ees ee ema
3) Thou shalt not snoop around in other people's files
OM ore en cgrc
5) Thou shalt not use a computer to bear false
6) Thou shalt not use or copy software for which you have not paid
Diet eg es ce neg ee enero
Puerta
9) Thou shalt think about the social consequences of the program you write, 10) Thou
Bean ea ead