Download as pdf or txt
Download as pdf or txt
You are on page 1of 62

IT100 – Living in the IT ERA

CYBERCRIME
ALAA
LEARNING OBJECTIVES:
At the end of this lesson, the students should be able to:
Differentiate online security and safety
Identify the different Internet Treats
Familiar with the Republic Act No. 10175
Know the common forms of cybercrimes and criminal
activities.
Understand some tips to avoid cybercrime.

ALAA
THE INTERNET = A WORLD OF
OPPORTUNITIES
A myriad of information is at your
fingertips
➢ A way to communicate with
colleagues, friends, and family
➢ Access to information and
entertainment
➢ A means to learn, meet people
and explore

ALAA
THE INTERNET = A WORLD OF
OPPORTUNITIES

ALAA
THE INTERNET = A WORLD OF
OPPORTUNITIES
A myriad of information is at your
fingertips
➢ A way to communicate with
colleagues, friends, and family
➢ Access to information and
entertainment
➢ A means to learn, meet people
and explore

ALAA
THE INTERNET = A WORLD OF
OPPORTUNITIES

ALAA
ONLINE SECURITY vs ONLINE SAFETY
➢ SECURITY – We must secure our
computers with technology in the
same way that we secure the
doors to our homes
➢ SAFETY – We must act in ways
that help protect us against the
risks that come with Internet use.
ALAA
HACKING
• Hacking is the gaining of access to a computer and
viewing, copying, or creating data without the
intention of destroying data or maliciously harming
the computer.
• Hacking is a broad term used to describe many
complex activities wherein the end goal is typically to
obtain access to a computer system’s servers,
database(s), or stored files. This access
may be any combination or desired or
undesired, and legal or illegal.
ALAA
HACKER A person engaged in hacking
• A person who gains authorized/unauthorized access to a
computer WITHOUT the intention of causing damage.
• In the computer security context, a hacker is someone who
seeks and exploits weaknesses in a computer system or
computer network. Hackers may be motivated by a
multitude or reasons, such as profit, protest, challenge,
enjoyment, or to evaluate those weaknesses to assist in
removing them. The subculture that has evolved around
ALAA
hackers is often referred to as the computer underground.
WHY DO HACKERS HACK?
➢ Just for fun.
➢ Show off.
➢ Hack other systems secretly
➢ Steal many people their thought or important
information
➢ Destroy enemy’s computer network during the war.

ALAA
INTERNET THREATS
MALWARE
➢ malicious software
➢ A software used or created to disrupt computer
operation, gather sensitive information or gain access
to private computer systems.
➢ It can appear in the form of code, scripts, active
content, and other software.
➢ Is a general term used to refer to a variety of forms of
hostile, intrusive, or annoying software. ALAA
INTERNET THREATS
➢ What it is good for
MALWARE

➢ Steal personal information


➢ Delete files
➢ Click fraud
➢ Steal software serial numbers
➢ Use your computer as relay

ALAA
INTERNET THREATS
➢ Types of Malware
MALWARE
➢ Virus
➢ worms ➢ Spam
➢ Trojan horses ➢ Phishing
➢ spyware ➢ Zombie
➢ adware ➢ Ransomware

➢ It can take the form of executable code, scripts, active


content, and other software. ALAA
Malware
1. VIRUS
➢ A computer virus is a malware that; when executed, replicates by
reproducing itself or infecting other programs by modifying them.

➢ The term computer virus was a misnomer until it was coined by Fred
Cohen in 1985. ALAA
Malware
2. WORM
➢ A computer worm is a
standalone malware
computer.
➢ program that replicates
itself in order to spread
to other computers.
ALAA
Malware
3. TROJAN
➢ a malicious program that is
disguised as useful program but
once installed, leave your PC
unprotected and allows hackers to
get your information.

ALAA
Malware
4. SPYWARE
➢ a program that runs in the background without you
knowing it. It has ability to monitor what are you
currently doing and typing through keylogging.
➢ Keyloggers – used to record the keystroke done by
the users

ALAA
Malware
5. ADWARE
➢ a program
designed to send
advertisement,
mostly as pop-
ups.

ALAA
Malware
6. SPAM
➢ Unsolicited bulk e-mail
(UBE)
➢ unwanted emails
mostly from bots or
advertisers. It can be
used to send malware.
ALAA
Malware
7. PHISHING
➢ Defined as
software or a
program used by
an attacker to
obtain personal
information.

ALAA
Malware
8. ZOMBIE
➢ Zombie programs take
control of your computer
and use it and its internet
connection to attack other
computers or networks or
to perform other criminal
activities.
ALAA
Malware
9. RANSOMWARE
➢ Ransomware is a form of
malware that essentially
holds a computer system
captive while demanding
a ransom.

ALAA
HOW MALWARE SPREADS
➢ Malware is a program that must be triggered or
somehow executed before it can infect your
computer system and spread to others.
➢ Examples of how malware is distributed:
➢ Social network
➢ Pirate software
➢ Removable media
➢ Email
➢ Websites

ALAA
STEP TO HELP PROTECT YOUR COMPUTER
1. Turn on Windows Internet firewall
2. Use Automatic Update to keep
Software Up-to-date
3. Install and maintain antivirus
software.
4. Install and maintain antispyware
software
ALAA
“The greatest crimes do not arise
from a want of feeling for others
but from an over-sensibility for
ourselves and an over-indulgence in
our desires”

ALAA
REPUBLIC ACT NO. 10175
CYBERCRIME PREVENTION ACT OF 2012

• Is a law in the Philippines


approved on September
12, 2012 which aims to
address legal issues
concerning online
interaction and internet.

ALAA
CYBER
• Refers to a computer or a
computer network, the
electronic medium in which
online communication
takes place.

ALAA
CYBERCRIME
• A term used to broadly describe
criminal activity in which computers
or computer networks are tools, a
target, or a place of criminal activity
and includes everything from
electronic cracking to denial of
service attacks. It is also used to
include traditional crimes in which
computers or networks are used to
enable illicit activity. ALAA
CYBERCRIMINALS
• May use computer technology
to access personal
information, and business
trade secrets, or use the
internet for exploitative or
malicious purposes.

ALAA
CYBERSECURITY
• Refers to the collection of
tools, policies, risk
management approaches,
actions, training, best
practices, assurance, and
technologies that can be used
to protect the cyber
environment or organization
and user’s assets.

ALAA
WHAT ARE CYBERCRIME OFFENSES?
1. Illegal Access
2. Illegal Interception
3. Data Interference
4. System Interference
5. Misuse of Device
6. Cybersquatting

ALAA
CYBERCRIME OFFENSES?
1. ILLEGAL ACCESS
➢ the access to the whole or any part
of a computer system without the
right to do so.

ALAA
CYBERCRIME OFFENSES?
2. ILLEGAL INTERCEPTION
➢ the interception made by technical means, and
without right, or any public transmission of computer
data to, form, or within a computer system including
electromagnetic emissions from a computer system
carrying such computer data.
➢ Example:
“man-in-the-middle attack”
ALAA
2. ILLEGAL INTERCEPTION

ALAA
CYBERCRIME OFFENSES?
3. DATA INTERFERENCE
➢ the international or reckless
alteration damaging, deletion or
deterioration of computer data,
electronic document, or
electronic data message, without
right, including the introduction
or transmission of viruses.
ALAA
CYBERCRIME OFFENSES?
4. SYSTEM INTERFERENCE
➢ The intentional alteration or reckless
hindering or interference with the
functioning of a computer or computer
network by inputting, transmitting,
damaging, deleting, deteriorating,
altering or suppressing computer data or
program, electronic document, or
electronic data message, without right
or authority, including the introduction
or transmission of viruses.
ALAA
CYBERCRIME OFFENSES?
5. MISUSE OF DEVICES
➢ Intentional and without right, production,
sale, procurement for use, or distribution
of:
a. Access devices including computer
programs
b. Computer passwords, codes, or other
access data
For the purpose of committing a
cybercrime
ALAA
CYBERCRIME OFFENSES?
6. CYBERSQUATTING
➢ The acquisition of a domain
name over the internet in
bad faith to profit, mislead,
destroy reputation, and
deprive others from
registering the same.

ALAA
WHAT ARE COMPUTER – RELATED OFFENSES?
1. Computer-Related Forgery
2. Computer–Related Fraud
3. Computer-Related Identity Theft

ALAA
COMPUTER – RELATED OFFENSES
1. COMPUTER-RELATED FORGERY
➢ The input, alteration, or deletion of
any computer data without right
resulting in inauthentic data with the
intent that it be considered or acted
upon for legal purposes as if it were
authentic; may require an intent to
defraud.
➢ Example: Counterfeit checks,
invoices, and stationery can be
produced using a scanner, color
printer, and graphics software
ALAA
COMPUTER – RELATED OFFENSES
2. COMPUTER-RELATED FRAUD
➢ The unauthorized input,
alteration, or deletion of
computer data or program or
interference in the functioning of
a computer system, causing
damage thereby with fraudulent
intent.
➢ Example: Email requesting
money in return for small
deposits.
ALAA
COMPUTER – RELATED OFFENSES
3. COMPUTER-RELATED IDENTITY THEFT
➢ The intentional acquisition,
use, misuse, transfer,
possession, alteration, or
deletion of identifying
information belonging to
another, whether natural or
juridical, without right.
ALAA
WHAT ARE CONTENT-RELATED OFFENSES
1. Cybersex
2. Child Pornography
3. Unsolicited Commercial Communications
4. Libel

ALAA
CONTENT – RELATED OFFENSES
1. CYBERSEX
➢ The willful engagement,
maintenance, control, or
operation, directly or
indirectly, of any lascivious
exhibition of sexual organs
or sexual activity, with the
aid of a computer system,
for favor or consideration.
ALAA
CONTENT – RELATED OFFENSES
2. CHILD PORNOGRAPHY
➢ The unlawful or prohibited
acts defined and punishable
by Republic Act No. 9775 or
the Anti-Child Pornography
Act of 2009, committed
through a computer system.

ALAA
CONTENT – RELATED OFFENSES
3. UNSOLICITED COMMERCIAL COMMUNICATIONS
➢ Illegal transmission of
commercial electronic
communication with
the use of a computer
system that seeks to
advertise, sell, or offer
for sale products and
services.
ALAA
CONTENT – RELATED OFFENSES
4. LIBEL
➢ The unlawful or prohibited
acts of libel as defined in
Article 355 of the Revised
Penal Code, as amended,
committed through a
computer system or any
other similar means that
may be devised in the
future.
ALAA
COMMON FORMS OF CYBERCRIMES

ALAA
COMMON FORMS OF CYBERCRIMES

ALAA
COMMON FORMS OF CYBERCRIMES

ALAA
CRIMINAL ACTIVITIES
ELECTRONIC THEFT

ALAA
CRIMINAL ACTIVITIES
CYBERBULLYING

ALAA
CRIMINAL ACTIVITIES
CYBER DEFAMATION

ALAA
CRIMINAL ACTIVITIES
CYBER DEFAMATION

ALAA
AGENCIES THAT ARE TASKED TO
ENFORCE AND IMPLEMENT THE LAW:
• National Bureau of Investigation
(NBI)
• Philippine National Police (PNP)
• Department of Justice (DOJ)

ALAA
TIPS TO AVOID CYBERCRIME
1. Always change your password in any social media
networking site.

ALAA
TIPS TO AVOID CYBERCRIME
2. Do not share important files publicly.

ALAA
TIPS TO AVOID CYBERCRIME
3. Check carefully emails sent to you that ask for
validation.

ALAA
TIPS TO AVOID CYBERCRIME
4. Do not simply click links that are suspicious to you

ALAA
TIPS TO AVOID CYBERCRIME
5. Always clear CACHE after you make any online
transaction.

ALAA
REFERENCE:
❑ Armaexen (2017) - Cybercrime – https://www.slideshare.net/armaexen/republic-
act-10175-cyber-crime-prevention-act-of-2012
❑ Cybercrime Prevention Act of 2012 (RA 10175) -
https://prezi.com/2wsaryva0dik/cybercrime-prevention-act-of-2012-ra-10175/
❑ Armaexen (2017) – Republic Act 10175 – Cyber Crime Prevention Act of 2012 -
https://www.slideshare.net/armaexen/republic-act-10175-cyber-crime-prevention-
act-of-2012
❑ Official Gazette (2012). Republic Act No. 10175 -
https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/
❑ Cyber Crimes - https://www.oas.org/juridico/spanish/cyber/cyb10_slide.pdf
❑ Cyber Crimes - https://www.oas.org/juridico/spanish/cyber/cyb9_handout.pdf

ALAA
- Be Creative: Make a poster with a size of
8” x 11” (short band paper) regarding
internet online safety.

ALAA

You might also like