Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 21

THE DISADVANTAGES

OF ICT
AT THE END OF THIS
LESSON, STUDENTS
SHOULD BE ABLE TO :
• 1. Understand the several
problems ICT has created in their
generation; and
• 2. write a reflective essay on how
ICT can change the world for
better or for worse
CYBERCRIMES

• Are illegal acts done through


the use of the internet.
10 MOST COMMON INTERNET CRIME
ACCORDING TO STEPHENE NALE
(COMPLEX.COM)

• 1. Phishing /Spoofing
• 2. Blackmail/Extortion
• 3. Accessing Stored Communications
• 4. Sports Betting
• 5. Non-Delivery
10 MOST COMMON INTERNET CRIME
ACCORDING TO STEPHENE NALE
(COMPLEX.COM)

• 6. Electronic Harassment
• 7. Child Pornography
• 8. Prostitution
• 9. Drug Trafficking
• 10. Criminal Copyright Infringement
PHISHING/SPOOFING

• The act of sending multiple emails


to multiple users in hopes of having
a number of them clicking on the
links or malware attached to the
email.
BLACKMAIL/EXTORTION

The act of using the internet to


threaten or damage someone’s
reputation to extort money or
anything else of value.
ACCESSING STORED
COMMUNICATIONS
• Or hacking ; the act of obtaining
unauthorized access to data from
a computer network . This is
typically done to commercial
and government sites to threaten
its owner.
SPORTS BETTING

• The act of wagering on any


sports event over the internet.
In some countries, gambling
(including sports betting) is
illegal even if you are doing it
over the internet.
NON-DELIVERY OF
MERCHANDISE
• The act of devising a scheme
wherein a culprit posts an item or
service for sale on the internet
and once the transactions have
been done, does not really give
the item or service.
ELECTRONIC
HARASSMENT
• The act of anonymously using the
internet to harass, abuse, threaten, or
annoy other people. This is also an act
of cyber bullying, however, because
of the culprit is anonymous, it is hard
to detect who is bullying you.
CHILD PORNOGRAPHY

•The act of using the internet


to show child pornography.
The act is highly punishable
by law.
PROSTITUTION

•The act of using the


internet to engage
in prostitution.
DRUG TRAFFICKING

•The act of selling illegal


substances using the
internet.
CRIMINAL COPYRIGHT
INFRINGEMENT
• The act of piracy mainly for financial
gain. In late 2014, the number one
pirate website, ThePirateBay was
raided for the second time due to
years of pirating movies, music,
games, books and other software.
These kind of websites earn money
through advertising.
COMBATTING
CYBERCRIMES
•1. NETWORK SECURITY
•2. INVESTIGATION
•3. PENALTIES
NETWORK SECURITY
• Before a hacker can get through the
unauthorized files he or she is targeting, the
hacker has to get through several security
measures like firewalls, secure connections,
passwords, anti-malwares, and data
encryptions.
• Encription is the process of converting raw
data into code.
INVESTIGATION

• URL tracking and logging are used by


websites to track your unique IP
addresses. This can be used by
investigators to trace hackers. In
piracy, trackers are used to identify ip
addresses currently sharing a pirated
file.
PENALTIES

• More and more laws are


being created and
implemented today. Penalties
include both a fine and
imprisonment.
KEY TERMS
• PHISHING – also referred as spoofing; an
act of spamming emails
• SPAM-unwanted emails
• BLACKMAIL – act of asking something in
return of not showing something that could
damage someone’s reputation.
• CYBERBULLYING- an act of harassment
using electronic means
KEY TERMS

• COPYRIGHT INFRINGEMENT –
an act of piracy mainly for
financial gain
• ENCRYPTION- the process of
converting raw data into
code.

You might also like