Professional Documents
Culture Documents
Developing An ICT Project
Developing An ICT Project
Developing An ICT Project
Empowerment Technologies
CREATING A CONCEPT PAPER
- Doable
- Significant to be made in realty
CREATING A CONCEPT PAPER
III. DESCRIPTION
– includes all the necessary information about
the project. In ICT, it involves the sites you
are going to produce and the purpose of each
and how they work in unison.
FIVE ELEMENTS OF A CONCEPT PAPER
Cybercrimes are illegal acts done through the use of the Internet. In 2012, here are the ten most common Internet
cybercrimes:
1. Phishing/Spoofing – The act of sending multiple emails to multiple users in hopes of having a number
of them clicking on the links or malware attached to the email. Most email services today have spam or bulk
folders that automatically put these suspicious emails to that folder. However, this is not 100% accurate that
some emails are not filtered and some other emails that are legitimate end up on the spam folder.
2. Blackmail/Extortion – the act of using the Internet to threaten or damage someone’s reputation to
extort money or anything else of value. This can be avoided if you are aware of what you should post on the
Internet. The victims of this act tend to have posted something “inappropriate” over the Internet even if they
put it at a secure location.
3. Accessing Stored Communications – or hacking; the act of obtaining unauthorized access to data
from a computer network. This is typically done to commercial and government sites to threaten its owner. In
late 2014, a group of hackers hacked Sony’s website because of the impending release of the controversial film
“The Interview”.
4. Sports Betting – the act of wagering on any sports event over the Internet. In some countries, gambling
(including sports betting) is illegal even if you are doing it over the Internet.
CYBERCRIMES
5. Non-Delivery of Merchandise – the act of devising a scheme wherein the culprit posts an item or
service for sale on the Internet and once the transactions have been done, does not really give an item or
service.
6. Electronic Harassment – the act of anonymously using the Internet to harass, abuse, threaten or annoy
another people. This is also an act of cyberbullying, however, because the culprit is anonymous, it is hard to
detect who is bullying you.
7. Child Pornography – the act of using the Internet to show child pornography. This act is highly
punishable by law.
9. Drug trafficking – the act of selling illegal substances using the Internet
10. Criminal Copyright Infringement – the act of piracy mainly for financial gain. In late 2014, the
number one pirate website, The PirateBay, was raided for the second time due to years of pirating movies,
music, games, books, and other software. These kinds of websites earn money through advertising.
C O M B AT T I N G C Y B E R C R I M E S
There are several ways the authorities can help solve or prevent cybercrimes. Here are some of them:
1. Network. Before hacker can get through the unauthorized files he or she is targeting the hacker has to get
through several measures like firewalls, secure connections, passwords, anti- malware, and data
encryption. Encryption is the process of converting raw data into code. However, these methods are not
100% secure and there will always be a way for a hacker to hack.
2. Investigation. URL tracking and logging are used by websites to track your unique IP addresses. This can
be used by investigators to trace hackers. In piracy, trackers are used to identifying the IP addresses
currently sharing pirated file.
3. Penalties. More and more laws are being created and implemented today. Penalties include both a fine
and imprisonment.