Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 22

ICT

TERMINOLOGIES
Cybercrime
A crime committed or assisted through
the use of Internet
Republic Act No.
10175
The Cybercrime Prevention Act of 2012
CYBERCRIME PREVENTION ACT OF 2012,
WAS SIGNED INTO LAW BY PRESIDENT
AQUINO ON SEPT. 12, 2012. ITS
ORIGINAL GOAL WAS TO
PENALIZE ACTS LIKE CYBERSEX, CHILD
PORNOGRAPHY, IDENTITY THEFT AND
UNSOLICITED ELECTRONIC
COMMUNICATION IN THE COUNTRY.
Top 5 Cyber Crimes
Phishing

is a practice of a cybercriminal or hacker attempting to obtain sensitive or


personal information from a computer user
Like password and credit card details
dentity Theft

fraudulent acquisition and use of a person's private identifying


information, usually for financial gain.
Online
Harassment

Republic Act 10627


Cyberbullying

aims to protect children enrolled in kindergarten, elementary,


and secondary schools and learning centers (collectively,
“Schools”) from being bullied
Cyberstalking

the repeated use of electronic communications to harass or


frighten someone, for example by sending threatening emails.
Invasion of
Privacy

Republic Act 10173

an act protecting individual personal information in information and


communications systems in the government and the private sector.
PRIVACY POLICY
Tells the user how the website will handle its data
Pharming
A more complicated way of Phishing. A cyberattack intended to redirect a
website's traffic to another, fake site. Pharming can be conducted either by
changing the hosts file on a victim's computer or by exploitation of a
vulnerability in DNS (Domain Name Service) server software.
Copyright
refers to the legal right of the owner of
intellectual property. Right to copy. This means
that the original creators of products and anyone
they give authorization to are the only ones with
the exclusive right to reproduce the work.
Fair use
Fair use is a doctrine in the law that permits
limited use of copyrighted material without
having to first acquire permission from the
copyright holder.
COPYRIGHT VS. FAIR USE
Copyright Infringement is the offense against the creator of the material,
while “Fair Use” are the guidelines that help enable individuals to use
copyrighted materials for academic and entertainment purposes.
MALWARES
Malicious software, typically consists of code developed by
cyberattackers, designed to cause extensive damage to data and
systems or to gain unauthorized access to a network.

- Fake Windows Updates


- Clop Ransomware
VIRUS
a type of computer program that, when executed, replicates itself by
modifying other computer programs and inserting its own code.

- ILOVEYOU
worm
It often uses a computer network to spread itself, a
malicious program relying on security failures on the
target computer to access it. It will use this machine
as a host to scan and infect other computers.
Trojan
type of malware that is often disguised
as legitimate software. Trojans can be
employed by cyber-thieves and
hackers trying to gain information
SPYWARE
unwanted software that infiltrates your computing device, stealing
your internet usage data and sensitive information
classified as a type of malware

designed to gain access to or damage your computer, often


without your knowledge.
ADWARE
Program designed to send you
advertisements, mostly pop-ups
SPAM
Unwanted email mostly form bots or
advertisers

You might also like