The Cybercrime and Internet Threats
The Cybercrime and Internet Threats
The Cybercrime and Internet Threats
What is Cyber?
It is the Characteristics of the culture of computers, information, technology and virtual reality.
Cybercrime is defined as a crime in which a computer is the object of the crime (hacking,
phishing, spamming and child pornography) is used as a tool to commit an offense.
Cybercriminals may use computer technology to access personal information, business trade
secrets or use the internet for exploitative or malicious purposes.
Republic Act No. 10175 Cybercrime Prevention Act of 2012 is a law in the Philippines approved
on September 12,2012 which aims to address legal issues concerning online interactions and
internet.
Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting individual personal
information.
c. Computer Addiction
• Offline: generally used when speaking about excessive gaming behavior, which can be
practiced both offline and online.
• Online: Also known as “Internet Addiction”, gets more attention in general from
scientific research than offline computer addiction, mainly because most cases of
computer addiction are related to the excessive use of the Internet.
*Virtual Self -The persona you create about yourself virtually.
CRIMINAL ACTIVITIES
a. Hacking
• Unauthorized access of or interference with computer systems, servers, or other
information and communication systems
• Unauthorized access to corrupt, alter, steal, or destroy electronic data using computers or
other information and communication systems without the computer or system owner’s
knowledge and consent
• The introduction of computer viruses resulting in the corruption, alteration, theft, or loss
of such data
• Illegal Access
• Illegal Interception
• Data Interference
• System Interference
• Misuse of Devices
• Infection of IT Systems with Malware – if the act is committed against critical
infrastructure of the Philippines the, penalty is between 12-20 years reclusion temporal
• Six years up to twelve years of imprisonment also known as prison mayor.
g. Cyber Defamation
• Is an unprivileged false statement of fact which tends to harm the reputation of a person
or company.
• Penalty of 6-12 years of imprisonment or prison mayor.
• Find weaknesses (or pre-existing bugs) in your security settings and exploit them in order to
access your information.
• Install a Trojan horse, providing a back door for hackers to enter and search for your
information.
Malware
Malware is one of the more common ways to infiltrate or damage your computer.
Malicious software that infects your computer, such as computer viruses, worms,
Trojan horses, spyware, and adware.
Pharming
Pharming is a common type of online fraud.
A means to point you to a malicious and illegitimate website by redirecting the
legitimate URL. Even if the URL is entered correctly, it can still be redirected to a
fake website.
What it can do:
• Convince you that the site is real and legitimate by spoofing or looking almost identical to
the actual site down to the smallest details. You may enter your personal information and
unknowingly give it to someone with malicious intent.
Phishing
Phishing is used most often by cyber criminals because it's easy to execute and can
produce the results they're looking for with very little effort.
Fake emails, text messages and websites created to look like they're from authentic
companies. They're sent by criminals to steal personal and financial information
from you. This is also known as “spoofing”.
What it does:
• Trick you into giving them information by asking you to update, validate or confirm your
account. It is often presented in a manner than seems official and intimidating, to encourage
you to take action.
• Provides cyber criminals with your username and passwords so that they can access your
accounts (your online bank account, shopping accounts, etc.) and steal your credit card
numbers.
Ransomware
Ransomware is a type of malware that restricts access to your computer or your
files and displays a message that demands payment in order for the restriction to
be removed. The two most common means of infection appear to be phishing
emails that contain malicious attachments and website pop-up advertisements.
What it can do:
• There are two common types of ransomware:
• Lockscreen ransomware: displays an image that prevents you from accessing your computer
• Encryption ransomware: encrypts files on your system's hard drive and sometimes on shared
network drives, USB drives, external hard drives, and even some cloud storage drives,
preventing you from opening them
• Ransomware will display a notification stating that your computer or data have been locked
and demanding a payment be made for you to regain access. Sometimes the notification
states that authorities have detected illegal activity on your computer, and that the payment
is a fine to avoid prosecution.
What you can do:
• Do not pay the ransom. These threats are meant to scare and intimidate you, and they do not
come from a law enforcement agency. Even if you submit payment, there is no guarantee
that you will regain access to your system.
• If your computer has been infected (i.e. you are unable to access your computer or your files
have been encrypted), contact a reputable computer technician or specialist to find out
whether your computer can be repaired and your data retrieved.
• In order to lessen the impact of a ransomware infection, be sure to regularly back-up your
data with a removable external storage drive. It's possible that your files might be
irretrievable; having an up-to-date backup could be invaluable.
Spam
Spam is one of the more common methods of both sending information out and
collecting it from unsuspecting people.
The mass distribution of unsolicited messages, advertising or pornography to
addresses which can be easily found on the Internet through things like social
networking sites, company websites and personal blogs.
Trojan Horses
A Trojan horse may not be a term you're familiar with, but there's a good
chance you or someone you know has been affected by one.
A malicious program that is disguised as, or embedded within, legitimate
software. It is an executable file that will install itself and run
automatically once it's downloaded.
Viruses
Most people have heard of computer viruses, but not many know
exactly what they are or what they do. Malicious computer programs
that are often sent as an email attachment or a download with the
intent of infecting your computer, as well as the computers of
everyone in your contact list. Just visiting a site can start an automatic
download of a virus .
Wi-Fi Eavesdropping
WiFi eavesdropping is another method used by cyber criminals to capture
personal information.
Virtual “listening in” on information that's shared over an unsecure (not
encrypted) WiFi network.
What it can do:
• Potentially access your computer with the right equipment.
• Steal your personal information including logins and passwords.
Worms
A worm, unlike a virus, goes to work on its own without attaching itself to files or programs.
It lives in your computer memory, doesn't damage or alter the hard drive worms are a
common computer and the internet as a whole a company of the internet itself.
References
• http://www.mccc.edu/~virtcoll/Netiquette
• http://ecampus.matc.edu/student_support/pdfs/7-essential-rules-of-netiquette.pdf
https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-eng.aspx