Module-H-Special-Topic-on-Cybersecurity-for-upload
Module-H-Special-Topic-on-Cybersecurity-for-upload
SECURITY BY
DEPARTMENT OF BIOLOGICAL SCIENCES
LESSON OUTLINE
01 02 03
INTRODUCTION TO CATEGORIES OF TYPES OF CYBER
CYBERSECURITY CYBER CRIME CRIME
04 05 06
TYPES OF SECURITY ADVANTAGE OF SAFETY TIPS TO
TOOLS CYBERSECURITY CYBER CRIME
OVERVIEW
The growing dependence of people
on technology and the internet
has created a bigger venue for
cybercriminals to do their
crimes.
OVERVIEW
© ISACA
Source:
https://www.sangfor.com/blog/cybersecurity/jollibee-data-breach-philippines-affected-11-million-
customers#:~:text=In%20June%2C%20fast%20food%20giant,customers%20and%20its%20connected%20companies.
OUR REALITY TODAY
© ISACA
Source:
https://www.philstar.com/headlines/2024/01/16/2326110/another-data-leak-hits-philhealth
OUR REALITY TODAY
© ISACA
Source:
https://www.rappler.com/business/ucpb-probes-cyber-heist-september-2020/
https://www.reuters.com/article/technology/bangladesh-to-sue-manila-bank-over-81-million-cyber-heist-cenbank-governor-idUSKCN1PO19F/
OUR REALITY TODAY
Source:
© INTERNATIONAL
https://salinlahi.org/online-sexual-abuse-and-exploitation-of-children-increases-as-ph-poverty-worsens-salinlahi/ JUSTICE MISSION
OUR REALITY TODAY
Source:
© INTERNATIONAL
https://www.unicef.org/philippines/press-releases/online-bullying-remains-prevalent-philippines-other-countries JUSTICE MISSION
OUR REALITY TODAY
Source:
© INTERNATIONAL
https://www.philstar.com/headlines/2024/03/12/2340026/pnp-warns-public-rise-cyber-identity-theft-cases JUSTICE MISSION
OVERVIEW
Knowing how
cybercriminals think
and attack could
prevent you from
turning into another
victim.
Cybersecurity is as simple
as A B C:
Always Be Careful!
WHAT IS CYBERSECURITY?
✔Cybersecurity is the practice of
protecting computer systems,
networks, and programs from digital
attacks, damage, or unauthorized
access.
© IT GOVERNANCE
02
CATEGORIES OF
CYBER CRIME
CATEGORIES
COMPUTER AS THE COMPUTER AS THE
TARGET WEAPON
● Computer is used to ● Computer is used to
attack another commit real-world
computer. crime.
● E.g. hacking, viruses, ● E.g. credit card
worms, DoS attacks frauds
03
TYPES OF CYBER
CRIMES
HACKING
Hacking refers to the unauthorized access,
manipulation, or exploitation of computer
systems, networks, or data usually in a large
organization such as the government.
© SIMPLEARN.COM
PHISHING
Phishing is a digital version of fishing where
cybercriminals are attempting to lure people
into revealing sensitive information, such as
passwords or credit card numbers.
© FRONTIER BLOG
VHISHING
Vhishing is short for ‘voice phishing,’ which
involves defrauding people over the phone,
enticing them to divulge sensitive information.
© FRONTIER BLOG
VHISHING
Vhishing is short for ‘voice phishing,’ which
involves defrauding people over the phone,
enticing them to divulge sensitive information.
© FRONTIER BLOG
DENIAL OF SERVICE
A Denial of Service (DoS) attack is a digital
traffic jam that disrupts the normal
functioning of a computer system, network, or
website.
© NAMESHIELD
SPAM EMAIL
Spam emails are unsolicited and often
irrelevant messages sent in bulk to a large
number of recipients.
© GMASS
MALWARES
Malware, a.k.a malicious software, is a
broad term that encompasses various
types of harmful software designed to
disrupt, damage, or gain unauthorized
access to computer systems, usually for
financial gains.
© RAPPLER
04
TYPES OF
SECURITY
TOOLS
TYPES OF
SECURITY TOOLS
Firewalls Antivirus Software Virtual Private
Networks (VPNs)
It monitors and controls It detects, prevents,
incoming and outgoing
and removes malicious It encrypts your
network traffic,
software (malware) to internet connection,
deciding which data
keep your system enhancing privacy and
packets can enter or
security, especially
leave based on healthy. when you're using public
predetermined security
Wi-Fi.
rules.
© MAVERICK-AI
NOTABLE USES OF AI NOWADAYS
© WORLD YMCA
NOTABLE USES OF AI NOWADAYS
© INDIA TODAY
NOTABLE USES OF AI NOWADAYS
© EUROPEAN PARLIAMENT
NOTABLE USES OF AI NOWADAYS
© TURNKEY STAFFING
WHAT IS AI?
ARTIFICIAL INTELLIGENCE
© WEKA
CHALLENGES OF
ARTIFICIAL INTELLIGENCE
1. Ethical concerns
2. Bias in algorithms
3. Job displacement
4. Lack of transparency
5. Data privacy and security
6. Regulatory challenges
7. Explainability and interpretability
8. AI in warfare
THANKS!
What part of the topic did you
least understand? ☺