04 (The Netiquette and The Computer Ethics)
04 (The Netiquette and The Computer Ethics)
19
20
What is Cyber?
▸ It is the Characteristics of the culture of
computers, information, technology and
virtual reality.
▸ Relating to, or involving computers or
computer network .
21
Cybercrime
▸ is defined as a crime in which a computer is
the object of the crime
▸ is used as a tool to commit an offense.
22
Cybercriminals
▸ may use computer technology to access
personal information, business trade secrets
or use the internet for exploitative or
malicious purposes.
23
Laws
• Republic Act No. 10175 Cybercrime
Prevention Act of 2012 is a law in the
Philippines approved on September 12,2012
which aims to address legal issues concerning
online interactions and internet.
• Republic Act No. 10173 Data Privacy Act of
2012 is an act protecting individual personal
information.
24
Common Forms of
Cybercrimes
▸ Copyright
The exclusive legal right, given to an originator or an
assignee to print, publish, perform, film, or record literary,
artistic, or musical material, and to authorize others to do
the same.
• Copyright infringement is the violation, piracy or theft of a
copyright holder's exclusive rights through the unauthorized use of
a copyrighted material or work.
▸ Plagiarism
An act or instance of using or closely imitating the
language and thoughts of another author without
25
Common Forms of
Cybercrimes
▸ Computer Addiction
Offline:
generally used when speaking about excessive gaming
behavior, which can be practiced both offline and online.
Online:
Also known as “Internet Addiction”, gets more attention
in general from scientific research than offline computer
addiction, mainly because most cases of computer
addiction are related to the excessive use of the Internet.
*Virtual Self -The persona you create about yourself
virtually.
26
Criminal Activities
▸ Hacking
Unauthorized access of or interference with computer
systems, servers, or other information and communication
systems
▸ Computer-related forgery, fraud and/or identity
theft
An attempt to obtain sensitive information such as
usernames, passwords, and credit card details and (indirectly
money), often for malicious reasons.
27
Criminal Activities
▸ Electronic theft
Obtaining files that you do not have the right to use from
the internet.
▸ Cyberbullying
The use of electronic communication to bully a person,
typically by sending a message of an intimidating or
threatening nature
28
Criminal Activities
▸ Cybersex
sexual arousal using computer technology, especially by
wearing virtual reality equipment or by exchanging
messages with another person via the internet.
▸ Child Pornography
Is a form of child sexual exploitation.
▸ Cyber Defamation
Is an unprivileged false statement of fact which tends to
harm the reputation of a person or company.
INTERNET THREATS
29
30
Internet Threats
▸ Hacking
is a term used to describe actions taken by someone to gain
unauthorized access to a computer.
The availability of information online on the tools,
techniques, and malware makes it easier for even non-
technical people to undertake malicious activities
▸ Malware
is one of the more common ways to infiltrate or damage
your computer.
31
Internet Threats
▸ Malware
- Malicious software that infects your computer, such as
computer
Viruses
- A malicious program designed to replicate itself and
transfer from one computer to another either through
the Internet and local networks
Worms
- A malicious program that transfers from one
computer to another by any type of means.
32
Internet Threats
▸ Trojan horses
A malicious program that is disguised as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hackers
to get you information
▸ Spyware
A program that runs in the background without you knowing it
▸ Adware
A program designed to send you advertisement, mostly as pop-ups
33
Internet Threats
▸ Pharming
is a common type of online fraud
is a scamming practice in which malicious code is installed
on a personal computer or server
A means to point you to a malicious and illegitimate website
by redirecting the legitimate URL. Even if the URL is entered
correctly, it can still be redirected to a fake website.
34
Internet Threats
▸ Phishing
is used most often by cyber criminals because it's easy to
execute and can produce the results they're looking for with
very little effort.
acquiring personal information like passwords and credit
card details
▸ Ransomware
is a type of malware that restricts access to your computer or
your files and displays a message that demands payment in
order for the restriction to be removed.
35
Internet Threats
▸ Spam
is one of the more common methods of both sending
information out and collecting it from unsuspecting people.
The mass distribution of unsolicited messages, advertising or
pornography to addresses which can be easily found on the
Internet through things like social networking sites, company
websites and personal blogs
36
Internet Threats
▸ Spyware
Software that collects personal information about you
without you knowing. They often come in the form of a ‘free'
download and are installed automatically with or without
your consent. These are difficult to remove and can infect
your computer
37
THANKS!
Any questions?