Group 4 - Compressed
Group 4 - Compressed
Etiquette
De Luna, Arren Jade
PRESENTER
Netiquette
Netiquette or Network Etiquette is the etiquette of
cyberspace. It is concerned with the “proper” ways
to communicate in an online or virtual
environment.
De Luna, Arren Jade
PRESENTER
The Netiquette
De Luna, Arren Jade
PRESENTER
Personal conversations
Financial information
Respect diversity in
viewpoints
Be constructive and respectful when sharing
opinions, beliefs, and criticisms, or responding to
those of others in the conversation.
Respect diversity in
viewpoints
When presenting an opinion or criticism, it is
helpful to use phrases that identify to whose point
of view you are referring. If the opinion is yours, you
can begin with the phrase “In my experience” or “In
my opinion”. If it is a viewpoint of someone else,
make sure you identify that in your message
(Example: “According to Eric Ericson,” or “The
president believes”).
Martinez, John Argie
PRESENTER
The 10 Commandments of
Computer Ethics
Adapted from Virginia Shea's The Core Rules of
Netiquette (1994)
Martinez, John Argie
PRESENTER
RULE
RULE
Adhere to the same
standards of behavior online
that you follow in real life
While it can be argued that standards of behavior
may be different in the virtual world, they certainly
should not be lower. You should do your best to
act within the laws and ethical manners of society
whenever you inhabit "cyberspace." Would you
behave rudely to someone face-to-face? On most
occasions, no. Neither should you behave this way FOLLO W T H E R UL E S!
in the virtual world.
Martinez, John Argie
PRESENTER
RULE
Know where you are in
cyberspace
"Netiquette varies from domain to domain." (Shea,
1994) Depending on where you are in the virtual
world, the same written communication can be
acceptable in one area, where it might be
considered inappropriate in another. What you
text to a friend may not be appropriate in an email
to a classmate or colleague.
FOLLO W T H E R UL E S!
Martinez, John Argie
PRESENTER
RULE
Respect other people's time
and bandwidth
Electronic communication takes time: time to read
and time in which to respond. Most people today
lead busy lives, just like you do, and don't have
time to read or respond to frivolous emails or
discussion posts. As a virtual world communicator,
it is your responsibility to make sure that the time
spent reading your words isn't wasted. Make your
written communication meaningful and to the
point, without extraneous text or superfluous FOLLO W T H E R UL E S!
graphics or attachments that may take forever to
download.
Martinez, John Argie
PRESENTER
RULE
Make yourself look good
online
One of the best things about the virtual world is
the lack of judgment associated with your physical
appearance, sound of your voice, or the clothes
you wear (unless you post a video of yourself
singing Karaoke in a clown outfit.) You will,
however, be judged by the quality of your writing,
so keep the following tips in mind:
RULE
Share expert knowledge
The Internet offers its users many benefits; one is
the ease in which information can be shared or
accessed and in fact, this "information sharing"
capability is one of the reasons the Internet was
founded. So in the spirit of the Internet's "founding
fathers," share what you know! When you post a
question and receive intelligent answers, share the
results with others. Are you an expert at
something? Post resources and references about
your subject matter. Recently expanded your
FOLLO W T H E R UL E S!
knowledge about a subject that might be of
interest to others? Share that as well.
Martinez, John Argie
PRESENTER
RULE
Help keep flame wars under
control
What is meant by "flaming" and "flame wars?"
"Flaming is what people do when they express a
strongly held opinion without holding back any
emotion." (Shea, 1994). As an example, think of the
kinds of passionate comments you might read on
a sports blog. While "flaming" is not necessarily
forbidden in virtual communication, "flame wars,"
when two or three people exchange angry posts
between one another, must be controlled or the
camaraderie of the group could be compromised.
FOLLO W T H E R UL E S!
Don't feed the flames; extinguish them by guiding
the discussion back to a more productive
direction.
Martinez, John Argie
PRESENTER
RULE
Respect other people's privacy
Depending on what you are reading in the virtual
world, be it an online class discussion forum,
Facebook page, or an email, you may be exposed
to some private or personal information that
needs to be handled with care. Perhaps someone
is sharing some medical news about a loved one
or discussing a situation at work. What do you
think would happen if this information "got into the
wrong hands?" Embarrassment? Hurt feelings?
Loss of a job? Just as you expect others to respect
your privacy, so should you respect the privacy of FOLLO W T H E R UL E S!
others. Be sure to err on the side of caution when
deciding to discuss or not to discuss virtual
communication.
Martinez, John Argie
PRESENTER
RULE
Don't abuse your power
Just like in face-to-face situations, there are
people in cyberspace who have more "power"
than others. They have more expertise in
technology or they have years of experience in a
particular skill or subject matter. Maybe it's you
who posesses all of this knowledge and power!
Just remember: knowing more than others do or
having more power than others may have does
not give you the right to take advantage of
anyone. Think of Rule 1: Remember the human.
FOLLO W T H E R UL E S!
Martinez, John Argie
PRESENTER
RULE
Be forgiving of other people's
mistakes
Not everyone has the same amount of experience
working in the virtual world. And not everyone
knows the rules of netiquette. At some point, you
will see a stupid question, read an unnecessarily
long response, or encounter misspelled words;
when this happens, practice kindness and
forgiveness as you would hope someone would do
if you had committed the same offense. If it's a
minor "offense," you might want to let it slide. If you
FOLLO W T H E R UL E S!
feel compelled to respond to a mistake, do so in a
private email rather than a public forum.
Pizarro, Mac Justine
PRESENTER
Cybercrimes
Pizarro, Mac Justine
PRESENTER
Cyber
It is the Characteristics of the culture of
computers, information, technology and virtual
reality.
Cybercrime
Defined as a crime in which a computer is the
object of the crime (hacking, phishing, spamming
and child pornography) is used as a tool to
commit an offense.
Cybercriminals
May use computer technology to access personal
information, business trade secrets or use the
internet for exploitative or malicious purposes.
Pizarro, Mac Justine
PRESENTER
ILLEGAL ACCESS
ILLEGAL INTERCEPTION
DATA/SYSTEM INTERFERENCE
CYBER-SQUATTING
COMPUTER-RELATED FORGERY
COMPUTER-RELATED FRAUD
COMPUTER-RELATED IDENTITY THEFT
CYBERSEX
CHILD PORNOGRAPHY
UNSOLICITED COMMERCIAL COMMUNICATION
CYBER LIBEL
Pizarro, Mac Justine
PRESENTER
Common Forms of
Bituin, Nicole Ilyana
PRESENTER
Computer
Offline - Generally used when speaking about
excessive gaming behavior, which can be
practiced both offline and online.
02 Crackers 05 Disgruntled
Employees
Criminal Activities
Pantay, Paul Timothy
PRESENTER
Hacking
Unauthorized access of or interference with
computer systems, servers, or other
information and communication systems.
Hacking
Illegal Access
Illegal Interception
Data Interference
System Interference
Misuse of Devices
Pantay, Paul Timothy
PRESENTER
Hacking
Infection of IT Systems with malware - if the act
is committed against critical infrastructure of
the Philippines, the penalty is between 12-20
years reclusion temporal.
Types of Hackers
White Hat Hackers - Also known as Ethical
Hackers. They never intend to harm a system,
rather, they try to find out weaknesses in a
computer or a network system as a part of
penetration testing and vulnerability.
Types of Hackers
Grey Hat Hackers - A blend of both black hat and
white hat hackers. They act without malicious
intent but for their fun. They exploit a security
weakness in a computer system or network
without the owner’s permission or knowledge. Their
intent is to bring the weakness to the attention of
the owners and getting appreciation or a little
bounty from the owners.
Pantay, Paul Timothy
PRESENTER
Types of Hackers
Miscellaneous Hackers
Types of Hackers
Miscellaneous Hackers
Types of Hackers
Miscellaneous Hackers
Types of Hackers
Miscellaneous Hackers
Phishing
Pharming
Spam
Electronic theft
Illegal Downloading
Digital Piracy
Copyright infringement
Cyberbullying
The use of electronic communication to bully a
person, typically by sending a message of an
intimidating or threatening nature.
Child Pornography
Cyber Defamation
An unprivileged false statement of fact which
tends to harm the reputation of a person or
company.
Penalty of 6-12 years of imprisonment or prison
mayor.
Mendiola, Aira
PRESENTER
INTERNET
THREATS
Mendiola, Aira
PRESENTER
Hacking
Hacking is a term used to describe actions taken
by someone to gain unauthorized access to a
computer. The availability of information online on
the tools, techniques, and malware makes it easier
for even non-technical people to undertake
malicious activities. The process by which cyber
criminals gain access to your computer.
Mendiola, Aira
PRESENTER
Malware
Malware is one of the more common ways to
infiltrate or damage your computer. Malicious
software that infects your computer, such as
computer viruses, worms, Trojan horses, spyware,
and adware.
Mendiola, Aira
PRESENTER
Pharming
Pharming is a common type of online fraud. A
means to point you to a malicious and illegitimate
website by redirecting the legitimate URL. Even if
the URL is entered correctly, it can still be
redirected to a fake website.
Mendiola, Aira
PRESENTER
Phishing
Phishing is used most often by cyber criminals
because it's easy to execute and can produce the
results they're looking for with very little effort. Fake
emails, text messages and websites created to
look like they're from authentic companies. They're
sent by criminals to steal personal and financial
information from you. This is also known as
“spoofing”.
Mendiola, Aira
PRESENTER
Ransomware
Ransomware is a type of malware that restricts
access to your computer or your files and displays
a message that demands payment in order for
the restriction to be removed. The two most
common means of infection appear to be
phishing emails that contain malicious
attachments and website pop-up advertisements.
Gamboa, Princes Claudeth
PRESENTER
4. Doxware or Leakware
Leakware threatens to distribute sensitive personal or company
information online, and many people panic and pay the ransom
to prevent private data from falling into the wrong hands or
entering the public domain. One variation is police-themed
ransomware, which claims to be law enforcement and warns that
illegal online activity has been detected, but jail time can be
avoided by paying a fine.
5. RaaS (Ransomware as a Service)
Ransomware as a Service (RaaS) refers to malware hosted
anonymously by a “professional” hacker that handles all aspects
of the attack, from distributing ransomware to collecting
payments and restoring access, in return for a cut of the loot.
Gamboa, Princes Claudeth
PRESENTER
Spam
Spam is one of the more common methods of
both sending information out and collecting it
from unsuspecting people. The mass distribution
of unsolicited messages, advertising or
pornography to addresses which can be easily
found on the Internet through things like social
networking sites, company websites and personal
blogs.
Gamboa, Princes Claudeth
PRESENTER
Trojan Horses
A Trojan horse may not be a term you're familiar
with, but there's a good chance you or someone
you know has been affected by one. A malicious
program that is disguised as, or embedded within,
legitimate software. It is an executable file that will
install itself and run automatically once it's
downloaded.
Gamboa, Princes Claudeth
PRESENTER
Wi-Fi Eavesdropping
WiFi eavesdropping is another method used by
cyber criminals to capture personal information.
Virtual “listening in” on information that's shared
over an unsecure (not encrypted) WiFi network.
Gamboa, Princes Claudeth
PRESENTER
Viruses
Most people have heard of computer viruses, but
not many know exactly what they are or what they
do. Malicious computer programs that are often
sent as an email attachment or a download with
the intent of infecting your computer, as well as
the computers of everyone in your contact list.
Just visiting a site can start an automatic
download of a virus.
Gamboa, Princes Claudeth
PRESENTER
Worms
A computer worm is a subset of the Trojan horse
malware that can propagate or self-replicate
from one computer to another without human
activation after breaching a system. Typically, a
worm spreads across a network through your
Internet or LAN (Local Area Network) connection.
Gamboa, Princes Claudeth
PRESENTER
Worm vs Virus
The defining difference between a virus and a worm is that
viruses rely on human action for activation and need a host
system to replicate. In other words, a virus won’t harm your
system unless you run it. For example, a virus on a flash drive
connected to your computer won’t damage your system unless
you activate it. And as mentioned above, a worm doesn’t need
a host system or user action to spread.
Thank you.