0% found this document useful (0 votes)
21 views74 pages

Group 4 - Compressed

The document discusses netiquette and computer ethics, emphasizing the importance of respectful online communication and the ethical use of technology. It outlines key principles for effective digital interaction, such as avoiding slang, proofreading messages, and respecting privacy. Additionally, it covers cybercrimes and relevant laws in the Philippines, including the Cybercrime Prevention Act and the Data Privacy Act.

Uploaded by

stephen rivera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views74 pages

Group 4 - Compressed

The document discusses netiquette and computer ethics, emphasizing the importance of respectful online communication and the ethical use of technology. It outlines key principles for effective digital interaction, such as avoiding slang, proofreading messages, and respecting privacy. Additionally, it covers cybercrimes and relevant laws in the Philippines, including the Cybercrime Prevention Act and the Data Privacy Act.

Uploaded by

stephen rivera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 74

College of Architecture

and Fine Arts

The Netiquette and


the Computer Ethics
GE ELEC 3 - Living in the IT Era - Module 4

Presented by: Group 4


BITUIN DE LUNA GAMBOA
MARTINEZ MENDIOLA PANTAY PIZARRO
De Luna, Arren Jade
PRESENTER

Etiquette
De Luna, Arren Jade
PRESENTER

Netiquette
Netiquette or Network Etiquette is the etiquette of
cyberspace. It is concerned with the “proper” ways
to communicate in an online or virtual
environment.
De Luna, Arren Jade
PRESENTER

The Netiquette
De Luna, Arren Jade
PRESENTER

Remember the Golden Rule


Even though you may be interacting with a
computer screen, you are communicating with a
real person who will react to your message. Make
a good impression - treat others with the same
respect that you would like to receive and avoid
confrontational or offensive language.

To help convey meaning when creating


messages, it is sometimes acceptable to include
appropriate emoticon symbols, such as a smiley
face :) However, for professional communications
these would be inappropriate.
De Luna, Arren Jade
PRESENTER

Avoid slang, acronyms, and


text talk
Communicating effectively in college and
business environments requires the use of correct
terminology, spelling, and grammar that can
easily be understood. For example, use “your”
instead of “ur”.
De Luna, Arren Jade
PRESENTER

Avoid “Screaming” in typed


messages
Typing an entire message using all capital letters
is known as “screaming”. It is distracting and
generally frowned upon in professional
environments. It is better to draw emphasis to
selected words or phrases by: using italic or bold
text; using a different color for text or background
color; or denoting emphasis using special
characters (Example: **Important**).
De Luna, Arren Jade
PRESENTER

Proofread your messages


before sending them
Proofreading your messages before you send
them is a best practice for effective and efficient
communication. Strive to make your
communications concise and free of any:

Spelling and grammar errors

Confusing terms or phrases that could be


misunderstood

Errors of omission, such as missing content or


recipients

Errors in accuracy of information


De Luna, Arren Jade
PRESENTER

Exercise good judgment


when sharing information
with others online
E-mail and chat messages that you send or
receive are considered private and should not be
forwarded or copied to others without gaining the
consent of all involved participants.
De Luna, Arren Jade
PRESENTER

Exercise good judgment


when sharing information
with others online
To protect your privacy and safety, do not share
online any sensitive personal information such as:

Your home address or phone number

Personal conversations

Social plans, such as vacations

Financial information

Usernames, passwords, or hints

Anything personal that you would not want


shared by others over the Internet
De Luna, Arren Jade
PRESENTER

Respect diversity in
viewpoints
Be constructive and respectful when sharing
opinions, beliefs, and criticisms, or responding to
those of others in the conversation.

When sharing a viewpoint that differs from


someone else’s, it is a best practice to first
acknowledge the other person by briefly restating
what he or she said, but in your own words. This
lets the person know that you are listening and
trying to understand them.
De Luna, Arren Jade
PRESENTER

Respect diversity in
viewpoints
When presenting an opinion or criticism, it is
helpful to use phrases that identify to whose point
of view you are referring. If the opinion is yours, you
can begin with the phrase “In my experience” or “In
my opinion”. If it is a viewpoint of someone else,
make sure you identify that in your message
(Example: “According to Eric Ericson,” or “The
president believes”).
Martinez, John Argie
PRESENTER

The 10 Commandments of
Computer Ethics
Adapted from Virginia Shea's The Core Rules of
Netiquette (1994)
Martinez, John Argie
PRESENTER

RULE

Remember the human


When communicating electronically, whether
through email, instant message, discussion post,
text, or some other method, practice the Golden
Rule: Do unto others as you would have others do
unto you. Remember, your written words are read
by real people, all deserving of respectful
communication. Before you press "send" or
"submit," ask yourself, "Would I be okay with this if
someone else had written it?" FOLLO W T H E R UL E S!
Martinez, John Argie
PRESENTER

RULE
Adhere to the same
standards of behavior online
that you follow in real life
While it can be argued that standards of behavior
may be different in the virtual world, they certainly
should not be lower. You should do your best to
act within the laws and ethical manners of society
whenever you inhabit "cyberspace." Would you
behave rudely to someone face-to-face? On most
occasions, no. Neither should you behave this way FOLLO W T H E R UL E S!
in the virtual world.
Martinez, John Argie
PRESENTER

RULE
Know where you are in
cyberspace
"Netiquette varies from domain to domain." (Shea,
1994) Depending on where you are in the virtual
world, the same written communication can be
acceptable in one area, where it might be
considered inappropriate in another. What you
text to a friend may not be appropriate in an email
to a classmate or colleague.
FOLLO W T H E R UL E S!
Martinez, John Argie
PRESENTER

RULE
Respect other people's time
and bandwidth
Electronic communication takes time: time to read
and time in which to respond. Most people today
lead busy lives, just like you do, and don't have
time to read or respond to frivolous emails or
discussion posts. As a virtual world communicator,
it is your responsibility to make sure that the time
spent reading your words isn't wasted. Make your
written communication meaningful and to the
point, without extraneous text or superfluous FOLLO W T H E R UL E S!
graphics or attachments that may take forever to
download.
Martinez, John Argie
PRESENTER

RULE
Make yourself look good
online
One of the best things about the virtual world is
the lack of judgment associated with your physical
appearance, sound of your voice, or the clothes
you wear (unless you post a video of yourself
singing Karaoke in a clown outfit.) You will,
however, be judged by the quality of your writing,
so keep the following tips in mind:

Always check for spelling and grammar errors


Know what you're talking about and state it FOLLO W T H E R UL E S!
clearly
Be pleasant and polite
Martinez, John Argie
PRESENTER

RULE
Share expert knowledge
The Internet offers its users many benefits; one is
the ease in which information can be shared or
accessed and in fact, this "information sharing"
capability is one of the reasons the Internet was
founded. So in the spirit of the Internet's "founding
fathers," share what you know! When you post a
question and receive intelligent answers, share the
results with others. Are you an expert at
something? Post resources and references about
your subject matter. Recently expanded your
FOLLO W T H E R UL E S!
knowledge about a subject that might be of
interest to others? Share that as well.
Martinez, John Argie
PRESENTER

RULE
Help keep flame wars under
control
What is meant by "flaming" and "flame wars?"
"Flaming is what people do when they express a
strongly held opinion without holding back any
emotion." (Shea, 1994). As an example, think of the
kinds of passionate comments you might read on
a sports blog. While "flaming" is not necessarily
forbidden in virtual communication, "flame wars,"
when two or three people exchange angry posts
between one another, must be controlled or the
camaraderie of the group could be compromised.
FOLLO W T H E R UL E S!
Don't feed the flames; extinguish them by guiding
the discussion back to a more productive
direction.
Martinez, John Argie
PRESENTER

RULE
Respect other people's privacy
Depending on what you are reading in the virtual
world, be it an online class discussion forum,
Facebook page, or an email, you may be exposed
to some private or personal information that
needs to be handled with care. Perhaps someone
is sharing some medical news about a loved one
or discussing a situation at work. What do you
think would happen if this information "got into the
wrong hands?" Embarrassment? Hurt feelings?
Loss of a job? Just as you expect others to respect
your privacy, so should you respect the privacy of FOLLO W T H E R UL E S!
others. Be sure to err on the side of caution when
deciding to discuss or not to discuss virtual
communication.
Martinez, John Argie
PRESENTER

RULE
Don't abuse your power
Just like in face-to-face situations, there are
people in cyberspace who have more "power"
than others. They have more expertise in
technology or they have years of experience in a
particular skill or subject matter. Maybe it's you
who posesses all of this knowledge and power!
Just remember: knowing more than others do or
having more power than others may have does
not give you the right to take advantage of
anyone. Think of Rule 1: Remember the human.
FOLLO W T H E R UL E S!
Martinez, John Argie
PRESENTER

RULE
Be forgiving of other people's
mistakes
Not everyone has the same amount of experience
working in the virtual world. And not everyone
knows the rules of netiquette. At some point, you
will see a stupid question, read an unnecessarily
long response, or encounter misspelled words;
when this happens, practice kindness and
forgiveness as you would hope someone would do
if you had committed the same offense. If it's a
minor "offense," you might want to let it slide. If you
FOLLO W T H E R UL E S!
feel compelled to respond to a mistake, do so in a
private email rather than a public forum.
Pizarro, Mac Justine
PRESENTER

Cybercrimes
Pizarro, Mac Justine
PRESENTER

Cyber
It is the Characteristics of the culture of
computers, information, technology and virtual
reality.

Cybercrime
Defined as a crime in which a computer is the
object of the crime (hacking, phishing, spamming
and child pornography) is used as a tool to
commit an offense.

Cybercriminals
May use computer technology to access personal
information, business trade secrets or use the
internet for exploitative or malicious purposes.
Pizarro, Mac Justine
PRESENTER

Republic Act No. 10175 Cybercrime


Prevention Act of 2012
a law in the Philippines approved on September 12,
2012 which aims to address legal issues
concerning online interactions and internet.
PUNISHABLE ACTS UNDER RA 10175

ILLEGAL ACCESS
ILLEGAL INTERCEPTION
DATA/SYSTEM INTERFERENCE
CYBER-SQUATTING
COMPUTER-RELATED FORGERY
COMPUTER-RELATED FRAUD
COMPUTER-RELATED IDENTITY THEFT
CYBERSEX
CHILD PORNOGRAPHY
UNSOLICITED COMMERCIAL COMMUNICATION
CYBER LIBEL
Pizarro, Mac Justine
PRESENTER

Republic Act No. 10173 Data Privacy


Act of 2012
an act protecting individual personal information
that is private, not publicly available, and
identifiable.

KEY PROVISIONS OF THE LAW

PROTECTION OF PERSONAL INFORMATION


RIGHTS OF INDIVIDUALS
RESPONSIBILITIES OF AGENCIES AND
COMPANIES
PENALTIES FOR VIOLATION
Bituin, Nicole Ilyana
PRESENTER

Common Forms of
Bituin, Nicole Ilyana
PRESENTER

The exclusive legal right, given to an originator or


an assignee to print, publish, perform, film, or
record literary, artistic, or musical material, and to
authorize others to do the same.

Copyright infringement - the violation, piracy or


theft of a copyright holder's exclusive rights
through the unauthorized use of a copyrighted
material or work.
Bituin, Nicole Ilyana
PRESENTER

An act or instance of using or closely imitating the


language and thoughts of another author without
authorization.
Bituin, Nicole Ilyana
PRESENTER

Computer
Offline - Generally used when speaking about
excessive gaming behavior, which can be
practiced both offline and online.

Online - Also known as “Internet Addiction”, gets


more attention in general from scientific research
than offline computer addiction, mainly because
most cases of computer addiction are related to
the excessive use of the Internet.

*Virtual Self - The persona you create about


yourself virtually.
Bituin, Nicole Ilyana
PRESENTER
Bituin, Nicole Ilyana
PRESENTER

01 Hackers 04 Computer Virus


Author

Computer hobbyist who Makers of Computer


enjoy pushing computer viruses.
system to their limits.

02 Crackers 05 Disgruntled
Employees

Obsessed with gaining Kickout employees


entry to highly secured
computer systems.

03 Cyber Gang 06 Fraud Artists

Bring Crackers together by Swindlers and Shills


means of the internet and
physical meetings.
Pantay, Paul Timothy
PRESENTER

Criminal Activities
Pantay, Paul Timothy
PRESENTER

Hacking
Unauthorized access of or interference with
computer systems, servers, or other
information and communication systems.

Unauthorized access to corrupt, alter, steal, or


destroy electronic data using computers or
other information and communication systems
without the computer or system owner’s
knowledge and consent.

The introduction of computer viruses resulting


in the corruption, alteration, theft, or loss of
such data.
Pantay, Paul Timothy
PRESENTER

Hacking
Illegal Access

Illegal Interception

Data Interference

System Interference

Misuse of Devices
Pantay, Paul Timothy
PRESENTER

Hacking
Infection of IT Systems with malware - if the act
is committed against critical infrastructure of
the Philippines, the penalty is between 12-20
years reclusion temporal.

Six years up to twelve years of imprisonment


also known as prison mayor.
Pantay, Paul Timothy
PRESENTER

Types of Hackers
White Hat Hackers - Also known as Ethical
Hackers. They never intend to harm a system,
rather, they try to find out weaknesses in a
computer or a network system as a part of
penetration testing and vulnerability.

Black Hat Hackers - Also known as crackers. They


hack to gain unauthorized access to a system and
harm its operations or steal sensitive information.
Black Hat hacking is always illegal because of its
bad intent which includes stealing corporate data,
violating privacy, damaging the system, blocking
network communications, etc.
Pantay, Paul Timothy
PRESENTER

Types of Hackers
Grey Hat Hackers - A blend of both black hat and
white hat hackers. They act without malicious
intent but for their fun. They exploit a security
weakness in a computer system or network
without the owner’s permission or knowledge. Their
intent is to bring the weakness to the attention of
the owners and getting appreciation or a little
bounty from the owners.
Pantay, Paul Timothy
PRESENTER

Types of Hackers
Miscellaneous Hackers

Red Hat Hackers - An another blend of both


black hat and white hat hackers. They are
usually on the level of hacking government
agencies, top-secret information hubs and
generally anything that falls under the
category of sensitive information.
Pantay, Paul Timothy
PRESENTER

Types of Hackers
Miscellaneous Hackers

Blue Hat Hackers - Someone outside


computer security consulting firms who is used
to bug-test a system prior to its launch. They
look for loopholes that can be exploited and try
to close these gaps. Microsoft also uses the
term “Blue Hat” to represent a series of secuirty
briefing events.
Pantay, Paul Timothy
PRESENTER

Types of Hackers
Miscellaneous Hackers

Elite Hackers - This is a social status among


hackers, which is used to describe the most
skilled. Newly discovered exploits will circulate
among these hackers.

Script Kiddie - Is a non-expert who breaks into


computer systems by using pre-packaged
automated tools written by others, usually with
little understanding of the underlying concept,
hence the term “Kiddie”.
Pantay, Paul Timothy
PRESENTER

Types of Hackers
Miscellaneous Hackers

Neophyte - A neophte, “n00b”, “newbie”, or


“Green Hat Hacker” is new to hacking or
phreaking and has almost no knowledge or
experience of the workings of technology and
hacking.
Pantay, Paul Timothy
PRESENTER

Computer-related forgery, fraud


and/or identity theft
An attempt to obtain sensitive information
such as usernames, passwords, and credit
card details often for malicious reasons.

Phishing

Pharming

Spam

Maximum of PHP 200, 000 fine or prison mayor


Pantay, Paul Timothy
PRESENTER

Electronic theft
Illegal Downloading

Obtaining files that you do not have the right to


use from the internet.

Digital Piracy

Practice of illegal copying and selling digital


music, video, computer software, etc.

Copyright infringement

Penalty of PHP 50,000 - 500,000 and/or prison


mayor
Pantay, Paul Timothy
PRESENTER

Cyberbullying
The use of electronic communication to bully a
person, typically by sending a message of an
intimidating or threatening nature.

The Anti-Bullying Act of 2013 (RA 10627)


Mendiola, Aira
PRESENTER

Willful engagement, maintenance, control, or operation,


directly or indirectly of any lascivious exhibition of sexual
organs or sexual activity with the aid of a computer
system for favor or consideration.

There is a discussion on this matter if it involves “couples”


or “people in relationship” who engage in cybersex.

Penalty at least PHP 200,000 and/or prison mayor.


Mendiola, Aira
PRESENTER

Child Pornography

A form of child sexual exploitation

Unlawful or prohibited acts defined and


punishable by Republic Act No. 9775 or the Anti-
Child Pornography Act of 2009

Penalty of 12-20 years of imprisonment or


reclusion temporal
Mendiola, Aira
PRESENTER

Cyber Defamation
An unprivileged false statement of fact which
tends to harm the reputation of a person or
company.
Penalty of 6-12 years of imprisonment or prison
mayor.
Mendiola, Aira
PRESENTER

INTERNET
THREATS
Mendiola, Aira
PRESENTER

Hacking
Hacking is a term used to describe actions taken
by someone to gain unauthorized access to a
computer. The availability of information online on
the tools, techniques, and malware makes it easier
for even non-technical people to undertake
malicious activities. The process by which cyber
criminals gain access to your computer.
Mendiola, Aira
PRESENTER

What it can do...


Find weaknesses (or pre-existing bugs) in your
security settings and exploit them in order to
access your information.

Install a Trojan horse, providing a back door for


hackers to enter and search for your
information.
Mendiola, Aira
PRESENTER

Malware
Malware is one of the more common ways to
infiltrate or damage your computer. Malicious
software that infects your computer, such as
computer viruses, worms, Trojan horses, spyware,
and adware.
Mendiola, Aira
PRESENTER

What it can do...


Intimidate you with scareware, which is usually
a pop-up message that tells you your
computer has a security problem or other false
information.

Reformat the hard drive of your computer


causing you to lose all your information.

Alter or delete files.

Steal sensitive information.

Send emails on your behalf

Take control of your computer and all the


software running on it.
Mendiola, Aira
PRESENTER

Pharming
Pharming is a common type of online fraud. A
means to point you to a malicious and illegitimate
website by redirecting the legitimate URL. Even if
the URL is entered correctly, it can still be
redirected to a fake website.
Mendiola, Aira
PRESENTER

What it can do...


Convince you that the site is real and
legitimate by spoofing or looking almost
identical to the actual site down to the smallest
details. You may enter your personal
information and unknowingly give it to
someone with malicious intent.
Mendiola, Aira
PRESENTER

Phishing
Phishing is used most often by cyber criminals
because it's easy to execute and can produce the
results they're looking for with very little effort. Fake
emails, text messages and websites created to
look like they're from authentic companies. They're
sent by criminals to steal personal and financial
information from you. This is also known as
“spoofing”.
Mendiola, Aira
PRESENTER

What it can do...


Trick you into giving them information by
asking you to update, validate or confirm your
account. It is often presented in a manner than
seems official and intimidating, to encourage
you to take action.

Provides cyber criminals with your username


and passwords so that they can access your
accounts (your online bank account, shopping
accounts, etc.) and steal your credit card
numbers.
Gamboa, Princes Claudeth
PRESENTER

Ransomware
Ransomware is a type of malware that restricts
access to your computer or your files and displays
a message that demands payment in order for
the restriction to be removed. The two most
common means of infection appear to be
phishing emails that contain malicious
attachments and website pop-up advertisements.
Gamboa, Princes Claudeth
PRESENTER

What it can do...


TYPES OF RANSOMWARE
1. Crypto Ransomware or Encryptors
Encryptors are one of the most well-known and damaging variants. This
type encrypts the files and data within a system, making the content
inaccessible without a decryption key.
2. Lockers
Lockers completely lock you out of your system, so your files and
applications are inaccessible. A lock screen displays the ransom
demand, possibly with a countdown clock to increase urgency and
drive victims to act.
3. Scareware
Scareware is fake software that claims to have detected a virus or other
issue on your computer and directs you to pay to resolve the problem.
Some types of scareware lock the computer, while others simply flood
the screen with pop-up alerts without actually damaging files.
Gamboa, Princes Claudeth
PRESENTER

What it can do...


TYPES OF RANSOMWARE

4. Doxware or Leakware
Leakware threatens to distribute sensitive personal or company
information online, and many people panic and pay the ransom
to prevent private data from falling into the wrong hands or
entering the public domain. One variation is police-themed
ransomware, which claims to be law enforcement and warns that
illegal online activity has been detected, but jail time can be
avoided by paying a fine.
5. RaaS (Ransomware as a Service)
Ransomware as a Service (RaaS) refers to malware hosted
anonymously by a “professional” hacker that handles all aspects
of the attack, from distributing ransomware to collecting
payments and restoring access, in return for a cut of the loot.
Gamboa, Princes Claudeth
PRESENTER

Spam
Spam is one of the more common methods of
both sending information out and collecting it
from unsuspecting people. The mass distribution
of unsolicited messages, advertising or
pornography to addresses which can be easily
found on the Internet through things like social
networking sites, company websites and personal
blogs.
Gamboa, Princes Claudeth
PRESENTER

What it can do...


Annoy you with unwanted junk mail.

Create a burden for communications service


providers and businesses to filter electronic
messages.

Phish for your information by tricking you into


following links or entering details with too-
good- to-be-true offers and promotions.

Provide a vehicle for malware, scams, fraud


and threats.
Gamboa, Princes Claudeth
PRESENTER

Spyware (Spyware and Adware)


Spyware and adware are often used by third
parties to infiltrate your computer.

These are softwares that collects personal


information about you without you knowing. They
often come in the form of a ‘free' download and
are installed automatically with or without your
consent. These are difficult to remove and can
infect your computer
Gamboa, Princes Claudeth
PRESENTER

What it can do...


Collect information about you without you
knowing about it and give it to third parties.

Send your usernames, passwords, surfing


habits, list of applications you've downloaded,
settings, and even the version of your
operating system to third parties.

Change the way your computer runs without


your knowledge.

Take you to unwanted sites or inundate you


with uncontrollable pop-up ads.
Gamboa, Princes Claudeth
PRESENTER

Trojan Horses
A Trojan horse may not be a term you're familiar
with, but there's a good chance you or someone
you know has been affected by one. A malicious
program that is disguised as, or embedded within,
legitimate software. It is an executable file that will
install itself and run automatically once it's
downloaded.
Gamboa, Princes Claudeth
PRESENTER

What it can do...


Delete your files.

Use your computer to hack other computers.

Watch you through your web cam.

Log your keystrokes (such as a credit card


number you entered in an online purchase).

Record usernames, passwords and other


personal information.
Gamboa, Princes Claudeth
PRESENTER

Wi-Fi Eavesdropping
WiFi eavesdropping is another method used by
cyber criminals to capture personal information.
Virtual “listening in” on information that's shared
over an unsecure (not encrypted) WiFi network.
Gamboa, Princes Claudeth
PRESENTER

What it can do...


Potentially access your computer with the right
equipment.
Steal your personal information including
logins and passwords.
Gamboa, Princes Claudeth
PRESENTER

Viruses
Most people have heard of computer viruses, but
not many know exactly what they are or what they
do. Malicious computer programs that are often
sent as an email attachment or a download with
the intent of infecting your computer, as well as
the computers of everyone in your contact list.
Just visiting a site can start an automatic
download of a virus.
Gamboa, Princes Claudeth
PRESENTER

What it can do...


Send spam.

Provide criminals with access to your computer and


contact lists

Scan and find personal information like passwords on


your computer.

Hijack your web browser.

Disable your security settings.

Display unwanted ads.

When a program is running, the virus attached to it


could infiltrate your hard drive and also spread to USB
keys and external hard drives. Any attachment you
create using this program and send to someone else
could also infect them with the virus.
Gamboa, Princes Claudeth
PRESENTER

Worms
A computer worm is a subset of the Trojan horse
malware that can propagate or self-replicate
from one computer to another without human
activation after breaching a system. Typically, a
worm spreads across a network through your
Internet or LAN (Local Area Network) connection.
Gamboa, Princes Claudeth
PRESENTER

What it can do...


Spread to everyone in your contact list
Cause a tremendous amount of damage by
shutting down parts of the Internet, wreaking
havoc on internal network and costing
companies’ enormous amount of lost revenue.

Worm vs Virus
The defining difference between a virus and a worm is that
viruses rely on human action for activation and need a host
system to replicate. In other words, a virus won’t harm your
system unless you run it. For example, a virus on a flash drive
connected to your computer won’t damage your system unless
you activate it. And as mentioned above, a worm doesn’t need
a host system or user action to spread.
Thank you.

You might also like