0% found this document useful (0 votes)
44 views33 pages

Policing Nics

Uploaded by

Ranled
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views33 pages

Policing Nics

Uploaded by

Ranled
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 33

POLICING THE

INTERNET
DATA BREACH
 Data breaches involve cybercriminals extracting information
from a source, typically exploiting weaknesses in security.
Cybercriminals research vulnerabilities, initiate contact with
the network, and extract data for various illegal activities such
as information fraud, identity theft, and credit card duplication.
Companies holding personal data, like banks and hospitals,
continually caution clients about data vulnerability in today’s
technological landscape.
Cybercrime police, also known as cybercrime units, are
specialized law enforcement entities focused on investigating
and combating cybercriminal activities. They handle a wide
range of offenses, including hacking, online fraud, identity
theft, and other digital crimes. These units employ advanced
technology and expertise to trace and apprehend
cybercriminals, working to ensure the security of online
environments and protect individuals and organizations from
digital threats
USAGE OF SECURITY APPLICATIONS
 Application security involves safeguarding software, hardware, and procedures
from external threats. It has become increasingly crucial with the rise of network-
accessible applications. The focus is on protecting vital files from unauthorized
access, preventing data theft, and ensuring user privacy. Many users may not be
aware of the actions apps perform on their devices, as some applications request
permissions, such as location and contact access. Spyware, a type of software,
stealthily collects and alters user information, often infiltrating devices through
unauthorized software installations, app downloads, or pop-up ads. Shareware and
freeware are common entry points for spyware, enabling it to install and transfer or
collect data without the user’s knowledge.
TYPES OF SECURITY
APPLICATION
Auditing Authentication
Summarize this Recording and It should be only the user
tracking the execution of the
application. In tracking the execution of
who can log in and run the
the application, you will notice if there application. Only the valid
are any suspicious on the application. information can reach this
Also you should able to trail the events. software.
TYPES OF SECURITY
APPLICATION
Authorization Cryptography
Only authorized users should have the Assurance of privacy to the user,
ability to change, edit, and access information unauthorized user should not be able to
within the application. In case of suspicious edit, change, copy, or read the
activity, the user or owner must undergo
verification through email, personal phone information inside the application. The
number, or other accessible means to notify security must be strong enough to
and confirm their identity. secure the application.
STATE OF PRIVACY IN THE
INTERNET
Privacy is paramount on the internet, with personal information
needing protection. Cybercriminals pose a significant threat, as evident in
the high cases of identity theft, credit card details being stolen, and data
breaches. Even when using public Wi-Fi, the risk of information leakage is
present due to the lack of encryption. Public networks allow hackers to
spy on user activities easily. Encryption, which restricts access to
authorized individuals, is crucial for data security. Utilizing a Virtual Private
Network (VPN) can help safeguard information by masking a device’s IP
address and ensuring secure data transmission across public networks.
PUBLIC NETWORKS AREN’T THE ONLY ONES THAT CAN
RISK YOUR PERSONAL DATA. HERE ARE SOME WAYS
HACKERS CAN GET INTO YOUR DEVICE

1. Malware or viruses attached to email


Attaching malwares or viruses to emails is probably one of the most popular methods of malware spread. Once
you open the attachment, the software downloads into your computer.

2. Links to malicious websites attached to emails


Once you click on the attached link, it will lead you to a fake website which will trick you, the user, to enter
private information which can be emails, passwords or even banking details.

3. Social Networking Pages


Fake profiles can entice users into following a link to websites wherein they can, again, get your information.
4. Hijacking advertisements
Hackers or cybercriminals place ads containing malicious codes on real
websites.

5. Malicious Mobile applications


If you think every application on Google Play store and Apple store is safe
and legit then you might want to think again. Some applications may contain
malicious codes that help cyber criminals get your data.

6. Smishing
This is phishing but via phone call or SMS messages. It is when someone
tricks you into giving them your information.
PRIVACY ISSUES
Privacy is vital for personal freedom, yet social media has
eroded it. People share sensitive information online, exposing
themselves to risks like fraud and stalking. Incidents like the
Philippines’ government data breach highlight the dangers of
compromised personal details.
ONLINE ETHICS
ETHICS. ETIQUETTE, AND
NETIQUETTES
We first identify what is ethics. Ethics is defined as what deals with moral principles, it is
the understanding and knowing the difference of what is good and bad. While etiquette is the
way people behave in an orderly manner in a social setting, and it refers to your polite behavior
and good manners. Everyone can gain access to the internet and everyone too can post and
interact with almost everything that is posted public ally in the internet. With this kind of freedom,
there should be proper manner/behavior to be observed. Social etiquettes do not only exist in
the real interacting environment but also online. There are dos and don’ts in the online world
and users must know and apply them to create a good interaction with everyone. Netiquette is
the combination of the two words network and etiquette. It refers to the distinguished set of rules
for what is considered to be acceptable as good online behavior. It also emphasizes on what are
tolerable usage of online resources.
8 GUIDES FOR PROPER ONLINE
ETIQUETTES
As an online user, you should be responsible for the
actions you are doing in the web by the means of
interacting with other personal businesses. That being
said, here are 8 guidelines to follow for achieving
netiquette.
1. Internet should not be used as a platform to harm fellow users.
Online websites should be a safe place wherein each and every person is comfortable in
trusting sharing data with one another without getting abuse in terms of certain processes.

2. Always respect someone’s privacy.


Avoid interfering with others’ business, especially considering the legal consequences
associated with invading someone’s privacy.

3. An Online platform is not a place for stealing.


Users must be aware of copyrights and plagiarism when seeking information online,
ensuring proper paraphrasing and crediting of sources. This applies not only to general online
information but also to the e-commerce industry to prevent fraudulent activities. Additionally,
practicing online etiquette involves refraining from unauthorized software installations, illegal
access to movies, series, and music.
4. Always be aware of fake news and avoid making it.
Fake news continues to invade our timeline in any given network, and it
is relevant to talk about it. Users should always identify the credibility of the
source and avoid sharing it as much as possible.

5. Apply the good manners and values you have learned in general.
Maintaining proper online behavior is essential for fostering a positive
online community. Simple acts of respect and kindness contribute to a
better online environment.
6. Political correctness should be observed as a standard for social norms.
Remember that online users come from diverse backgrounds, with varying races, cultures, and
traditions. Exercise sensitivity online, avoiding unethical behaviors like racism, sexism,
homophobia, and more.

7. Use proper avatar, as well as proper name, when creating an account.


Billions of account can be found in the internet alone that is why creating a proper picture in
your account and accurate name should be used in order to avoid confusion. This process shall be
applied to avoid stalking account fake accounts, catfishing, phishing and others.

8. Think before you click.


Selecting words carefully in online posts and private messages is crucial to prevent any
potential harm. Being mindful of every word used is a golden rule to avoid engaging in immoral
actions online.
ETHICAL DILEMMAS ON THE
WEB
The global ethical Internet issues
considered are Internet free speech, the
regulation of websites with global
presence, and the role of the Internet in
facilitating globalization.
DILEMMA
A situation where deciding between two outcomes is
challenging due to a predictable impact on specific
conditions is termed a dilemma. In the context of web
development, a dilemma can negatively affect website
performance, encompassing issues and influences.
A “dilemma” refers to a situation in which a
person is faced with two equally undesirable
choices or a choice between two conflicting
alternatives. It often involves a difficult decision or a
challenging problem with no easy solution.
From the experience of the past years, the professionals for web
have established and settled upon overall moral values and a lot of
professions inherited from the other. Below are the following examples of
right conduct for web specialists

1. Sending spam or unwanted e-mail is not allowed.

2. Spreading malicious code of program by means of worms or viruses is


strictly prohibited.

3. Passing messages along chain e-mail, particularly to those


people that indicate extortions
SPAM
Spam is unwanted email sent without
consent. It poses risks and is used for
deception and financial gain. Millions of such
messages are sent daily, impacting users
globally.
SOCIAL MEDIA EXPERT SPAM
This spam involves social media scammers
persuading individuals to deposit money into their
accounts. Once convinced, they may take the money,
posing as legitimate workers while cashing checks
without the victim’s knowledge.
LUCKY WINNER SPAM
In this message, the sender is trying to fool you
that you are so lucky that you have won on
something that even you yourself didn’t know 3 how
this thing happened to you, and where this thing
came from.
ONLINE SAFETY AND
SECURITY
ONLINE SAFETY ONLINE
Safety involves being cautious and protecting yourself
while using the internet. This includes safeguarding personal
information, using strong and unique passwords, being wary of
phishing attempts, and avoiding sharing sensitive details online.
Staying informed about potential risks and practicing
responsible online behavior contributes to a safer digital
experience.
ONLINE SECURITY
Focuses on protecting digital assets and data from
unauthorized access, cyber threats, and malicious activities. It
involves measures such as using strong passwords,
implementing two factor authentication, keeping software
updated, and being vigilant against phishing and malware.
Prioritizing online security helps safeguard personal and
sensitive information in the digital space.
RESEARCHES AND ORGANIZATION OF
ONLINE
ETIQUETTES
Having good online etiquette is vital for internet
users. It involves behaving responsibly and respectfully in
the digital space. Various organizations and research
offer guidelines to help people navigate the internet with
proper behavior and ethics in computer and
communication.
1. The Centre for Computing and Social Responsibility.
Based at De Montfort University in Leicester, UK, focuses on the
intersection of ethics and evolving technologies. The institute aims to provide
support through education, consultation, and advice, working towards enhancing
the societal impacts of computing and everyday technologies on citizens.

2. The Emily Post Institute’s Communication and Technology


Section offers a diverse collection of online articles guiding netizens on
proper etiquette in online behavior. It emphasizes how individuals should interact
politely with the community when using mobile devices and technology acts of
computing and everyday technologies on citizens.
3. The Stanford Encyclopedia of Philosophy’s Computer and Information Ethics
Section offers valuable links on computer ethics online. It covers various fields like
entertainment,
e-commerce, medical careers, and online security, providing useful information for online
citizens.

4. The CONTU (National Commission on New Technology Uses of Copyrighted Works)


Article, initiated by Congress, emphasizes the significance of copyright laws for
everyday online users. It raises awareness about database protection and various online
information sources, including the role of photocopiers.

5. The “Technology and Ethics” section of Computer Professionals for Social Responsibility
Gives clear guidelines for ethical behavior among professional computer users. The
website includes links with updates on news and relevant technological issues, emphasizing
the importance of responsibility.
10 ADVICE TO STAY SAFE
ONLINE
1. Create complex and unpredictable passwords.
2. Network Security
3. Using a Firewall
4. Think Before You Click
5. Selective Sharing
6. Protecting your Mobile Life
7. Safe Shopping and Surfing
8. Update
9. Keep a lookout
10. Guard up
RESEARCH AND ORGANIZATION
OF ONLINE ETIQUETTES
Online etiquettes is considered one of the most important
things that online users are supposed to have when having full
access to the internet. Because of its relevance, organizations
found in the world-wide-web and researches related to it are
provided for the people to have guides on proper behavior,
discipline and responsibility for computer and communication
ethics.
HERE ARE SOME OF THE FOLLOWING:

1. Center for computing and social responsibility


A research institute found in De Montfort University in Leicester UK
that specializes the importance of ethics and the continuous
emergence of technologies. The goal of the institute is to give
assistance to teaching, consulting and advising to people in need, as
well as improving the impacts to citizens who are influenced by
computing and everyday technologies in the society.
2. Communication and technology (Emily Post Institute)
Netizens are provided a variety collection of online article with regards to proper
etiquette related to the behavior done online. This website conceptualizes how one
should interact with the community when using mobile devices in order to remain
polite while using technology.

3. Computer and information ethics (Stanford Encyclopedia of Philosophy).


An encyclopedic section that provides link regarding computer ethics online and
contains several information that would benefits the online reader. With the application
of the information and communication technology in any field such as the industry of
entertainment, e-commerce, medical careers, online security and such, the
encyclopedia provides relation of information and computer ethics that the online
citizen can use.

You might also like