Characteristicsofthecultureofcomputer, information, technology and virtual reality
Denotes a relationship with information technology
Anythingrelatingtocomputing such as the internet
Cybercrime
Criminal activity that involves computer, and network
Defined as a crime in which a computer is the object of the crime
Cybercrime offenses
Hacking
Phishing
Spamming
Child pornography
Cybercriminals
They may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes
Republic Act No. 10175
Cybercrime Prevention Act of 2012
A law in the Philippines that was being approved on September 12,2012 which aims to address legal issues concerning online interactions and internet
Signed by President Benigno Aquino III
Republic Act No. 10173
Data Privacy Act of 2012
An act that protects the individual personal information
National Privacy Commission (NPC)
Implemented the Data Privacy Act of 2012
Monitor and ensure compliance of the country with international standards set for data protection
3 common forms of cybercrime
Copyright
Plagiarism
Computer addiction
Copyright
The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same
Copyright infringement - violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work
Plagiarism
An act or instance of using or closely imitating the language and thoughts of another author without authorization
3 types of computer addiction
Offline
Online
Virtual self
Offline computer addiction
Generally used when speaking about excessive gaming behavior, which can be practiced both offline and online
Online computer addiction
Also known as "Internet Addiction", gets more attention in general from scientific research than offline computer addiction, mainly because the excessive use of the Internet
Virtual self
The persona you create about yourself virtually
7 common criminal activities
Hacking
Electronic theft
Forgery, fraud/identity theft
Cyberbullying
Cybersex
Child pornography
Cyber defamation
Hacking
Unauthorized access of or interference with computer systems, servers, or other information and communication system
Illegal access
Illegal interception
Data interference
System interference
Misuse of devices
Penalty of 6 years to 12 years of imprisonment
Forgery, fraud/identity theft
An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons
Phishing
Pharming
Spam
Maximum penalty of Php 200,000 fine or prison mayor
Electronic theft
Illegal downloading
Obtaining files that you do not have the right to use from the internet
Digital piracy - practice of illegally copying and selling digital music, video, computer software, etc.
Copyright infringement
Penalty of Php 50,000 - 500,000 and or prison mayor
Cyberbullying
The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature
The Anti-Bullying Act of 2013 (RA 10627) signed by President Benigno Aquino III
Cybersex
Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration
There is a discussion on this matter if it involves "couples" or "people in relationship" who engage in cybersex
Penalty of at least Php 200,000 and or prison mayor
Child pornography
A form of child sexual exploitation
Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti Child Pornography Act of 2009, committed through a computer system
Penalty of 12-20 years of imprisonment
Cyber defamation
An unprivileged false statement of fact which tends to harm the reputation of a person or company
Penalty of 6-12 years of imprisonment or prison mayor
Hacking
It is a term used to describe actions taken by someone to gain unauthorized access to a computer
Hacking
Find weaknesses (or pre-existing bugs) in your security settings and exploit them in order to access your information
Install a Trojan horse, providing a back door for hackers to enter and search for your information
Malware
Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware
Malware
Intimidate you with scareware, which is usually a pop-up message that tells you your computer has a security problem or other false information
Reformat the hard drive of your computer causing you to lose all your information
Alter or delete files, Steal sensitive information, Send emails on your behalf, Take control of your computer and all the software running on it
Pharming
It is a common type of online fraud. Malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website
Pharming
Convince you that the site is real and legitimate by spoofing or looking almost identical to the actual site down to the smallest details. You may enter your personal information and unknowingly give it to someone with malicious intent.
Phishing
Fake emails, text messages and websites created to look like they're from authentic companies. They're sent by criminals to steal personal and financial information from you. This is also known as "spoofing"
Phishing
Trick you into giving them information by asking you to update, validate or confirm your account. It is often presented in a manner than seems official and intimidating, to encourage you to take action
Provides cyber criminals with your username and passwords so that they can access your accounts (your online bank account, shopping accounts, etc.) and steal your credit card numbers
Ransomware
It is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.
Ransomware
Lockscreen ransomware: displays an image that prevents you from accessing your computer
Encryption ransomware: encrypts files on your system's hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them
The two most common means of infection appear to be phishing emails that contain malicious attachments and website pop-up advertisements
It will display a notification stating that your computer or data have been locked and demanding a payment be made for you to regain access. Sometimes the notification states that authorities have detected illegal activity on your computer, and that the payment is a fine to avoid prosecution.
Do not pay the ransom. These threats are meant to scare and intimidate you, and they do not come from a law enforcement agency.
In order to lessen the impact of a ransomware infection, be sure to regularly back-up your data with a removable external storage drive
If your computer has been infected (i.e. you are unable to access your computer or your files have been encrypted), contact a reputable computer technician or specialist to find out whether your computer can be repaired and your data retrieved
Spam
The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs
Spam
Annoy you with unwanted junk mail
Create a burden for communications service providers and businesses to filter electronic messages
Phish for your information by tricking you into following links or entering details with too-good to-be-true offers and promotions
Provide a vehicle for malware, scams, fraud and threats to your privacy
Spyware
Software that collects personal information about you without you knowing. They often come in the form of a 'free' download and are installed automatically with or without your consent. These are difficult to remove and can infect your computer with viruses