Final - Social Issue

Subdecks (1)

Cards (97)

  • Internet use in the Philippines has grown rapidly in the past decade. It has given rise to countless opportunities to a lot of Filipinos in every field imaginable. It has been an integral part of our daily lives.
  • The internet has its own disadvantages and one of these is cybercrime.
  • Cybercrime is defined as any illegal and criminal activity committed in the internet. It includes unlawful acts where information technology is used either a tool or target, or both, in the commission of such unlawful acts.
  • Criminal activities in the cyberspace are on the rise. Computers today are often misused for activities like email espionage, credit card fraud, spams, and software piracy which not only invade our privacy but also offend our senses
  • On many instances, computers have been utilized as an instrument in the following illegal activities: financial crime, sale of illegal or stolen articles, pornography, online gambling, crimes impinging on intellectual property rights, e-mail spoofing, forgery, cyber defamation, and even cyber stalking.
  • Malware, short for "malicious software," refers to any software intentionally designed to cause damage to a computer, server, client, or computer network
  • The term encompasses a wide variety of harmful software types, including viruses, worms, trojan horses, ransomware, spyware, adware, and scareware
  • A computer virus is a type of malware that attaches to another program (like a document), which can replicate and spread after a person first runs it on their system
  • Viruses are harmful and can destroy data, slow down system resources, and log keystrokes.
  • Viruses can’t spread without some sort of action from a user, like opening up an infected Word document.
  • Cybercriminals aren’t creating new viruses all the time, instead they focus their efforts on more sophisticated and lucrative threats
  • Trojans can be viruses. A Trojan is a computer program pretending to be something it’s not for the purposes of sneaking onto your computer and delivering some sort of malware
  • To put it another way, if a virus disguises itself then it’s a Trojan.
  • A Trojan could be a seemingly benign file downloaded off the web or a Word doc attached to an email.
  • Think that movie you downloaded from your favorite P2P sharing site is safe? What about that “important” tax document from your accountant? Think twice, because they could contain a virus.
  • Worms are not viruses, though the terms are sometimes used interchangeably
  • A worm, conversely, doesn’t need a host system and is capable of spreading across a network and any systems connected to the network without user action.
  • Once on a system, worms are known to drop malware (often ransomware) or open a backdoor
  • Software bugs are not viruses
  • Even though we sometimes refer to a biological virus as a “bug” (e.g. “I caught a stomach bug”), software bugs and viruses are not the same thing.
  • A software bug refers to a flaw or mistake in the computer code that a given software program is made up of.
  • Software bugs can cause programs to behave in ways the software manufacturer never intended.
  • ILOVEYOU, sometimes referred to as Love Letter, was a computer worm that attacked tens of millions of Windows personal computers on and after May 5, 2000, when it started spreading as an e-mail message with the subject line “ILOVEYOU” and the attachment “LOVE-LETTER-FOR-YOU.txt.vbs
  • Opening the attachment activates the Visual Basic Script. The worm did damage on the local machine, overwriting images files, and sent a copy of it to all address. It cause the loss of every JPEG, MP3, AVI, text and document files and certain other files on the recipients virus
  • Police in the Philippines tracked the worm to a 23- year-old computer student, Onel de Guzman of Manila.
  • There was a cyber-disaster as the “LOVE bug struck the world in the early part of 2000. It has caused $10 billion in losses in as many as 20 countries. Surprisingly, it was a Filipino student who was the main suspect as the author of the I LOVE YOU Virus.
  • De Guzman, who was poor and struggling to pay for Internet access at the time, created the computer worm intending to steal other users' passwords, which he could use to log in to their Internet accounts without needing to pay for the service. He justified his actions on his belief that Internet access is a human right and that he was not actually stealing
  • Six week after the attack, the Congress quickly enacted The Electronic Commerce Act of 2000 or Republic Act 8792 which was signed into law on June 14, 2000.
  • RA 8792 focuses on electronic evidence and common online crimes such as hacking and copyright violations. It was enacted in order to provide a legal framework for internet-based services such as e-commerce. It seeks to punish perpetrators of cybercrimes particularly computer hacking, introduction of viruses and piracy of copyrighted works by providing penal sanction thereof.
  • Hacking or cracking
    Unauthorized access into or interference in a computer system/server or information and communication system
  • Hacking or cracking
    refers to unauthorized access into or interference in a computer system/server or information and communication system; or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner
  • Hacking or cracking shall be punished by a minimum fine of one hundred thousand pesos and a maximum commensurate to the damage incurred and a mandatory imprisonment of six months to three years
  • Section 33 of the E-Commerce Act of 2000 reads in part. SEC. 33. Penalties. – The following Acts shall be penalized by fine and/or imprisonment, as follows: a) Hacking or cracking
  • WHY OTHER COUNTRIES CANNOT PROSECUTE THE AUTHOR OF ILOVEYOU VIRUS?
    It is because of the nature of “PENAL” statues, which is governed by the” TERRITORIALITY” principle which means that the law of the place where the crime is committed shall be applicable in the administration of justice
  • The enactment of E-Commerce law is of no moment as far as the author of the love bug is concerned because the penal law cannot have a retroactive effect, unless it is favorable to the accused

  • HOW CAN WE PROTECT OURSELVES?
    1. Install antivirus or anti-malware software
    2. Keep your antivirus software up to date
    3. Run antivirus scans regularly
    4. Keep your operating system up to date
    5. Protect your network
  • HOW CAN WE PROTECT OURSELVES?
    1. Think before you click
    2. Keep your personal information secure
    3. Don’t use unsecured Wi-Fi
    4. Back up your files
    5. Use several secure passwords
  • When criminals use fake emails, social media posts or direct messages with the goal of luring you to click on a bad link or download a malicious attachment. If you click on a phishing link or file, you can hand over your personal information to the cybercriminals.

    PHISHING
  • A phishing scheme can also install malware onto your device.
  • Too Good To Be True - Lucrative offers and eye-catching or attention-grabbing statements are designed to attract people’s attention immediately. For instance, many claim that you have won an iPhone, a lottery, or some other lavish prize. Just don't click on any suspicious emails. Remember that if it seems to good to be true, it probably is!