3. By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
Cybercrimes
It is the Characteristics of the culture of computers,
information, technology and virtual reality.
• Cybercrime is defined as a crime in which a computer
is the object of the crime (hacking, phishing,
spamming and child pornography) is used as a tool to
commit an offense.
• Cybercriminals may use computer technology to
access personal information, business trade secrets or
use the internet for exploitative or malicious
purposes.
What is Cyber?
Republic Act No. 10175 Cybercrime Prevention Act of
2012
a law in the Philippines approved on September 12,2012
which aims to address legal issues concerning online
interactions and internet.
Republic Act No. 10173 Data Privacy Act of 2012 I
An act protecting individual personal information.
4. By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
Common Forms Of Cybercrimes
a. Copyright
The exclusive legal right, given to an originator or an
assignee to print, publish, perform, film, or record
literary, artistic, or musical material, and to authorize
others to do the same.
Copyright infringement is the violation, piracy or theft of
a copyright holder's exclusive rights through the
unauthorized use of a copyrighted material or work.
b. Plagiarism
An act or instance of using or closely imitating the
language and thoughts of another author without
authorization.
c. Computer Addiction
• Offline: generally used when speaking about
excessive gaming behavior, which can be practiced
both offline and online.
• Online: Also known as “Internet Addiction”, gets more
attention in general from scientific research than
offline computer addiction, mainly because most
cases of computer addiction are related to the
excessive use of the Internet.
• Virtual Self – The persona you create about
yourself virtually.
4
5. By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
Attackers
• Hackers – computer hobbyist who enjoy pushing
computer system to their limits
• Crackers – obsessed with gaining entry to highly
secure computer systems
• Cyber Gang – bring crackers together by means of the
internet and physical meetings.
• Computer virus Author – Makers of Computer Viruses
• Disgruntled Employees – Kick out employees
• Fraud Artist – Swindlers & Shills
5
6. By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era 6
Criminal Activities
• Unauthorized access of or interference with
computer systems, servers, or other information and
communication systems
• Unauthorized access to corrupt, alter, steal, or
destroy electronic data using computers or other
information and communication systems without the
computer or system owner’s knowledge and consent.
• The introduction of computer viruses resulting in the
corruption, alteration, theft, or loss of such data
• Illegal Access
• Illegal Interception
• Data Interference
a. Hacking
• System Interference
• Misuse of Devices
• Infection of IT Systems with Malware – if the act is
committed against critical infrastructure of the
Philippines the, penalty is between 12-20 years
reclusion temporal
• Six years up to twelve years of imprisonment also
known as prison mayor.
7. By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
Types of Hackers
White Hat Hackers
White Hat hackers are also known as Ethical Hackers.
They are never intent to harm a system, rather they try
to find out weaknesses in a computer or a network
system as a part of penetration testing and vulnerability
assessments.
Black Hat Hackers
Black Hat hackers, also known as crackers, are those who
hack to gain unauthorized access to a system and harm
its operations or steal sensitive information.
Black Hat hacking is always illegal because of its bad
intent which includes stealing corporate data, violating
privacy, damaging the system, blocking network
communication, etc.
Grey Hat Hackers
Grey hat hackers are a blend of both black hat and white
hat hackers. They act without malicious intent but for
their fun, they exploit a security weakness in a computer
system or network without the owner’s permission or
knowledge.
Their intent is to bring the weakness to the attention of
the owners and getting appreciation or a little bounty
from the owners.
Miscellaneous Hackers
Apart from the above well-known classes of hackers, we
have the following categories of hackers based on what
they hack and how they do it.
7
8. By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
Types of Hackers
Red Hat Hackers
Red hat hackers are again a blend of both black hat and
white hat hackers. They are usually on the level of
hacking government agencies, top-secret information
hubs, and generally anything that falls under the
category of sensitive information.
Blue Hat Hackers
A blue hat hacker is someone outside computer security
consulting firms who is used to bug-test a system prior
to its launch. They look for loopholes that can be
exploited and try to close these gaps. Microsoft also uses
the term Blue Hat to represent a series of security
briefing events.
Elite Hackers
This is a social status among hackers, which is used to
describe the most skilled. Newly discovered exploits will
circulate among these hackers.
Script Kiddie
A script kiddie is a non-expert who breaks into computer
systems by using pre-packaged automated tools written
by others, usually with little understanding of the
underlying concept, hence the term Kiddie.
Neophyte
A neophyte, "n00b", or "newbie" or "Green Hat Hacker"
is new to hacking or phreaking and has almost no
knowledge or experience of the workings of technology
and hacking.
8
9. By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era 9
Criminal Activities
• An attempt to obtain sensitive information such as
usernames, passwords, and credit card details and
(indirectly money), often for malicious reasons.
• Phishing
• Pharming
• Spam
• Maximum of Php 200,000 fine or prison mayor
b. Computer-related forgery, fraud and/or identity theft
• Illegal Downloading
• Obtaining files that you do not have the right to use
from the internet.
• Digital Piracy
• Practice of illegally copying and selling digital music,
video, computer software, etc.
• Copyright Infringement
• Penalty of Php 50,000 – 500, 000 and or prison mayor
c. Electronic theft
10. By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era 10
Criminal Activities
• The use of electronic communication to bully a
person, typically by sending a message of an
intimidating or threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)
d. Cyberbullying
• Willful engagement, maintenance, control, or
operation, directly or indirectly of any lascivious
exhibition of sexual organs or sexual activity with the
aid of a computer system for favor or consideration.
• There is a discussion on this matter if it involves
“couples” or “people in relationship” who engage in
cybersex.
• Penalty at least Php 200,000 and or prison mayor
e. Cybersex
11. By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era 11
Criminal Activities
• Is a form of child sexual exploitation.
• Polytechnic University of the Philippines
• Unlawful or prohibited acts defined and punishable
by Republic Act No. 9775 or the Anti-
• Child Pornography Act of 2009, committed through a
computer system.
• Penalty of 12-20 years of imprisonment or reclusion
temporal
f. Child Pornography
• Is an unprivileged false statement of fact which tends
to harm the reputation of a person or company.
• Penalty of 6-12 years of imprisonment or prison
mayor.
g. Cyber Defamation