SlideShare a Scribd company logo
1 of 12
President Ramon Magsaysay State University Computer Engineering Department
Living in the
Information Technology
Era
Lesson 5
Cybercrimes
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
Cybercrimes
It is the Characteristics of the culture of computers,
information, technology and virtual reality.
• Cybercrime is defined as a crime in which a computer
is the object of the crime (hacking, phishing,
spamming and child pornography) is used as a tool to
commit an offense.
• Cybercriminals may use computer technology to
access personal information, business trade secrets or
use the internet for exploitative or malicious
purposes.
What is Cyber?
Republic Act No. 10175 Cybercrime Prevention Act of
2012
a law in the Philippines approved on September 12,2012
which aims to address legal issues concerning online
interactions and internet.
Republic Act No. 10173 Data Privacy Act of 2012 I
An act protecting individual personal information.
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
Common Forms Of Cybercrimes
a. Copyright
The exclusive legal right, given to an originator or an
assignee to print, publish, perform, film, or record
literary, artistic, or musical material, and to authorize
others to do the same.
Copyright infringement is the violation, piracy or theft of
a copyright holder's exclusive rights through the
unauthorized use of a copyrighted material or work.
b. Plagiarism
An act or instance of using or closely imitating the
language and thoughts of another author without
authorization.
c. Computer Addiction
• Offline: generally used when speaking about
excessive gaming behavior, which can be practiced
both offline and online.
• Online: Also known as “Internet Addiction”, gets more
attention in general from scientific research than
offline computer addiction, mainly because most
cases of computer addiction are related to the
excessive use of the Internet.
• Virtual Self – The persona you create about
yourself virtually.
4
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
Attackers
• Hackers – computer hobbyist who enjoy pushing
computer system to their limits
• Crackers – obsessed with gaining entry to highly
secure computer systems
• Cyber Gang – bring crackers together by means of the
internet and physical meetings.
• Computer virus Author – Makers of Computer Viruses
• Disgruntled Employees – Kick out employees
• Fraud Artist – Swindlers & Shills
5
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era 6
Criminal Activities
• Unauthorized access of or interference with
computer systems, servers, or other information and
communication systems
• Unauthorized access to corrupt, alter, steal, or
destroy electronic data using computers or other
information and communication systems without the
computer or system owner’s knowledge and consent.
• The introduction of computer viruses resulting in the
corruption, alteration, theft, or loss of such data
• Illegal Access
• Illegal Interception
• Data Interference
a. Hacking
• System Interference
• Misuse of Devices
• Infection of IT Systems with Malware – if the act is
committed against critical infrastructure of the
Philippines the, penalty is between 12-20 years
reclusion temporal
• Six years up to twelve years of imprisonment also
known as prison mayor.
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
Types of Hackers
White Hat Hackers
White Hat hackers are also known as Ethical Hackers.
They are never intent to harm a system, rather they try
to find out weaknesses in a computer or a network
system as a part of penetration testing and vulnerability
assessments.
Black Hat Hackers
Black Hat hackers, also known as crackers, are those who
hack to gain unauthorized access to a system and harm
its operations or steal sensitive information.
Black Hat hacking is always illegal because of its bad
intent which includes stealing corporate data, violating
privacy, damaging the system, blocking network
communication, etc.
Grey Hat Hackers
Grey hat hackers are a blend of both black hat and white
hat hackers. They act without malicious intent but for
their fun, they exploit a security weakness in a computer
system or network without the owner’s permission or
knowledge.
Their intent is to bring the weakness to the attention of
the owners and getting appreciation or a little bounty
from the owners.
Miscellaneous Hackers
Apart from the above well-known classes of hackers, we
have the following categories of hackers based on what
they hack and how they do it.
7
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
Types of Hackers
Red Hat Hackers
Red hat hackers are again a blend of both black hat and
white hat hackers. They are usually on the level of
hacking government agencies, top-secret information
hubs, and generally anything that falls under the
category of sensitive information.
Blue Hat Hackers
A blue hat hacker is someone outside computer security
consulting firms who is used to bug-test a system prior
to its launch. They look for loopholes that can be
exploited and try to close these gaps. Microsoft also uses
the term Blue Hat to represent a series of security
briefing events.
Elite Hackers
This is a social status among hackers, which is used to
describe the most skilled. Newly discovered exploits will
circulate among these hackers.
Script Kiddie
A script kiddie is a non-expert who breaks into computer
systems by using pre-packaged automated tools written
by others, usually with little understanding of the
underlying concept, hence the term Kiddie.
Neophyte
A neophyte, "n00b", or "newbie" or "Green Hat Hacker"
is new to hacking or phreaking and has almost no
knowledge or experience of the workings of technology
and hacking.
8
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era 9
Criminal Activities
• An attempt to obtain sensitive information such as
usernames, passwords, and credit card details and
(indirectly money), often for malicious reasons.
• Phishing
• Pharming
• Spam
• Maximum of Php 200,000 fine or prison mayor
b. Computer-related forgery, fraud and/or identity theft
• Illegal Downloading
• Obtaining files that you do not have the right to use
from the internet.
• Digital Piracy
• Practice of illegally copying and selling digital music,
video, computer software, etc.
• Copyright Infringement
• Penalty of Php 50,000 – 500, 000 and or prison mayor
c. Electronic theft
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era 10
Criminal Activities
• The use of electronic communication to bully a
person, typically by sending a message of an
intimidating or threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)
d. Cyberbullying
• Willful engagement, maintenance, control, or
operation, directly or indirectly of any lascivious
exhibition of sexual organs or sexual activity with the
aid of a computer system for favor or consideration.
• There is a discussion on this matter if it involves
“couples” or “people in relationship” who engage in
cybersex.
• Penalty at least Php 200,000 and or prison mayor
e. Cybersex
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era 11
Criminal Activities
• Is a form of child sexual exploitation.
• Polytechnic University of the Philippines
• Unlawful or prohibited acts defined and punishable
by Republic Act No. 9775 or the Anti-
• Child Pornography Act of 2009, committed through a
computer system.
• Penalty of 12-20 years of imprisonment or reclusion
temporal
f. Child Pornography
• Is an unprivileged false statement of fact which tends
to harm the reputation of a person or company.
• Penalty of 6-12 years of imprisonment or prison
mayor.
g. Cyber Defamation
End of Lesson 5
12
Any Questions?

More Related Content

What's hot

Living in the IT Era L1.pptx
Living in the IT Era L1.pptxLiving in the IT Era L1.pptx
Living in the IT Era L1.pptxRammel1
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethicssmartinson
 
Living in the IT Era - Lesson 7.pptx
Living in the IT Era - Lesson 7.pptxLiving in the IT Era - Lesson 7.pptx
Living in the IT Era - Lesson 7.pptxFroilan Cantillo
 
Internet and World Wide Web
Internet and World Wide WebInternet and World Wide Web
Internet and World Wide WebSamudin Kassan
 
Living in the IT Era - Lesson 8.pptx
Living in the IT Era - Lesson 8.pptxLiving in the IT Era - Lesson 8.pptx
Living in the IT Era - Lesson 8.pptxFroilan Cantillo
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette JessamenTino21
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and InternetJanecatalla
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipJohan Koren
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 
Lesson 1-TTL 1.pptx
Lesson 1-TTL 1.pptxLesson 1-TTL 1.pptx
Lesson 1-TTL 1.pptxIMNOTDRACULA
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Evolution of Ict Final
Evolution of Ict FinalEvolution of Ict Final
Evolution of Ict FinalDavid G. Booc
 
STS Chapter III Lesson 1.pptx
STS Chapter III Lesson 1.pptxSTS Chapter III Lesson 1.pptx
STS Chapter III Lesson 1.pptxslashGolder
 

What's hot (20)

Living in the IT Era L1.pptx
Living in the IT Era L1.pptxLiving in the IT Era L1.pptx
Living in the IT Era L1.pptx
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethics
 
Living in the IT Era - Lesson 7.pptx
Living in the IT Era - Lesson 7.pptxLiving in the IT Era - Lesson 7.pptx
Living in the IT Era - Lesson 7.pptx
 
Internet and World Wide Web
Internet and World Wide WebInternet and World Wide Web
Internet and World Wide Web
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
INTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTEINTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTE
 
Living in the IT Era - Lesson 8.pptx
Living in the IT Era - Lesson 8.pptxLiving in the IT Era - Lesson 8.pptx
Living in the IT Era - Lesson 8.pptx
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and Internet
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Lesson 1-TTL 1.pptx
Lesson 1-TTL 1.pptxLesson 1-TTL 1.pptx
Lesson 1-TTL 1.pptx
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Evolution of Ict Final
Evolution of Ict FinalEvolution of Ict Final
Evolution of Ict Final
 
STS Chapter III Lesson 1.pptx
STS Chapter III Lesson 1.pptxSTS Chapter III Lesson 1.pptx
STS Chapter III Lesson 1.pptx
 
Introduction to ICT
Introduction to ICTIntroduction to ICT
Introduction to ICT
 

Similar to Living in the IT Era - Lesson 5.pptx

International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxchrixymae
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeDivithC
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human rightAgustina
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber CrimeSyangba132
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Solomon Oho
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptxMouradAKenk
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyDee Green
 

Similar to Living in the IT Era - Lesson 5.pptx (20)

What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptx
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copy
 
Hacking
HackingHacking
Hacking
 

Recently uploaded

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 

Living in the IT Era - Lesson 5.pptx

  • 1. President Ramon Magsaysay State University Computer Engineering Department Living in the Information Technology Era
  • 3. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era Cybercrimes It is the Characteristics of the culture of computers, information, technology and virtual reality. • Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense. • Cybercriminals may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes. What is Cyber? Republic Act No. 10175 Cybercrime Prevention Act of 2012 a law in the Philippines approved on September 12,2012 which aims to address legal issues concerning online interactions and internet. Republic Act No. 10173 Data Privacy Act of 2012 I An act protecting individual personal information.
  • 4. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era Common Forms Of Cybercrimes a. Copyright The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same. Copyright infringement is the violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work. b. Plagiarism An act or instance of using or closely imitating the language and thoughts of another author without authorization. c. Computer Addiction • Offline: generally used when speaking about excessive gaming behavior, which can be practiced both offline and online. • Online: Also known as “Internet Addiction”, gets more attention in general from scientific research than offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the Internet. • Virtual Self – The persona you create about yourself virtually. 4
  • 5. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era Attackers • Hackers – computer hobbyist who enjoy pushing computer system to their limits • Crackers – obsessed with gaining entry to highly secure computer systems • Cyber Gang – bring crackers together by means of the internet and physical meetings. • Computer virus Author – Makers of Computer Viruses • Disgruntled Employees – Kick out employees • Fraud Artist – Swindlers & Shills 5
  • 6. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era 6 Criminal Activities • Unauthorized access of or interference with computer systems, servers, or other information and communication systems • Unauthorized access to corrupt, alter, steal, or destroy electronic data using computers or other information and communication systems without the computer or system owner’s knowledge and consent. • The introduction of computer viruses resulting in the corruption, alteration, theft, or loss of such data • Illegal Access • Illegal Interception • Data Interference a. Hacking • System Interference • Misuse of Devices • Infection of IT Systems with Malware – if the act is committed against critical infrastructure of the Philippines the, penalty is between 12-20 years reclusion temporal • Six years up to twelve years of imprisonment also known as prison mayor.
  • 7. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era Types of Hackers White Hat Hackers White Hat hackers are also known as Ethical Hackers. They are never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments. Black Hat Hackers Black Hat hackers, also known as crackers, are those who hack to gain unauthorized access to a system and harm its operations or steal sensitive information. Black Hat hacking is always illegal because of its bad intent which includes stealing corporate data, violating privacy, damaging the system, blocking network communication, etc. Grey Hat Hackers Grey hat hackers are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge. Their intent is to bring the weakness to the attention of the owners and getting appreciation or a little bounty from the owners. Miscellaneous Hackers Apart from the above well-known classes of hackers, we have the following categories of hackers based on what they hack and how they do it. 7
  • 8. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era Types of Hackers Red Hat Hackers Red hat hackers are again a blend of both black hat and white hat hackers. They are usually on the level of hacking government agencies, top-secret information hubs, and generally anything that falls under the category of sensitive information. Blue Hat Hackers A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also uses the term Blue Hat to represent a series of security briefing events. Elite Hackers This is a social status among hackers, which is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. Script Kiddie A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept, hence the term Kiddie. Neophyte A neophyte, "n00b", or "newbie" or "Green Hat Hacker" is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking. 8
  • 9. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era 9 Criminal Activities • An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons. • Phishing • Pharming • Spam • Maximum of Php 200,000 fine or prison mayor b. Computer-related forgery, fraud and/or identity theft • Illegal Downloading • Obtaining files that you do not have the right to use from the internet. • Digital Piracy • Practice of illegally copying and selling digital music, video, computer software, etc. • Copyright Infringement • Penalty of Php 50,000 – 500, 000 and or prison mayor c. Electronic theft
  • 10. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era 10 Criminal Activities • The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature. • The Anti-Bullying Act of 2013 (RA 10627) d. Cyberbullying • Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration. • There is a discussion on this matter if it involves “couples” or “people in relationship” who engage in cybersex. • Penalty at least Php 200,000 and or prison mayor e. Cybersex
  • 11. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era 11 Criminal Activities • Is a form of child sexual exploitation. • Polytechnic University of the Philippines • Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti- • Child Pornography Act of 2009, committed through a computer system. • Penalty of 12-20 years of imprisonment or reclusion temporal f. Child Pornography • Is an unprivileged false statement of fact which tends to harm the reputation of a person or company. • Penalty of 6-12 years of imprisonment or prison mayor. g. Cyber Defamation
  • 12. End of Lesson 5 12 Any Questions?