2. Hello!
I’m Joseph, Paul, Jerot, JM & Lennard!
We are here because we will report the topic about Online
Safety & Security
2
3. Introduction
Each individual when accessing the
World Wide Web is concerned with the safety
of his or her terminal or computer and the
information that will be transmitted or
received.
Every organisation relies on the
internet to some degree or another for
communications, transactions, payments and
data access. Unfortunately, however, the
internet has also become a channel of choice
for criminals to commit financial and other
crimes. Your organisation must take
precautions to protect itself.
3
5. “▫ Refers to the transmission of
unsolicited messages from
various origins using electronic
messaging systems such as e-
mail and chat messengers
▫ A tool for advertisement
▫ Unsolicited bulk e-mail (UBE)
5
8. “▫ Defined as a software or a
program used by an attacker to
obtain personal information
▫ Commonly target user passwords
to hack and take control of a user
account
8
11. “▫ Short term for malicious software
▫ A computer software sent by
attackers to inflict chaos on a
computer’s operation and
processes
11
12. How to avoid these
threats?
There are provisions & laws that our country
implements to avoid these threats.
12
13. The Philippine government ensures the welfare
of its people in their ICT experience by enacting
various laws and regulations. There are incidents
of theft, scam, phishing and other activities that
victimize Filipino people.
13
14. What is Bullying?
Defined as “severe or repeated
use by one or more students of a
written, verbal or electronic
expression, or a physical gesture, or
any combination thereof, directed to
another student that has the effect of
actually causing or placing the latter
in reasonable fear of physical or
emotional harm or damage to his
property.”
Republic
Act 10627
or Anti-
Bullying
Act of
2013
14
15. This law includes protection of individuals from
bullying through electronic means. Bullying
invades an individual’s privacy by using photos
and other information meant to disgrace that
individual.
15
17. Acquisition of passwords and other vital
information from an individual • Computer
forgery • Libel
17
Cybercime offenses
include, but are not limited
to: • Integrity and
availability of data • Illegal
access of computers
through remote means
without permission •
Interception of one’s
information from a private
conversation or
correspondence •
19. Credits
Special thanks to these articles and links
▫ https://www.slideshare.net/ArahLouiseApostol19/online-safety-and-security
▫ https://usa.kaspersky.com/resource-center/preemptive-safety/top-10-internet-safety-rules-and-what-not-to-do-
online
▫ https://www.getsafeonline.org/online-safety-and-security/
19