2. In various aspects, ICT and technology as a whole
brought us comfort and convenience in life. We, as
Filipinos, have been known to be avid users of technology.
Some even have made a name as an Internet sensation.
However, aside from those successes are the downfalls of
users.
3. Be honest with yourself, you have your share of “bad things”
or any unwarranted acts (like piracy) you have done using ICT.
Ask yourself why you did them..
4. Walking on a sidewalk does not pose danger as opposed to
walking in the middle of the street. Remove the sidewalk and you
are left to dodge approaching vehicles. That is probably how much
of us deal with the Internet. In the Internet, there are no sidewalks;
just a huge superhighway where information freely flows through. If
in the real world we have the police or the military to monitor us,
the Internet is unmonitored making it one of the most abused
technology we use.
6. 10 MOST COMMON INTERNET CYBERCRIMES
1. Phishing/ Spoofing- the act of sending multiple emails to
multiple users in hopes of having a number of them clicking on
the links or malwares attached to the email. Most email services
today have spam or bulk folders that automatically put these
suspicious emails to that folder. However, this is not 100%
accurate that some emails are not filtered and some other
emails that are legitimate end up on the spam folder.
7. 10 MOST COMMON INTERNET CYBERCRIMES
2. Blackmail/ Extortion – the act of using the Internet to threaten
or damage someone’s reputation to extort money or anything
else of value. This can be avoided if you are aware of what you
should post on the Internet. The victims of this act tend to have
posted something “inappropriate” over the Internet even if they
put it at a secured location.
8. 10 MOST COMMON INTERNET CYBERCRIMES
3. Accessing Stored Communication – or hacking; the act of
obtaining unauthorized access to data from a computer
network. This is typically done to commercial and government
sites to threaten its owner. In the late 2014, a group of hackers
hacked Sony’s website because of the impending release of the
controversial film “The Interview.”
9. 10 MOST COMMON INTERNET CYBERCRIMES
4. Sports Betting – the act of wagering on any sports event over
the Internet. In some countries, gambling (including sports
betting) is illegal even if you are doing it over the Internet.
10. 10 MOST COMMON INTERNET CYBERCRIMES
5. Non-Delivery of Merchandise – the act of devising a scheme
wherein a culprit post an item for sale on the Internet and once
the transactions have been done, does not really give the item
or service.
11. 10 MOST COMMON INTERNET CYBERCRIMES
6. Electronic Harassment – the act of anonymously using the
Internet to harass, abuse, threaten, or annoy other people. This
is also an act of cyberbullying, however, because the culprit is
anonymous, it is hard to detect who is bullying you.
12. 10 MOST COMMON INTERNET CYBERCRIMES
7. Child Pornography – the act of using the Internet to show child
pornography. This act is highly punishable by law.
13. 10 MOST COMMON INTERNET CYBERCRIMES
8. Prostitution – the act of using the internet to engage in
prostitution.
14. 10 MOST COMMON INTERNET CYBERCRIMES
9. Drug Trafficking - the act of selling illegal substances using
the Internet.
15. 10 MOST COMMON INTERNET CYBERCRIMES
10.Criminal Copyright Infringement – the act of piracy mainly for
financial gain. In late 2014, the number one pirate website,
ThePirateBay, was raided for the second time due to years of
pirating movies, music, games, books, and other software. These
kinds of websites earn money through advertising.
16. The Internet is the present and the future of your
generation and you define what impact it can do to shape
our society, whether it is negative or positive. The future is
in your hands.
17. COMBATTING CYBERCRIMES
SEVERAL WAYS THAT CAN HELP OR SOLVE CYBERCRIMES:
1. Network Security – Before a hacker can get through the
unauthorized files he or she is targeting, the hacker has to get
through several security measures like firewalls, secure
connections, passwords, anti-malwares, and data encryptions.
Encryption is the process of converting raw data into code.
However, these methods are not 100% secure and there will
always be a way for a hacker to hack.
18. COMBATTING CYBERCRIMES
SEVERAL WAYS THAT CAN HELP OR SOLVE CYBERCRIMES:
2. Investigation – URL tracing and logging are used by websites
to track your unique IP addresses. This can be used by
investigators to trace hackers. In piracy, trackers are used to
identify IP addresses currently sharing a pirated file.
19. COMBATTING CYBERCRIMES
SEVERAL WAYS THAT CAN HELP OR SOLVE CYBERCRIMES:
3. Penalties – More and more laws are being created and
implemented today. Penalties include both fine and
imprisonment.
20. KEY TERMS
Phishing - also referred to as spoofing; an act spamming emails
Spam - unwanted emails
Blackmail - act of asking something in return of not showing
something that could damage someone’s reputation
Hacking - the act of obtaining authorized information
Cyberbullying- an act of harassment using electronic means
Copyright Infringement- an act of piracy mainly for financial gain
Encryption - the process of converting raw data into code
21. SUMMARY
The Internet can sometimes be used for wrong deeds. These cybercrimes
damage not just individuals but the society as a whole.
Cybercrimes can be in the form of the following: phishing or spoofing is an
act of spamming emails; blackmail or extortion is the act of asking something in
return of not showing something that could damage someone’s reputation;
hacking is the act of obtaining authorized information; sports betting is gambling
over sports results; non-delivery of merchandise is faking a sale over the Internet;
electronic harassment is the act of anonymous cyberbullying; child pornography is
the exploitation of the youth; prostitution is the act of using the Internet to engage
in sexual acts; drug trafficking is using the Internet for selling illegal substances;
and criminal copyright infringement is an act of piracy mainly for financial gain.
Authorities have devised different punishments for those who commit
cybercrimes. For those who own servers and/ or computer networks, they can
install firewalls, anti-malwares, passwords, secure connections, and data
encryptions to avoid hacking. However, these methods are not 100% secure.