SlideShare a Scribd company logo
1 of 22
THE DISADVANTAGE OF
ICT
In various aspects, ICT and technology as a whole
brought us comfort and convenience in life. We, as
Filipinos, have been known to be avid users of technology.
Some even have made a name as an Internet sensation.
However, aside from those successes are the downfalls of
users.
Be honest with yourself, you have your share of “bad things”
or any unwarranted acts (like piracy) you have done using ICT.
Ask yourself why you did them..
Walking on a sidewalk does not pose danger as opposed to
walking in the middle of the street. Remove the sidewalk and you
are left to dodge approaching vehicles. That is probably how much
of us deal with the Internet. In the Internet, there are no sidewalks;
just a huge superhighway where information freely flows through. If
in the real world we have the police or the military to monitor us,
the Internet is unmonitored making it one of the most abused
technology we use.
CYBERCRIMES
Cybercrimes are illegal acts done through the use of
the Internet.
10 MOST COMMON INTERNET CYBERCRIMES
1. Phishing/ Spoofing- the act of sending multiple emails to
multiple users in hopes of having a number of them clicking on
the links or malwares attached to the email. Most email services
today have spam or bulk folders that automatically put these
suspicious emails to that folder. However, this is not 100%
accurate that some emails are not filtered and some other
emails that are legitimate end up on the spam folder.
10 MOST COMMON INTERNET CYBERCRIMES
2. Blackmail/ Extortion – the act of using the Internet to threaten
or damage someone’s reputation to extort money or anything
else of value. This can be avoided if you are aware of what you
should post on the Internet. The victims of this act tend to have
posted something “inappropriate” over the Internet even if they
put it at a secured location.
10 MOST COMMON INTERNET CYBERCRIMES
3. Accessing Stored Communication – or hacking; the act of
obtaining unauthorized access to data from a computer
network. This is typically done to commercial and government
sites to threaten its owner. In the late 2014, a group of hackers
hacked Sony’s website because of the impending release of the
controversial film “The Interview.”
10 MOST COMMON INTERNET CYBERCRIMES
4. Sports Betting – the act of wagering on any sports event over
the Internet. In some countries, gambling (including sports
betting) is illegal even if you are doing it over the Internet.
10 MOST COMMON INTERNET CYBERCRIMES
5. Non-Delivery of Merchandise – the act of devising a scheme
wherein a culprit post an item for sale on the Internet and once
the transactions have been done, does not really give the item
or service.
10 MOST COMMON INTERNET CYBERCRIMES
6. Electronic Harassment – the act of anonymously using the
Internet to harass, abuse, threaten, or annoy other people. This
is also an act of cyberbullying, however, because the culprit is
anonymous, it is hard to detect who is bullying you.
10 MOST COMMON INTERNET CYBERCRIMES
7. Child Pornography – the act of using the Internet to show child
pornography. This act is highly punishable by law.
10 MOST COMMON INTERNET CYBERCRIMES
8. Prostitution – the act of using the internet to engage in
prostitution.
10 MOST COMMON INTERNET CYBERCRIMES
9. Drug Trafficking - the act of selling illegal substances using
the Internet.
10 MOST COMMON INTERNET CYBERCRIMES
10.Criminal Copyright Infringement – the act of piracy mainly for
financial gain. In late 2014, the number one pirate website,
ThePirateBay, was raided for the second time due to years of
pirating movies, music, games, books, and other software. These
kinds of websites earn money through advertising.
The Internet is the present and the future of your
generation and you define what impact it can do to shape
our society, whether it is negative or positive. The future is
in your hands.
COMBATTING CYBERCRIMES
SEVERAL WAYS THAT CAN HELP OR SOLVE CYBERCRIMES:
1. Network Security – Before a hacker can get through the
unauthorized files he or she is targeting, the hacker has to get
through several security measures like firewalls, secure
connections, passwords, anti-malwares, and data encryptions.
Encryption is the process of converting raw data into code.
However, these methods are not 100% secure and there will
always be a way for a hacker to hack.
COMBATTING CYBERCRIMES
SEVERAL WAYS THAT CAN HELP OR SOLVE CYBERCRIMES:
2. Investigation – URL tracing and logging are used by websites
to track your unique IP addresses. This can be used by
investigators to trace hackers. In piracy, trackers are used to
identify IP addresses currently sharing a pirated file.
COMBATTING CYBERCRIMES
SEVERAL WAYS THAT CAN HELP OR SOLVE CYBERCRIMES:
3. Penalties – More and more laws are being created and
implemented today. Penalties include both fine and
imprisonment.
KEY TERMS
Phishing - also referred to as spoofing; an act spamming emails
Spam - unwanted emails
Blackmail - act of asking something in return of not showing
something that could damage someone’s reputation
Hacking - the act of obtaining authorized information
Cyberbullying- an act of harassment using electronic means
Copyright Infringement- an act of piracy mainly for financial gain
Encryption - the process of converting raw data into code
SUMMARY
The Internet can sometimes be used for wrong deeds. These cybercrimes
damage not just individuals but the society as a whole.
Cybercrimes can be in the form of the following: phishing or spoofing is an
act of spamming emails; blackmail or extortion is the act of asking something in
return of not showing something that could damage someone’s reputation;
hacking is the act of obtaining authorized information; sports betting is gambling
over sports results; non-delivery of merchandise is faking a sale over the Internet;
electronic harassment is the act of anonymous cyberbullying; child pornography is
the exploitation of the youth; prostitution is the act of using the Internet to engage
in sexual acts; drug trafficking is using the Internet for selling illegal substances;
and criminal copyright infringement is an act of piracy mainly for financial gain.
Authorities have devised different punishments for those who commit
cybercrimes. For those who own servers and/ or computer networks, they can
install firewalls, anti-malwares, passwords, secure connections, and data
encryptions to avoid hacking. However, these methods are not 100% secure.
The disadvantage of ict.pptx

More Related Content

Similar to The disadvantage of ict.pptx

Disadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDisadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDixsonCaluag2
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeetaAparajeeta Salu
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crimeDevanshi Solanki
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human rightAgustina
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 

Similar to The disadvantage of ict.pptx (20)

Disadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDisadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Computer crime
 Computer crime Computer crime
Computer crime
 
CYBER SAFETY.pptx
CYBER SAFETY.pptxCYBER SAFETY.pptx
CYBER SAFETY.pptx
 

Recently uploaded

Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 

Recently uploaded (20)

Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 

The disadvantage of ict.pptx

  • 2. In various aspects, ICT and technology as a whole brought us comfort and convenience in life. We, as Filipinos, have been known to be avid users of technology. Some even have made a name as an Internet sensation. However, aside from those successes are the downfalls of users.
  • 3. Be honest with yourself, you have your share of “bad things” or any unwarranted acts (like piracy) you have done using ICT. Ask yourself why you did them..
  • 4. Walking on a sidewalk does not pose danger as opposed to walking in the middle of the street. Remove the sidewalk and you are left to dodge approaching vehicles. That is probably how much of us deal with the Internet. In the Internet, there are no sidewalks; just a huge superhighway where information freely flows through. If in the real world we have the police or the military to monitor us, the Internet is unmonitored making it one of the most abused technology we use.
  • 5. CYBERCRIMES Cybercrimes are illegal acts done through the use of the Internet.
  • 6. 10 MOST COMMON INTERNET CYBERCRIMES 1. Phishing/ Spoofing- the act of sending multiple emails to multiple users in hopes of having a number of them clicking on the links or malwares attached to the email. Most email services today have spam or bulk folders that automatically put these suspicious emails to that folder. However, this is not 100% accurate that some emails are not filtered and some other emails that are legitimate end up on the spam folder.
  • 7. 10 MOST COMMON INTERNET CYBERCRIMES 2. Blackmail/ Extortion – the act of using the Internet to threaten or damage someone’s reputation to extort money or anything else of value. This can be avoided if you are aware of what you should post on the Internet. The victims of this act tend to have posted something “inappropriate” over the Internet even if they put it at a secured location.
  • 8. 10 MOST COMMON INTERNET CYBERCRIMES 3. Accessing Stored Communication – or hacking; the act of obtaining unauthorized access to data from a computer network. This is typically done to commercial and government sites to threaten its owner. In the late 2014, a group of hackers hacked Sony’s website because of the impending release of the controversial film “The Interview.”
  • 9. 10 MOST COMMON INTERNET CYBERCRIMES 4. Sports Betting – the act of wagering on any sports event over the Internet. In some countries, gambling (including sports betting) is illegal even if you are doing it over the Internet.
  • 10. 10 MOST COMMON INTERNET CYBERCRIMES 5. Non-Delivery of Merchandise – the act of devising a scheme wherein a culprit post an item for sale on the Internet and once the transactions have been done, does not really give the item or service.
  • 11. 10 MOST COMMON INTERNET CYBERCRIMES 6. Electronic Harassment – the act of anonymously using the Internet to harass, abuse, threaten, or annoy other people. This is also an act of cyberbullying, however, because the culprit is anonymous, it is hard to detect who is bullying you.
  • 12. 10 MOST COMMON INTERNET CYBERCRIMES 7. Child Pornography – the act of using the Internet to show child pornography. This act is highly punishable by law.
  • 13. 10 MOST COMMON INTERNET CYBERCRIMES 8. Prostitution – the act of using the internet to engage in prostitution.
  • 14. 10 MOST COMMON INTERNET CYBERCRIMES 9. Drug Trafficking - the act of selling illegal substances using the Internet.
  • 15. 10 MOST COMMON INTERNET CYBERCRIMES 10.Criminal Copyright Infringement – the act of piracy mainly for financial gain. In late 2014, the number one pirate website, ThePirateBay, was raided for the second time due to years of pirating movies, music, games, books, and other software. These kinds of websites earn money through advertising.
  • 16. The Internet is the present and the future of your generation and you define what impact it can do to shape our society, whether it is negative or positive. The future is in your hands.
  • 17. COMBATTING CYBERCRIMES SEVERAL WAYS THAT CAN HELP OR SOLVE CYBERCRIMES: 1. Network Security – Before a hacker can get through the unauthorized files he or she is targeting, the hacker has to get through several security measures like firewalls, secure connections, passwords, anti-malwares, and data encryptions. Encryption is the process of converting raw data into code. However, these methods are not 100% secure and there will always be a way for a hacker to hack.
  • 18. COMBATTING CYBERCRIMES SEVERAL WAYS THAT CAN HELP OR SOLVE CYBERCRIMES: 2. Investigation – URL tracing and logging are used by websites to track your unique IP addresses. This can be used by investigators to trace hackers. In piracy, trackers are used to identify IP addresses currently sharing a pirated file.
  • 19. COMBATTING CYBERCRIMES SEVERAL WAYS THAT CAN HELP OR SOLVE CYBERCRIMES: 3. Penalties – More and more laws are being created and implemented today. Penalties include both fine and imprisonment.
  • 20. KEY TERMS Phishing - also referred to as spoofing; an act spamming emails Spam - unwanted emails Blackmail - act of asking something in return of not showing something that could damage someone’s reputation Hacking - the act of obtaining authorized information Cyberbullying- an act of harassment using electronic means Copyright Infringement- an act of piracy mainly for financial gain Encryption - the process of converting raw data into code
  • 21. SUMMARY The Internet can sometimes be used for wrong deeds. These cybercrimes damage not just individuals but the society as a whole. Cybercrimes can be in the form of the following: phishing or spoofing is an act of spamming emails; blackmail or extortion is the act of asking something in return of not showing something that could damage someone’s reputation; hacking is the act of obtaining authorized information; sports betting is gambling over sports results; non-delivery of merchandise is faking a sale over the Internet; electronic harassment is the act of anonymous cyberbullying; child pornography is the exploitation of the youth; prostitution is the act of using the Internet to engage in sexual acts; drug trafficking is using the Internet for selling illegal substances; and criminal copyright infringement is an act of piracy mainly for financial gain. Authorities have devised different punishments for those who commit cybercrimes. For those who own servers and/ or computer networks, they can install firewalls, anti-malwares, passwords, secure connections, and data encryptions to avoid hacking. However, these methods are not 100% secure.