SlideShare a Scribd company logo
1 of 57
Rules of Netiquette & Cyber
Crimes
Prepared by: Mark Gernale
The guessing Game
ā€¢Try to guess the percentage of the following
statistic:
1. Teenagers who have a social networking
account.
2. Teenagers who regularly get messages from
strangers.
3. Teens who post photos and videos of
themselves.
4. Female teens who post personal photos and
videos of themselves.
5. Male teens who post personal videos and
photos of themselves.
6. Teens who posted their cell phone number
online.
Social Network
71%
29%
TEENS
Have A Social Network Profile Don't Have
Did you know that FaceBook and
most social networking sites only
allow users aged 13 and above?
Teen MEssaging
Regularly gets
messages from
strangers
69%
Doesn't get
regularly
31%
Messaging
Regularly gets messages from
strangers
Doesn't get regularly
Nearly half of teens (47%)
are not worried about
others using their personal
info in ways they do not
want
The ugly truth
ā€¢ Percent of teenagers who have sent or posted nude or semi-nude
pictures or videos of themselves:
ā€¢ 20% overall
ā€¢ 22% teen girls
ā€¢ 18% teen boys
ā€¢ 11% young teen girls ages 13-16
ā€¢ Percent of teenagers sending or posting sexually suggestive
messages:
ā€¢ 39% overall
ā€¢ 37% teen girls
ā€¢ 40% teen boys
ā€¢ 51 Percent of teen girls say pressure from a guy is a reason girls send
sexy messages or images; only 18 % of teen boys cited pressure from
female counterparts as a reason.
ā€¢ 66 Percent of teen girls and 60% of teen boys say they did so to be ā€œfun
or flirtatiousā€; their most common reason for sending sexy content.
ā€¢ 17 Percent of the sexting recipients report that they have passed the
images along to someone else.
ā€¢ 14 Percent of young people who have shared a naked photo or video of
themselves suspect that the recipient probably shared the image with
someone else without permission.
The internet is as secure as an armor
made of tissue.
ā€¢ The 2014 Celebrity Photo Hack
ā€¢ On August 31, 2014 a collection of almost 500 private pictures of
various celebrities, mostly women, and with many containing nudity
were posted on the imageboard 4chan and later disseminated on
other websites.
ā€¢ The images were believed to have been obtained via a breach of
Appleā€™s cloud services suite iCloud
One of the victims was underage at the time the photos were
taken.
NETIQUETTE
ļ± The etiquette guidelines that
govern behaviour when
communicating on the internet.
Tips to Stay Safe Online
ļ± Donā€™t post any personal
information online ā€“ like your
address, email address or mobile
number.
ļ± Think carefully before posting pictures
or videos of yourself.
ļ± Keep your privacy as high as possible.
ļ± Never give out your passwords.
ļ± Donā€™t befriend people you donā€™t know.
ļ± Donā€™t meet up with people youā€™ve met
online.
ļ± Remember that not everyone online
is who they say they are.
ļ± Think carefully about what you say
before you post something online.
ļ± Respect other peopleā€™s views, even if
you donā€™t agree with someone elseā€™s
views
doesnā€™t mean you need to be rude.
ļ± If you see something online that makes
you feel uncomfortable , turn off your
computer if you want to and tell a
trusted adult immediately
Internet Threats
Malware
ļ± Malware is short for malicious
software, is any software used to
disrupt computer operation, gather
sensitive information, or gain access to
private computer system.
VIRUS
ļ± A piece of code that is capable of copying itself
and typically has a detrimental effect, such as
corrupting the system or destroying data.
ļ± The common use of a virus is to take over a
computer to steal data.
WORMS
ļ± Worms are programs that can replicate
themselves through computer network and
performs malicious tasks.
ļ± Example of this kind of virus is ILOVEYOU
virus made by a Filipino.
TROJAN HORSE
ļ± A malicious software that pretends to
be harmless, so that a user willingly
allows it to be downloaded onto the
computer.
SPYWARE
ļ± Refers to a programs that
superstitiously monitor activity on a
computer system and report that
information to others without the userā€™s
consent.
The Levels of the
Internet
The Common Web
Level 0
This level is the one you
browse everyday: YouTube,
Facebook, Wikipedia and other
famous or easily accessible
websites can be found here.
The Surface Web
Level 1
This level is still accessible
through normal means, but
contains ā€œdarkerā€ websites, such
as Reddit.
Reddit is an American social news aggregation, web
content rating, and discussion website. Registered
members submit content to the site such as links, text
posts, and images, which are then voted up or down by
other members. Posts are organized by subject into user-
created boards called "subreddits", which cover a variety
of topics including news, science, movies, video games,
music, books, fitness, food, and image-sharing.
This level is still accessible
through normal means, but
contains ā€œdarkerā€ websites, such
as Reddit.
This level is still accessible
through normal means, but
contains ā€œdarkerā€ websites, such
as Reddit.
Level 2 ā€“ Bergie Web
This level is the last one normally accessible:
all levels that follow this one have to be
accessed with a proxy, Tor or by modifying
your hardware. In this level you can find
some ā€œundergroundā€ but still indexed
websites, such as 4chan.
4chan is an English-language imageboard website. Users generally
post anonymously, with the most recent posts appearing above the
rest. 4chan is split into various boards with their own specific
content and guidelines. Registration is not possible (except for staff).
Launched on October 1, 2003, the site was modeled on Japanese
imageboards, particularly Futaba Channel. 4chan's first boards were
originally primarily used for posting pictures and discussing manga
and anime. The site quickly became popular, expanded, and now
features boards dedicated to a wide variety of topics, from
anime/manga to videogames, music, literature, fitness, politics, and
sports.
Level 3 ā€“ Deep Web
The first part of this level has to be
accessed with a proxy. It contains
CP, gore, hacking websitesā€¦ Here
begins the Deep Web. Second part
of this level is only accessible
through Tor, and contains more
sensible information.
ADWARE
ļ± Adware it is designed to send you
advertisement, mostly pop-ups.
SPAM
ļ± Spam is the unwanted email, mostly
from bots or advertisers. It can be
used to send malware
PHISHING
ļ± Its goal is to acquire sensitive personal
information like passwords and credit
cards.
CYBER CRIMES
MONEY THEFT
ļ± In many cases, they are ā€œinside jobā€ that
involve fraudulent alteration of
computer databases to cover the tracks
of the employees involved.
Service Theft
ļ± The unauthorized copy of systems and
networks is called service theft. A common
example is unauthorized use of company-
owned computer networks by employees.
SOFTWARE THEFT
ļ± Unauthorized copying of a software
DATA ALTERATION
ļ± Making illegal changes or stealing data is
another form of computer crime.
ļ± Example of is taking payments from students
and using the universityā€™s computer system to
change their grades in return
DESTRUCTION OF DATA AND
SOFTWARE
ļ± One of the most destructive examples of
computer crimes involves the creation of
computer viruses or worms.

More Related Content

What's hot

How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012kschermerhorn
Ā 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS
Ā 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullyingkschermerhorn
Ā 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016KanelandSvihlik
Ā 
Social media-threats
Social media-threatsSocial media-threats
Social media-threatsAndreas Hiller
Ā 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social mediaAM Oh
Ā 
internet safety 2013
internet safety 2013internet safety 2013
internet safety 2013Brian Downey
Ā 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
Ā 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet SafelyJoanne Hewitt
Ā 
Social media-threats
Social media-threatsSocial media-threats
Social media-threatsAndreas Hiller
Ā 
Internet Safety Program for Parents
Internet Safety Program for ParentsInternet Safety Program for Parents
Internet Safety Program for ParentsJamie Tubbs
Ā 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
Ā 
Internet Safety
Internet SafetyInternet Safety
Internet Safetysuresh sood
Ā 
Cybersafeelementary
CybersafeelementaryCybersafeelementary
CybersafeelementaryRick Ohren
Ā 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
Ā 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
Ā 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsCorinne Weisgerber
Ā 

What's hot (20)

How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012
Ā 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to Children
Ā 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
Ā 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
Ā 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
Ā 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
Ā 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
Ā 
internet safety 2013
internet safety 2013internet safety 2013
internet safety 2013
Ā 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
Ā 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet Safely
Ā 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
Ā 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Ā 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Ā 
Internet Safety Program for Parents
Internet Safety Program for ParentsInternet Safety Program for Parents
Internet Safety Program for Parents
Ā 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
Ā 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Ā 
Cybersafeelementary
CybersafeelementaryCybersafeelementary
Cybersafeelementary
Ā 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
Ā 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
Ā 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
Ā 

Similar to Rules of netiquette & cyber crimes

Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
Ā 
Multimedia01
Multimedia01Multimedia01
Multimedia01Les Davy
Ā 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfJeth Cuenco
Ā 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
Ā 
Group 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptxGroup 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptxJenicaJDizon
Ā 
CyberSafety
CyberSafetyCyberSafety
CyberSafetyiceman1953
Ā 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
Ā 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
Ā 
EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.RIZALEAHSAMANIEGO
Ā 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
Ā 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
Ā 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyMann Rentoy
Ā 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!mediaplaylab
Ā 
What Is Spam
What Is SpamWhat Is Spam
What Is Spamguest1edb8df
Ā 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
Ā 
What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015Linda Beres
Ā 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issuesNousheen Arshad
Ā 

Similar to Rules of netiquette & cyber crimes (20)

Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
Ā 
Multimedia01
Multimedia01Multimedia01
Multimedia01
Ā 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
Ā 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
Ā 
Group 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptxGroup 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptx
Ā 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
Ā 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
Ā 
Facebook
FacebookFacebook
Facebook
Ā 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
Ā 
EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.
Ā 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
Ā 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
Ā 
Digital Citizenship by Mann Rentoy
Digital Citizenship by Mann RentoyDigital Citizenship by Mann Rentoy
Digital Citizenship by Mann Rentoy
Ā 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!
Ā 
What Is Spam
What Is SpamWhat Is Spam
What Is Spam
Ā 
Social Network
Social NetworkSocial Network
Social Network
Ā 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
Ā 
What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015What Apps Your children May be using slide show final with hyperlink2015
What Apps Your children May be using slide show final with hyperlink2015
Ā 
Myspace
MyspaceMyspace
Myspace
Ā 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
Ā 

More from markgernale24

The internet-and-the-world-wide-web
The internet-and-the-world-wide-webThe internet-and-the-world-wide-web
The internet-and-the-world-wide-webmarkgernale24
Ā 
Ways to-access-inetrnet-
Ways to-access-inetrnet-Ways to-access-inetrnet-
Ways to-access-inetrnet-markgernale24
Ā 
The classification of computer
The classification of computerThe classification of computer
The classification of computermarkgernale24
Ā 
Computer concept
Computer conceptComputer concept
Computer conceptmarkgernale24
Ā 
IT careers and professionals
IT careers and professionalsIT careers and professionals
IT careers and professionalsmarkgernale24
Ā 
Ict s113 introduction to hardware and software subject overview
Ict s113  introduction to hardware and software  subject overviewIct s113  introduction to hardware and software  subject overview
Ict s113 introduction to hardware and software subject overviewmarkgernale24
Ā 

More from markgernale24 (7)

The internet-and-the-world-wide-web
The internet-and-the-world-wide-webThe internet-and-the-world-wide-web
The internet-and-the-world-wide-web
Ā 
Ways to-access-inetrnet-
Ways to-access-inetrnet-Ways to-access-inetrnet-
Ways to-access-inetrnet-
Ā 
The classification of computer
The classification of computerThe classification of computer
The classification of computer
Ā 
Computer concept
Computer conceptComputer concept
Computer concept
Ā 
IT careers and professionals
IT careers and professionalsIT careers and professionals
IT careers and professionals
Ā 
Ict s113 introduction to hardware and software subject overview
Ict s113  introduction to hardware and software  subject overviewIct s113  introduction to hardware and software  subject overview
Ict s113 introduction to hardware and software subject overview
Ā 
IE
IEIE
IE
Ā 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
Ā 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
Ā 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
Ā 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
Ā 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
Ā 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
Ā 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
Ā 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)Dr. Mazin Mohamed alkathiri
Ā 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
Ā 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
Ā 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
Ā 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
Ā 
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdfssuser54595a
Ā 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
Ā 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
Ā 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
Ā 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
Ā 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
Ā 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
Ā 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
Ā 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
Ā 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Ā 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
Ā 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
Ā 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
Ā 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
Ā 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Ā 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
Ā 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
Ā 
Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at šŸ”9953056974šŸ”
Ā 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
Ā 
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
Ā 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Ā 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
Ā 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
Ā 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
Ā 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
Ā 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Ā 

Rules of netiquette & cyber crimes

  • 1. Rules of Netiquette & Cyber Crimes Prepared by: Mark Gernale
  • 2. The guessing Game ā€¢Try to guess the percentage of the following statistic: 1. Teenagers who have a social networking account. 2. Teenagers who regularly get messages from strangers. 3. Teens who post photos and videos of themselves.
  • 3. 4. Female teens who post personal photos and videos of themselves. 5. Male teens who post personal videos and photos of themselves. 6. Teens who posted their cell phone number online.
  • 4. Social Network 71% 29% TEENS Have A Social Network Profile Don't Have Did you know that FaceBook and most social networking sites only allow users aged 13 and above?
  • 5. Teen MEssaging Regularly gets messages from strangers 69% Doesn't get regularly 31% Messaging Regularly gets messages from strangers Doesn't get regularly Nearly half of teens (47%) are not worried about others using their personal info in ways they do not want
  • 6. The ugly truth ā€¢ Percent of teenagers who have sent or posted nude or semi-nude pictures or videos of themselves: ā€¢ 20% overall ā€¢ 22% teen girls ā€¢ 18% teen boys ā€¢ 11% young teen girls ages 13-16 ā€¢ Percent of teenagers sending or posting sexually suggestive messages: ā€¢ 39% overall ā€¢ 37% teen girls ā€¢ 40% teen boys
  • 7. ā€¢ 51 Percent of teen girls say pressure from a guy is a reason girls send sexy messages or images; only 18 % of teen boys cited pressure from female counterparts as a reason. ā€¢ 66 Percent of teen girls and 60% of teen boys say they did so to be ā€œfun or flirtatiousā€; their most common reason for sending sexy content. ā€¢ 17 Percent of the sexting recipients report that they have passed the images along to someone else. ā€¢ 14 Percent of young people who have shared a naked photo or video of themselves suspect that the recipient probably shared the image with someone else without permission.
  • 8. The internet is as secure as an armor made of tissue. ā€¢ The 2014 Celebrity Photo Hack ā€¢ On August 31, 2014 a collection of almost 500 private pictures of various celebrities, mostly women, and with many containing nudity were posted on the imageboard 4chan and later disseminated on other websites. ā€¢ The images were believed to have been obtained via a breach of Appleā€™s cloud services suite iCloud One of the victims was underage at the time the photos were taken.
  • 9. NETIQUETTE ļ± The etiquette guidelines that govern behaviour when communicating on the internet.
  • 10. Tips to Stay Safe Online ļ± Donā€™t post any personal information online ā€“ like your address, email address or mobile number.
  • 11. ļ± Think carefully before posting pictures or videos of yourself. ļ± Keep your privacy as high as possible. ļ± Never give out your passwords. ļ± Donā€™t befriend people you donā€™t know.
  • 12. ļ± Donā€™t meet up with people youā€™ve met online. ļ± Remember that not everyone online is who they say they are. ļ± Think carefully about what you say before you post something online.
  • 13. ļ± Respect other peopleā€™s views, even if you donā€™t agree with someone elseā€™s views doesnā€™t mean you need to be rude. ļ± If you see something online that makes you feel uncomfortable , turn off your computer if you want to and tell a trusted adult immediately
  • 15. Malware ļ± Malware is short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer system.
  • 16. VIRUS ļ± A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. ļ± The common use of a virus is to take over a computer to steal data.
  • 17. WORMS ļ± Worms are programs that can replicate themselves through computer network and performs malicious tasks. ļ± Example of this kind of virus is ILOVEYOU virus made by a Filipino.
  • 18.
  • 19.
  • 20. TROJAN HORSE ļ± A malicious software that pretends to be harmless, so that a user willingly allows it to be downloaded onto the computer.
  • 21. SPYWARE ļ± Refers to a programs that superstitiously monitor activity on a computer system and report that information to others without the userā€™s consent.
  • 22. The Levels of the Internet
  • 23.
  • 25. This level is the one you browse everyday: YouTube, Facebook, Wikipedia and other famous or easily accessible websites can be found here.
  • 26.
  • 28. This level is still accessible through normal means, but contains ā€œdarkerā€ websites, such as Reddit.
  • 29. Reddit is an American social news aggregation, web content rating, and discussion website. Registered members submit content to the site such as links, text posts, and images, which are then voted up or down by other members. Posts are organized by subject into user- created boards called "subreddits", which cover a variety of topics including news, science, movies, video games, music, books, fitness, food, and image-sharing.
  • 30. This level is still accessible through normal means, but contains ā€œdarkerā€ websites, such as Reddit.
  • 31.
  • 32. This level is still accessible through normal means, but contains ā€œdarkerā€ websites, such as Reddit.
  • 33. Level 2 ā€“ Bergie Web This level is the last one normally accessible: all levels that follow this one have to be accessed with a proxy, Tor or by modifying your hardware. In this level you can find some ā€œundergroundā€ but still indexed websites, such as 4chan.
  • 34. 4chan is an English-language imageboard website. Users generally post anonymously, with the most recent posts appearing above the rest. 4chan is split into various boards with their own specific content and guidelines. Registration is not possible (except for staff). Launched on October 1, 2003, the site was modeled on Japanese imageboards, particularly Futaba Channel. 4chan's first boards were originally primarily used for posting pictures and discussing manga and anime. The site quickly became popular, expanded, and now features boards dedicated to a wide variety of topics, from anime/manga to videogames, music, literature, fitness, politics, and sports.
  • 35.
  • 36. Level 3 ā€“ Deep Web The first part of this level has to be accessed with a proxy. It contains CP, gore, hacking websitesā€¦ Here begins the Deep Web. Second part of this level is only accessible through Tor, and contains more sensible information.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48. ADWARE ļ± Adware it is designed to send you advertisement, mostly pop-ups.
  • 49. SPAM ļ± Spam is the unwanted email, mostly from bots or advertisers. It can be used to send malware
  • 50. PHISHING ļ± Its goal is to acquire sensitive personal information like passwords and credit cards.
  • 52. MONEY THEFT ļ± In many cases, they are ā€œinside jobā€ that involve fraudulent alteration of computer databases to cover the tracks of the employees involved.
  • 53. Service Theft ļ± The unauthorized copy of systems and networks is called service theft. A common example is unauthorized use of company- owned computer networks by employees.
  • 54. SOFTWARE THEFT ļ± Unauthorized copying of a software
  • 55. DATA ALTERATION ļ± Making illegal changes or stealing data is another form of computer crime. ļ± Example of is taking payments from students and using the universityā€™s computer system to change their grades in return
  • 56.
  • 57. DESTRUCTION OF DATA AND SOFTWARE ļ± One of the most destructive examples of computer crimes involves the creation of computer viruses or worms.