This document discusses online safety, security, ethics and etiquette. It contains a self-check list for online habits and provides tips for safe social media use. The main threats discussed are identity theft, cyber stalking, cyberbullying and different types of internet threats like malware, spam and phishing. Laws regarding data privacy and cybercrime in the Philippines are also mentioned. Practical tips provided include not oversharing private details, reviewing posts before sharing, only interacting with verified accounts, and being aware of what you post or share online.
Cyber crime a potential threat and remediesIJARIIT
Cybercrime is an illegal activity performed by an individual or by a group of experts in computer technology using
the Internet. It ranges from stealing money online from an individual to big corporate using the internet. In the present era of
information technology, the computer has made the life easy. People use computer or mobile to perform various jobs on the
Internet. So it is necessary to know how to perform various transactions on the internet safely. Everyone is prone to the attack
from the cyber criminals. One must be aware and should have knowledge of cybercrime.
Cyber crime a potential threat and remediesIJARIIT
Cybercrime is an illegal activity performed by an individual or by a group of experts in computer technology using
the Internet. It ranges from stealing money online from an individual to big corporate using the internet. In the present era of
information technology, the computer has made the life easy. People use computer or mobile to perform various jobs on the
Internet. So it is necessary to know how to perform various transactions on the internet safely. Everyone is prone to the attack
from the cyber criminals. One must be aware and should have knowledge of cybercrime.
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
Cyber Crime:
As Internet usage is growing daily the world is coming closer. The World Wide Web sounds like
a vast phenomenon but surprisingly one of its qualities is bringing the world closer making it a
smaller place to live in for its users. However, it has also managed to create another problem for
people who spend long hours browsing the Cyber World – which is cyber crimes. While law
enforcement agencies are trying to tackle this problem, it is growing steadily and many people
have become victims of hacking, theft, identity theft and malicious software. One of the best
ways to avoid being a victim of cyber crimes and protecting your sensitive information is by
making use of impenetrable security that uses a unified system of software and hardware to
authenticate any information that is sent or accessed over the Internet. However, before you can
understand more about this system, let us find out more about cyber crimes.
Types of Cyber Crimes:
When any crime is committed over the Internet it is referred to as a cyber crime. There are many
types of cyber crimes and the most common ones are explained below:
1.Hacking: This is a type of crime wherein a person’s computer is broken into so that his
personal or sensitive information can be accessed. In the United States, hacking is classified as a
felony and punishable as such. This is different from ethical hacking, which many organizations
use to check their Internet security protection. In hacking, the criminal uses a variety of software
to enter a person’s computer and the person may not be aware that his computer is being
accessed from a remote location.
2.Theft: This crime occurs when a person violates copyrights and downloads music, movies,
games and software. There are even peer sharing websites which encourage software piracy and
many of these websites are now being targeted by the FBI. Today, the justice system is
addressing this cyber crime and there are laws that prevent people from illegal downloading.
3.Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage
of online messages and emails. Typically, these stalkers know their victims and instead of
resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber
stalking is not having the desired effect, they begin offline stalking along with cyber stalking to
make the victims’ lives more miserable.
4.Identity Theft: This has become a major problem with people using the Internet for cash
transactions and banking services. In this cyber crime, a criminal accesses data about a person’s
bank account, credit cards, Social Security, debit card and other sensitive information to siphon
money or to buy things online in the victim’s name. It can result in major financial losses for the
victim and even spoil the victim’s credit history.
5.Malicious Software: These are Internet-based software or programs that are used to disrupt a
network. The software is used to gain ac.
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
Cyber Crime:
As Internet usage is growing daily the world is coming closer. The World Wide Web sounds like
a vast phenomenon but surprisingly one of its qualities is bringing the world closer making it a
smaller place to live in for its users. However, it has also managed to create another problem for
people who spend long hours browsing the Cyber World – which is cyber crimes. While law
enforcement agencies are trying to tackle this problem, it is growing steadily and many people
have become victims of hacking, theft, identity theft and malicious software. One of the best
ways to avoid being a victim of cyber crimes and protecting your sensitive information is by
making use of impenetrable security that uses a unified system of software and hardware to
authenticate any information that is sent or accessed over the Internet. However, before you can
understand more about this system, let us find out more about cyber crimes.
Types of Cyber Crimes:
When any crime is committed over the Internet it is referred to as a cyber crime. There are many
types of cyber crimes and the most common ones are explained below:
1.Hacking: This is a type of crime wherein a person’s computer is broken into so that his
personal or sensitive information can be accessed. In the United States, hacking is classified as a
felony and punishable as such. This is different from ethical hacking, which many organizations
use to check their Internet security protection. In hacking, the criminal uses a variety of software
to enter a person’s computer and the person may not be aware that his computer is being
accessed from a remote location.
2.Theft: This crime occurs when a person violates copyrights and downloads music, movies,
games and software. There are even peer sharing websites which encourage software piracy and
many of these websites are now being targeted by the FBI. Today, the justice system is
addressing this cyber crime and there are laws that prevent people from illegal downloading.
3.Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage
of online messages and emails. Typically, these stalkers know their victims and instead of
resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber
stalking is not having the desired effect, they begin offline stalking along with cyber stalking to
make the victims’ lives more miserable.
4.Identity Theft: This has become a major problem with people using the Internet for cash
transactions and banking services. In this cyber crime, a criminal accesses data about a person’s
bank account, credit cards, Social Security, debit card and other sensitive information to siphon
money or to buy things online in the victim’s name. It can result in major financial losses for the
victim and even spoil the victim’s credit history.
5.Malicious Software: These are Internet-based software or programs that are used to disrupt a
network. The software is used to gain ac.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
"Protectable subject matters, Protection in biotechnology, Protection of othe...
4. ONLINE SAFETY.pptx
1. Self-Check on Online Habits
Online Habits Yes No
I share my password to my friends.
I post my rant/s on my social media.
I talk to strangers on social media.
I visit unsecured websites.
I post about my family’s future vacation.
I post image or video without asking permission from
the owner.
3. Objectives:
1. identify different online risks and threats;
2. value the importance of online safety, security, ethics and
etiquette; and
3. apply online safety, security, ethics, and etiquette
standards and practice in the use of ICTs as it would relate
to their specific professional tracks.
(CS_ICT11/12-ICTPT-Ia-b2)
7. 1) You are not obliged to
share all your info
Data Privacy Act of 2012
(Republic Act No. 10173) -
protects individuals from
unauthorized processing of
personal information that is
(1) private, not publicly
available; and (2)
identifiable, where the
identity of the individual is
apparent either through
direct attribution or when
put together with other
available information.
8. 2. Do not over-share!
•Life story or daily routine
•Names of children or
relatives or pets
•Photos of your
house/room
•Financials
9. Identity Theft
– a crime of stealing personal
information for the purpose of
assuming that person’s name
or identity to make any form
of transactions.
Cyber Stalking
– a criminal practice where
electronic communication is
used to stalk or harass
individual or group.
18. Cyberbullying
– bullying that takes place over
digital devices like cellphones,
computers, and tablets.
Anti-Bullying Act of 2013
– an act requiring all elementary
and secondary schools to adopt
policies to prevent and address
the acts of bullying in their
institutions including
cyberbullying.
23. Internet Threats
1. Malware – stands for malicious
software. A software that is
specifically designed to disrupt,
damage, or gain unauthorized
access to a computer system.
2. Spam – unwanted email mostly
from bots or advertisers. It can be
used to send malware.
3. Phishing – its goal is to acquire
sensitive personal information like
passwords and credit card details.
26. Cyber Crime Prevention
Act of 2012
• officially recorded as Republic Act
No. 10175 is a law in Philippines
approved on September 12, 2012
• It aims to address legal issues
concerning online interactions and
the internet in the Philippines.
• Among the cybercrime offenses
included in the bill are
cybersquatting, cybersex, child
pornography, identity theft, illegal
access to data and libel.
28. Activity 1: Answer the following:
(Max. of 3 sentences)
1. How do you keep yourself safe and secure online?
__________________________________________________________________
___________________________________________________________________
_________________________________________________________________
2. Explain the verse below relating to the use of social media:
“A good reputation and respect are worth much more than
silver and gold.” ~ Proverbs 22:1
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
29. Activity 2:
Poster Making
Directions:
Make an e-poster with a
theme “think before you
click”. You may use any
online or offline application
in designing. If not
available, use a 1 whole
sheet of short bond paper
and coloring materials.
Criteria 5 4 3
Originality There are no
similar elements
on the poster.
There are 1 or 2
similar
elements on
the poster.
There are many
similar
elements on
the poster.
Graphics
Relevance
All graphics are
related to the
theme and
makes it easier
to understand.
Some graphics
are related to
the theme.
Many graphics
are not related
to the topic.
Attractiveness The poster is
exceptionally
attractive, neat,
and clean.
The poster is
acceptably
attractive, but
it has few
erasures.
The poster is
not attractive
and has many
erasures.