2. WHAT IS CYBERCRIME?
• Cybercrime is a type of crime involving a
computer or a computer network.
• Cybercrimes pose a growing threat to individuals,
businesses, and governments worldwide.
• Republic Act No. 10175 Cybercrime Prevention Act
of 2012 is a law in the Philippines approved on
September 12, 2012, which aims to address legal
issues concerning online interactions
and internet.
• Republic Act No. 10173 Data Privacy Act of 2012is
an act protecting individual personal
information.
3. Example of a Computer
Virus in the Philippines:
The first computer virus in the
Philippines is known as the “ILOVEYOU”
virus also referred to as the “Love
Bug” or “Loveletter” virus. It emerged
on May 4, 2000, and quickly spread
globally, affecting millions of computer
systems worldwide.
Related PHL Law
Cybercrime Prevention Act of
2012Officially recorded as Republic Act No.
10175, is a law in the Philippines that was
approved on September 12, 2012. It aims to
address legal issues concerning online
interactions and the Internet in the
Philippines. Among the cybercrime
offenses included in the bill are
cybersquatting, cybersex, child
pornography, identity theft, illegal access
to data, and libel. One of the first laws in
the Philippines specifically criminalizes
computer crime.
4. Common Forms of Cybercrimes
01
Email phishing
• Is the most common
type of phishing, and it
has been in use since
the 1990s. Hackers
send these emails to
any email address they
can obtain.
02
Identity Theft
• This type of cybercrime
happens when an
attacker gains access to
a victim’s personal
information to steal
money, access
confidential data, or
commit tax or healthcare
insurance fraud.
03
Cyberbullying
• When someone
intimidates, harasses,
threatens, or denigrates
another person online, they
are engaging in
cyberbullying and can face
criminal charges. It is also
possible to face civil
liability for such activities.
04
Social Network Fraud
• Social media users
who impersonate
another person by
setting up a false
online identity may be
breaking the law if the
impersonator intends
to hurt, defraud, or
threaten others.
5. Common Forms of Cybercrimes
01
Email phishing
• Is the most common
type of phishing, and it
has been in use since
the 1990s. Hackers
send these emails to
any email address they
can obtain.
02
Identity Theft
• This type of cybercrime
happens when an
attacker gains access to
a victim’s personal
information to steal
money, access
confidential data, or
commit tax or healthcare
insurance fraud.
03
Cyberbullying
• When someone
intimidates, harasses,
threatens, or denigrates
another person online, they
are engaging in
cyberbullying and can face
criminal charges. It is also
possible to face civil
liability for such activities.
04
Social Network Fraud
• Social media users
who impersonate
another person by
setting up a false
online identity may be
breaking the law if the
impersonator intends
to hurt, defraud, or
threaten others.
6. Common Forms of Cybercrimes
01
Email phishing
• Is the most common
type of phishing, and it
has been in use since
the 1990s. Hackers
send these emails to
any email address they
can obtain.
02
Identity Theft
• This type of cybercrime
happens when an
attacker gains access to
a victim’s personal
information to steal
money, access
confidential data, or
commit tax or healthcare
insurance fraud.
03
Cyberbullying
• When someone
intimidates, harasses,
threatens, or denigrates
another person online, they
are engaging in
cyberbullying and can face
criminal charges. It is also
possible to face civil
liability for such activities.
04
Social Network Fraud
• Social media users
who impersonate
another person by
setting up a false
online identity may be
breaking the law if the
impersonator intends
to hurt, defraud, or
threaten others.
7. Common Forms of Cybercrimes
01
Email phishing
• Is the most common
type of phishing, and it
has been in use since
the 1990s. Hackers
send these emails to
any email address they
can obtain.
02
Identity Theft
• This type of cybercrime
happens when an
attacker gains access to
a victim’s personal
information to steal
money, access
confidential data, or
commit tax or healthcare
insurance fraud.
03
Cyberbullying
• When someone
intimidates, harasses,
threatens, or denigrates
another person online, they
are engaging in
cyberbullying and can face
criminal charges. It is also
possible to face civil
liability for such activities.
04
Social Network Fraud
• Social media users
who impersonate
another person by
setting up a false
online identity may be
breaking the law if the
impersonator intends
to hurt, defraud, or
threaten others.
8. Additional Common forms of Cybercrimes
Copyright
•The exclusive legal right, given to an originator or an assignee to print, publish,
perform, film, or record literary, artistic, or musical material, and to authorize
others to do the same.
• Copyright infringement is the violation, piracy or theft of a copyright holder's
exclusive rights through the unauthorizeduseof a copyrighted material or work.
Plagiarism
• An act or instance of using or closely imitating the language and thoughts of
another author
9. CRIMINAL ACTIVITY
- Criminal activity refers to
actions that violate established
laws and regulations, often
leading to legal consequences.
Criminal activities encompass a
wide range of behaviors that
are considered unlawful in a
given jurisdiction.
11. Theft:
Unlawful taking of
someone else's property
with the intent to
permanently deprive
them of it.
Fraud:
Deceptive practices with
the intent to gain
something of value, often
involve false
representation or
manipulation.
Cybercrime:
Illegal activities are
conducted through
digital means, such as
hacking, identity theft, or
spreading malware.
Money Laundering:
Concealing the origins of
illegally obtained money,
typically by means of
complex financial
transactions.
13. HACKING
Unauthorized
access to or
interference with
computer systems,
servers, or other
information and
communication
systems.
Unauthorized access to
corrupt, alter, steal, or
destroy electronic data using
computers
or other information and
communication systems
without the computer or
system owner’s
knowledge and consent
The introduction of
computer viruses
resulting in the
corruption,
alteration, theft, or
loss
of suchdata
Infection of IT
Systems with
Malware – if the act
is committed
against critical
infrastructure
of the Philippines,
the penalty is
between 12-20
years of reclusion
temporal
Six years up to
twelve years of
imprisonment also
known as prison
mayor.
14. CYBERSEX
Willful engagement, maintenance,
control, or operation, directly or
indirectly of any
lascivious exhibition of sexual
organs or sexual activity with the
aid of a computer system
for favor or consideration.
There is a discussion
on this matter if it
involves “couples” or
“people in
relationship” who
engage in cybersex.
Penalty at least
Php 200,000
and or prison
mayor
15. CHILD PORNOGRAPHY
Is a form of child sexual
exploitation. Unlawful or
prohibited acts defined and
punishable by Republic Act
No. 9775 or the Anti-Child
Pornography Act of 2009,
committed through a
computer system.
Penalty of 12-20
years of
imprisonment
or reclusion
temporal
16. CYBER DEFAMATION
Is an unprivileged
false statement of
fact which tends to
harm the reputation
of a person or
company.
Penalty of 6-12
years of
imprisonment or
prisonmayor.
17. History, Major Event and
Evolution of Cybercrime
Cybercrime = Criminal Activity
The first cyber attack happened in France well before the
internet was even invented, in 1834. Attackers stole the
financial market information by accessing the French
telegraph system. 20th century - digital revolution,
cybercriminals became early adopters of technology,
18.
19. The same advanced technology used for
cybersecurity — including machine learning
and AI tools — is employed by today’s
cybercriminals too. And, as the big business
of cybercrime continues to grow, threat
actors have begun collaborating in a
ransomware-as-a-service (RaaS) model to
infiltrate organizations.The RaaS model allows
the developers of a ransomware variant to
recruit affiliates that exclusively use their
ransomware in targeted attacks on
organizations. Any ransom payments extorted
from the victims are then divided between the
ransomware developers and the affiliate who
conducted the attack.
W
H
A
T
S
N
E
X
T
I
N
C
Y
B
E
R
C
R
I
M
E
S
Successful approaches to cybersecurity will
include multi-prong defenses. It will involve
service providers and third-party expertise
even for organizations large enough to
employ comprehensive cybersecurity
technology and expert staff in-house. What
every organization needs to battle
cybercrime today, as well as tomorrow, is
security operations.
20. The same advanced technology used for
cybersecurity — including machine learning
and AI tools — is employed by today’s
cybercriminals too. And, as the big business
of cybercrime continues to grow, threat
actors have begun collaborating in a
ransomware-as-a-service (RaaS) model to
infiltrate organizations.The RaaS model allows
the developers of a ransomware variant to
recruit affiliates that exclusively use their
ransomware in targeted attacks on
organizations. Any ransom payments extorted
from the victims are then divided between the
ransomware developers and the affiliate who
conducted the attack.
W
H
A
T
S
N
E
X
T
I
N
C
Y
B
E
R
C
R
I
M
E
S
Successful approaches to cybersecurity will
include multi-prong defenses. It will involve
service providers and third-party expertise
even for organizations large enough to
employ comprehensive cybersecurity
technology and expert staff in-house. What
every organization needs to battle
cybercrime today, as well as tomorrow, is
security operations.
22. I. TRUE OR FALSE
1. Cyberbullying is when someone intimidates, harasses, threatens, or
denigrates another person online.
2. Email Phishing is a type of cybercrime in which an attacker gains access
to a victim's personal information to steal money.
3. The first cyber attack happened in France well before the internet was
even invented, in 1834.
4. Cybercrime is Illegal activities conducted through digital means, such as
hacking, identity theft, or spreading malware.
5. Criminal activity refers to actions that violate established laws and
regulations, often leading to legal consequences.
23. II. IDENTIFICATION
6. Social media users who impersonate another person by setting up a false online identity may be
breaking the law if the impersonator intends to hurt, defraud, or threaten others.
7. This type of cybercrime happens when an attacker gains access to a victim’s personal
information to steal money.
8. refers to actions that violate established laws and regulations, often leading to legal
consequences.
9. Unlawful taking of someone else's property with the intent to permanently deprive them of it.
10. Concealing the origins of illegally obtained money, typically by means of complex financial
transactions.
11. Republic Act No. ____ Data Privacy Act of 2012 is an act protecting individual personal
information.
12. Unauthorized access of or interference with computer systems, servers, or other information
and communication systems.
13. An act or instance of using or closely imitating the language and thoughts of another author.
14. Is a form of child sexual exploitation. Unlawful or prohibited acts defined and punishable by
Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer
system.
15. Is an unprivileged false statement of fact which tends to harm the reputation of a person
or company.