SlideShare a Scribd company logo
1 of 23
Download to read offline
CYBERCRIMES
Common
Forms of
Cybercrimes
Criminal
Activity
History,
Events,
Evolution
PRESENTER: DALUYIN, DAISY, GONZALES, RHEA & UMPIA, ISRA
WHAT IS CYBERCRIME?
• Cybercrime is a type of crime involving a
computer or a computer network.
• Cybercrimes pose a growing threat to individuals,
businesses, and governments worldwide.
• Republic Act No. 10175 Cybercrime Prevention Act
of 2012 is a law in the Philippines approved on
September 12, 2012, which aims to address legal
issues concerning online interactions
and internet.
• Republic Act No. 10173 Data Privacy Act of 2012is
an act protecting individual personal
information.
Example of a Computer
Virus in the Philippines:
The first computer virus in the
Philippines is known as the “ILOVEYOU”
virus also referred to as the “Love
Bug” or “Loveletter” virus. It emerged
on May 4, 2000, and quickly spread
globally, affecting millions of computer
systems worldwide.
Related PHL Law
Cybercrime Prevention Act of
2012Officially recorded as Republic Act No.
10175, is a law in the Philippines that was
approved on September 12, 2012. It aims to
address legal issues concerning online
interactions and the Internet in the
Philippines. Among the cybercrime
offenses included in the bill are
cybersquatting, cybersex, child
pornography, identity theft, illegal access
to data, and libel. One of the first laws in
the Philippines specifically criminalizes
computer crime.
Common Forms of Cybercrimes
01
Email phishing
• Is the most common
type of phishing, and it
has been in use since
the 1990s. Hackers
send these emails to
any email address they
can obtain.
02
Identity Theft
• This type of cybercrime
happens when an
attacker gains access to
a victim’s personal
information to steal
money, access
confidential data, or
commit tax or healthcare
insurance fraud.
03
Cyberbullying
• When someone
intimidates, harasses,
threatens, or denigrates
another person online, they
are engaging in
cyberbullying and can face
criminal charges. It is also
possible to face civil
liability for such activities.
04
Social Network Fraud
• Social media users
who impersonate
another person by
setting up a false
online identity may be
breaking the law if the
impersonator intends
to hurt, defraud, or
threaten others.
Common Forms of Cybercrimes
01
Email phishing
• Is the most common
type of phishing, and it
has been in use since
the 1990s. Hackers
send these emails to
any email address they
can obtain.
02
Identity Theft
• This type of cybercrime
happens when an
attacker gains access to
a victim’s personal
information to steal
money, access
confidential data, or
commit tax or healthcare
insurance fraud.
03
Cyberbullying
• When someone
intimidates, harasses,
threatens, or denigrates
another person online, they
are engaging in
cyberbullying and can face
criminal charges. It is also
possible to face civil
liability for such activities.
04
Social Network Fraud
• Social media users
who impersonate
another person by
setting up a false
online identity may be
breaking the law if the
impersonator intends
to hurt, defraud, or
threaten others.
Common Forms of Cybercrimes
01
Email phishing
• Is the most common
type of phishing, and it
has been in use since
the 1990s. Hackers
send these emails to
any email address they
can obtain.
02
Identity Theft
• This type of cybercrime
happens when an
attacker gains access to
a victim’s personal
information to steal
money, access
confidential data, or
commit tax or healthcare
insurance fraud.
03
Cyberbullying
• When someone
intimidates, harasses,
threatens, or denigrates
another person online, they
are engaging in
cyberbullying and can face
criminal charges. It is also
possible to face civil
liability for such activities.
04
Social Network Fraud
• Social media users
who impersonate
another person by
setting up a false
online identity may be
breaking the law if the
impersonator intends
to hurt, defraud, or
threaten others.
Common Forms of Cybercrimes
01
Email phishing
• Is the most common
type of phishing, and it
has been in use since
the 1990s. Hackers
send these emails to
any email address they
can obtain.
02
Identity Theft
• This type of cybercrime
happens when an
attacker gains access to
a victim’s personal
information to steal
money, access
confidential data, or
commit tax or healthcare
insurance fraud.
03
Cyberbullying
• When someone
intimidates, harasses,
threatens, or denigrates
another person online, they
are engaging in
cyberbullying and can face
criminal charges. It is also
possible to face civil
liability for such activities.
04
Social Network Fraud
• Social media users
who impersonate
another person by
setting up a false
online identity may be
breaking the law if the
impersonator intends
to hurt, defraud, or
threaten others.
Additional Common forms of Cybercrimes
Copyright
•The exclusive legal right, given to an originator or an assignee to print, publish,
perform, film, or record literary, artistic, or musical material, and to authorize
others to do the same.
• Copyright infringement is the violation, piracy or theft of a copyright holder's
exclusive rights through the unauthorizeduseof a copyrighted material or work.
Plagiarism
• An act or instance of using or closely imitating the language and thoughts of
another author
CRIMINAL ACTIVITY
- Criminal activity refers to
actions that violate established
laws and regulations, often
leading to legal consequences.
Criminal activities encompass a
wide range of behaviors that
are considered unlawful in a
given jurisdiction.
Examples of
Criminal Activities
include:
Theft:
Unlawful taking of
someone else's property
with the intent to
permanently deprive
them of it.
Fraud:
Deceptive practices with
the intent to gain
something of value, often
involve false
representation or
manipulation.
Cybercrime:
Illegal activities are
conducted through
digital means, such as
hacking, identity theft, or
spreading malware.
Money Laundering:
Concealing the origins of
illegally obtained money,
typically by means of
complex financial
transactions.
ADDITIONAL
CRIMINAL
ACTIVITIES
HACKING
Unauthorized
access to or
interference with
computer systems,
servers, or other
information and
communication
systems.
Unauthorized access to
corrupt, alter, steal, or
destroy electronic data using
computers
or other information and
communication systems
without the computer or
system owner’s
knowledge and consent
The introduction of
computer viruses
resulting in the
corruption,
alteration, theft, or
loss
of suchdata
Infection of IT
Systems with
Malware – if the act
is committed
against critical
infrastructure
of the Philippines,
the penalty is
between 12-20
years of reclusion
temporal
Six years up to
twelve years of
imprisonment also
known as prison
mayor.
CYBERSEX
Willful engagement, maintenance,
control, or operation, directly or
indirectly of any
lascivious exhibition of sexual
organs or sexual activity with the
aid of a computer system
for favor or consideration.
There is a discussion
on this matter if it
involves “couples” or
“people in
relationship” who
engage in cybersex.
Penalty at least
Php 200,000
and or prison
mayor
CHILD PORNOGRAPHY
Is a form of child sexual
exploitation. Unlawful or
prohibited acts defined and
punishable by Republic Act
No. 9775 or the Anti-Child
Pornography Act of 2009,
committed through a
computer system.
Penalty of 12-20
years of
imprisonment
or reclusion
temporal
CYBER DEFAMATION
Is an unprivileged
false statement of
fact which tends to
harm the reputation
of a person or
company.
Penalty of 6-12
years of
imprisonment or
prisonmayor.
History, Major Event and
Evolution of Cybercrime
Cybercrime = Criminal Activity
The first cyber attack happened in France well before the
internet was even invented, in 1834. Attackers stole the
financial market information by accessing the French
telegraph system. 20th century - digital revolution,
cybercriminals became early adopters of technology,
The same advanced technology used for
cybersecurity — including machine learning
and AI tools — is employed by today’s
cybercriminals too. And, as the big business
of cybercrime continues to grow, threat
actors have begun collaborating in a
ransomware-as-a-service (RaaS) model to
infiltrate organizations.The RaaS model allows
the developers of a ransomware variant to
recruit affiliates that exclusively use their
ransomware in targeted attacks on
organizations. Any ransom payments extorted
from the victims are then divided between the
ransomware developers and the affiliate who
conducted the attack.
W
H
A
T
S
N
E
X
T
I
N
C
Y
B
E
R
C
R
I
M
E
S
Successful approaches to cybersecurity will
include multi-prong defenses. It will involve
service providers and third-party expertise
even for organizations large enough to
employ comprehensive cybersecurity
technology and expert staff in-house. What
every organization needs to battle
cybercrime today, as well as tomorrow, is
security operations.
The same advanced technology used for
cybersecurity — including machine learning
and AI tools — is employed by today’s
cybercriminals too. And, as the big business
of cybercrime continues to grow, threat
actors have begun collaborating in a
ransomware-as-a-service (RaaS) model to
infiltrate organizations.The RaaS model allows
the developers of a ransomware variant to
recruit affiliates that exclusively use their
ransomware in targeted attacks on
organizations. Any ransom payments extorted
from the victims are then divided between the
ransomware developers and the affiliate who
conducted the attack.
W
H
A
T
S
N
E
X
T
I
N
C
Y
B
E
R
C
R
I
M
E
S
Successful approaches to cybersecurity will
include multi-prong defenses. It will involve
service providers and third-party expertise
even for organizations large enough to
employ comprehensive cybersecurity
technology and expert staff in-house. What
every organization needs to battle
cybercrime today, as well as tomorrow, is
security operations.
LET’S
TAKE A
QUIZ!
I. TRUE OR FALSE
1. Cyberbullying is when someone intimidates, harasses, threatens, or
denigrates another person online.
2. Email Phishing is a type of cybercrime in which an attacker gains access
to a victim's personal information to steal money.
3. The first cyber attack happened in France well before the internet was
even invented, in 1834.
4. Cybercrime is Illegal activities conducted through digital means, such as
hacking, identity theft, or spreading malware.
5. Criminal activity refers to actions that violate established laws and
regulations, often leading to legal consequences.
II. IDENTIFICATION
6. Social media users who impersonate another person by setting up a false online identity may be
breaking the law if the impersonator intends to hurt, defraud, or threaten others.
7. This type of cybercrime happens when an attacker gains access to a victim’s personal
information to steal money.
8. refers to actions that violate established laws and regulations, often leading to legal
consequences.
9. Unlawful taking of someone else's property with the intent to permanently deprive them of it.
10. Concealing the origins of illegally obtained money, typically by means of complex financial
transactions.
11. Republic Act No. ____ Data Privacy Act of 2012 is an act protecting individual personal
information.
12. Unauthorized access of or interference with computer systems, servers, or other information
and communication systems.
13. An act or instance of using or closely imitating the language and thoughts of another author.
14. Is a form of child sexual exploitation. Unlawful or prohibited acts defined and punishable by
Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer
system.
15. Is an unprivileged false statement of fact which tends to harm the reputation of a person
or company.

More Related Content

Similar to Computer and internet Cybercrime Reports

PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptxPPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
zyleflorence
 

Similar to Computer and internet Cybercrime Reports (20)

Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptxPPT-GEL Cyber Libel and Cyber Crime Protection.pptx
PPT-GEL Cyber Libel and Cyber Crime Protection.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Module vi mis
Module vi misModule vi mis
Module vi mis
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBERCRIME.pptx
CYBERCRIME.pptxCYBERCRIME.pptx
CYBERCRIME.pptx
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 

Recently uploaded

如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
hfkmxufye
 
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
AS
 
原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样
A
 
一比一原版布兰迪斯大学毕业证如何办理
一比一原版布兰迪斯大学毕业证如何办理一比一原版布兰迪斯大学毕业证如何办理
一比一原版布兰迪斯大学毕业证如何办理
A
 
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
B
 
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
Fi
 
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
musaddumba454
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
AS
 
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
Fir
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
AS
 

Recently uploaded (20)

如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
 
GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 
Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303
 
Subdomain enumeration is a crucial phase in cybersecurity, particularly durin...
Subdomain enumeration is a crucial phase in cybersecurity, particularly durin...Subdomain enumeration is a crucial phase in cybersecurity, particularly durin...
Subdomain enumeration is a crucial phase in cybersecurity, particularly durin...
 
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
 
原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样
 
The Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfThe Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdf
 
VIP ℂall Girls Bangalore 8250077686 WhatsApp: Me All Time Serviℂe Available D...
VIP ℂall Girls Bangalore 8250077686 WhatsApp: Me All Time Serviℂe Available D...VIP ℂall Girls Bangalore 8250077686 WhatsApp: Me All Time Serviℂe Available D...
VIP ℂall Girls Bangalore 8250077686 WhatsApp: Me All Time Serviℂe Available D...
 
一比一原版布兰迪斯大学毕业证如何办理
一比一原版布兰迪斯大学毕业证如何办理一比一原版布兰迪斯大学毕业证如何办理
一比一原版布兰迪斯大学毕业证如何办理
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
 
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
 
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
 
Free on Wednesdays T Shirts Free on Wednesdays Sweatshirts
Free on Wednesdays T Shirts Free on Wednesdays SweatshirtsFree on Wednesdays T Shirts Free on Wednesdays Sweatshirts
Free on Wednesdays T Shirts Free on Wednesdays Sweatshirts
 
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
 

Computer and internet Cybercrime Reports

  • 2. WHAT IS CYBERCRIME? • Cybercrime is a type of crime involving a computer or a computer network. • Cybercrimes pose a growing threat to individuals, businesses, and governments worldwide. • Republic Act No. 10175 Cybercrime Prevention Act of 2012 is a law in the Philippines approved on September 12, 2012, which aims to address legal issues concerning online interactions and internet. • Republic Act No. 10173 Data Privacy Act of 2012is an act protecting individual personal information.
  • 3. Example of a Computer Virus in the Philippines: The first computer virus in the Philippines is known as the “ILOVEYOU” virus also referred to as the “Love Bug” or “Loveletter” virus. It emerged on May 4, 2000, and quickly spread globally, affecting millions of computer systems worldwide. Related PHL Law Cybercrime Prevention Act of 2012Officially recorded as Republic Act No. 10175, is a law in the Philippines that was approved on September 12, 2012. It aims to address legal issues concerning online interactions and the Internet in the Philippines. Among the cybercrime offenses included in the bill are cybersquatting, cybersex, child pornography, identity theft, illegal access to data, and libel. One of the first laws in the Philippines specifically criminalizes computer crime.
  • 4. Common Forms of Cybercrimes 01 Email phishing • Is the most common type of phishing, and it has been in use since the 1990s. Hackers send these emails to any email address they can obtain. 02 Identity Theft • This type of cybercrime happens when an attacker gains access to a victim’s personal information to steal money, access confidential data, or commit tax or healthcare insurance fraud. 03 Cyberbullying • When someone intimidates, harasses, threatens, or denigrates another person online, they are engaging in cyberbullying and can face criminal charges. It is also possible to face civil liability for such activities. 04 Social Network Fraud • Social media users who impersonate another person by setting up a false online identity may be breaking the law if the impersonator intends to hurt, defraud, or threaten others.
  • 5. Common Forms of Cybercrimes 01 Email phishing • Is the most common type of phishing, and it has been in use since the 1990s. Hackers send these emails to any email address they can obtain. 02 Identity Theft • This type of cybercrime happens when an attacker gains access to a victim’s personal information to steal money, access confidential data, or commit tax or healthcare insurance fraud. 03 Cyberbullying • When someone intimidates, harasses, threatens, or denigrates another person online, they are engaging in cyberbullying and can face criminal charges. It is also possible to face civil liability for such activities. 04 Social Network Fraud • Social media users who impersonate another person by setting up a false online identity may be breaking the law if the impersonator intends to hurt, defraud, or threaten others.
  • 6. Common Forms of Cybercrimes 01 Email phishing • Is the most common type of phishing, and it has been in use since the 1990s. Hackers send these emails to any email address they can obtain. 02 Identity Theft • This type of cybercrime happens when an attacker gains access to a victim’s personal information to steal money, access confidential data, or commit tax or healthcare insurance fraud. 03 Cyberbullying • When someone intimidates, harasses, threatens, or denigrates another person online, they are engaging in cyberbullying and can face criminal charges. It is also possible to face civil liability for such activities. 04 Social Network Fraud • Social media users who impersonate another person by setting up a false online identity may be breaking the law if the impersonator intends to hurt, defraud, or threaten others.
  • 7. Common Forms of Cybercrimes 01 Email phishing • Is the most common type of phishing, and it has been in use since the 1990s. Hackers send these emails to any email address they can obtain. 02 Identity Theft • This type of cybercrime happens when an attacker gains access to a victim’s personal information to steal money, access confidential data, or commit tax or healthcare insurance fraud. 03 Cyberbullying • When someone intimidates, harasses, threatens, or denigrates another person online, they are engaging in cyberbullying and can face criminal charges. It is also possible to face civil liability for such activities. 04 Social Network Fraud • Social media users who impersonate another person by setting up a false online identity may be breaking the law if the impersonator intends to hurt, defraud, or threaten others.
  • 8. Additional Common forms of Cybercrimes Copyright •The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same. • Copyright infringement is the violation, piracy or theft of a copyright holder's exclusive rights through the unauthorizeduseof a copyrighted material or work. Plagiarism • An act or instance of using or closely imitating the language and thoughts of another author
  • 9. CRIMINAL ACTIVITY - Criminal activity refers to actions that violate established laws and regulations, often leading to legal consequences. Criminal activities encompass a wide range of behaviors that are considered unlawful in a given jurisdiction.
  • 11. Theft: Unlawful taking of someone else's property with the intent to permanently deprive them of it. Fraud: Deceptive practices with the intent to gain something of value, often involve false representation or manipulation. Cybercrime: Illegal activities are conducted through digital means, such as hacking, identity theft, or spreading malware. Money Laundering: Concealing the origins of illegally obtained money, typically by means of complex financial transactions.
  • 13. HACKING Unauthorized access to or interference with computer systems, servers, or other information and communication systems. Unauthorized access to corrupt, alter, steal, or destroy electronic data using computers or other information and communication systems without the computer or system owner’s knowledge and consent The introduction of computer viruses resulting in the corruption, alteration, theft, or loss of suchdata Infection of IT Systems with Malware – if the act is committed against critical infrastructure of the Philippines, the penalty is between 12-20 years of reclusion temporal Six years up to twelve years of imprisonment also known as prison mayor.
  • 14. CYBERSEX Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration. There is a discussion on this matter if it involves “couples” or “people in relationship” who engage in cybersex. Penalty at least Php 200,000 and or prison mayor
  • 15. CHILD PORNOGRAPHY Is a form of child sexual exploitation. Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system. Penalty of 12-20 years of imprisonment or reclusion temporal
  • 16. CYBER DEFAMATION Is an unprivileged false statement of fact which tends to harm the reputation of a person or company. Penalty of 6-12 years of imprisonment or prisonmayor.
  • 17. History, Major Event and Evolution of Cybercrime Cybercrime = Criminal Activity The first cyber attack happened in France well before the internet was even invented, in 1834. Attackers stole the financial market information by accessing the French telegraph system. 20th century - digital revolution, cybercriminals became early adopters of technology,
  • 18.
  • 19. The same advanced technology used for cybersecurity — including machine learning and AI tools — is employed by today’s cybercriminals too. And, as the big business of cybercrime continues to grow, threat actors have begun collaborating in a ransomware-as-a-service (RaaS) model to infiltrate organizations.The RaaS model allows the developers of a ransomware variant to recruit affiliates that exclusively use their ransomware in targeted attacks on organizations. Any ransom payments extorted from the victims are then divided between the ransomware developers and the affiliate who conducted the attack. W H A T S N E X T I N C Y B E R C R I M E S Successful approaches to cybersecurity will include multi-prong defenses. It will involve service providers and third-party expertise even for organizations large enough to employ comprehensive cybersecurity technology and expert staff in-house. What every organization needs to battle cybercrime today, as well as tomorrow, is security operations.
  • 20. The same advanced technology used for cybersecurity — including machine learning and AI tools — is employed by today’s cybercriminals too. And, as the big business of cybercrime continues to grow, threat actors have begun collaborating in a ransomware-as-a-service (RaaS) model to infiltrate organizations.The RaaS model allows the developers of a ransomware variant to recruit affiliates that exclusively use their ransomware in targeted attacks on organizations. Any ransom payments extorted from the victims are then divided between the ransomware developers and the affiliate who conducted the attack. W H A T S N E X T I N C Y B E R C R I M E S Successful approaches to cybersecurity will include multi-prong defenses. It will involve service providers and third-party expertise even for organizations large enough to employ comprehensive cybersecurity technology and expert staff in-house. What every organization needs to battle cybercrime today, as well as tomorrow, is security operations.
  • 22. I. TRUE OR FALSE 1. Cyberbullying is when someone intimidates, harasses, threatens, or denigrates another person online. 2. Email Phishing is a type of cybercrime in which an attacker gains access to a victim's personal information to steal money. 3. The first cyber attack happened in France well before the internet was even invented, in 1834. 4. Cybercrime is Illegal activities conducted through digital means, such as hacking, identity theft, or spreading malware. 5. Criminal activity refers to actions that violate established laws and regulations, often leading to legal consequences.
  • 23. II. IDENTIFICATION 6. Social media users who impersonate another person by setting up a false online identity may be breaking the law if the impersonator intends to hurt, defraud, or threaten others. 7. This type of cybercrime happens when an attacker gains access to a victim’s personal information to steal money. 8. refers to actions that violate established laws and regulations, often leading to legal consequences. 9. Unlawful taking of someone else's property with the intent to permanently deprive them of it. 10. Concealing the origins of illegally obtained money, typically by means of complex financial transactions. 11. Republic Act No. ____ Data Privacy Act of 2012 is an act protecting individual personal information. 12. Unauthorized access of or interference with computer systems, servers, or other information and communication systems. 13. An act or instance of using or closely imitating the language and thoughts of another author. 14. Is a form of child sexual exploitation. Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system. 15. Is an unprivileged false statement of fact which tends to harm the reputation of a person or company.