Lesson
15:Disadvantages
of ICT
Floro RaphaellBautista
Cybercrimes
Phishing/Spoofing is the attempt to obtain
sensitive information such as usernames,
passwords, and credit card details (and
money), often for malicious reasons, by
disguising as a trustworthy entity in an
electronic communication. Phishing emails
may contain links to websites that distribute
malware.
Cybercrimes
Blackmail refers to a situation that arises
when a person threatens another person
with some form of punishment if they do not
offer some form of concessions. Blackmail is
usually the result of one person somehow
obtaining embarassing information about
another and threatening to disclose it unless
some form of payment .
Cybercrimes
Accessing Stored Communications or
hacking is the act of obtaining
unauthorized access to data from a
computer network
Cybercrimes
Sports Betting the act of wagering on
any sports event over the internet. In
some countries, gambling is illegal even if
you’re doing it over the internet.
Cybercrimes
Non-delivery of Merchandise the act
of devising a scheme wherein a culprit
posts an item or service on the internet.
And once transactions are done does not
give the item or service.
Cybercrimes
Electronic Harassment the act of
anonymously using the internet to harass,
abuse, threaten or annoy other people.
This is also cyberbullying. However it is
hard to know who’s bullying you because
the user is anonymous.
Cybercrimes
Child Pornography the act of using the
internet to show child pornography. This is
highly punishable by law.
Cybercrimes
Prostitution the act of using
the internet to engage in
prostitution.
Cybercrimes
Drug Trafficking the act of
selling substances using the
internet.
Cybercrimes
Criminal Copyright Infringement
the act of piracy mainly for financial
gain.
Combatting Cybercrimes
Network Security is protection of the
access to files and directories in a
computer network against hacking,
misuse and unauthorized changes to
the system. An example of network
security is an anti virus system.
Combatting Cybercrimes
Investigation URL tracking and logging
are used by websites to track your unique
IP Address. This can be used to track
hackers.
Combatting Cybercrimes
Penalties more and more laws
are being implemented today to
fight cyber crimes. Penalties
include fine and imprisonment.
Post Test
Write T if the statement is true. Otherwise,
replace the underlined words to make it
true.
___1. Phishing is the attempt to obtain
sensitive information such as usernames,
passwords, and credit card details (and
money), often for malicious reasons, by
disguising as a trustworthy entity in an
electronic communication. Phishing emails
may contain links to websites that distribute
malware.
___2. Spoofing is the act obtaining unauthorized access to
data from a computer network.
___3. Extortion is the act of using the internet to threaten
or damage someone’s reputation to extort money or
anything else of value.
___4. Electronic harassment is also referred to as
cyberbullying.
___5. Non-delivery of service the act of devising a scheme
wherein a culprit posts an item or service on the internet.
And once transactions are done does not give the item or
service.
___6. Encryption is the process of converting raw
data to code.
___7. In piracy, trackers are used to identify IP
addresses currently sharing a pirated file.
___8. Wager gambling is the act of betting on any
sports event over the internet.
___9. Most email services today have spam or
bulk folder that automatically puts these
suspicious emails to that folder.
___10. Network Security is
protection of the access to files and
directories in a computer network
against hacking, misuse and
unauthorized changes to the
system. An example of network
security is an anti virus system.
Thanks
for
Reading

Disadvantages of-i ct-woww

  • 1.
  • 4.
    Cybercrimes Phishing/Spoofing is theattempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Phishing emails may contain links to websites that distribute malware.
  • 5.
    Cybercrimes Blackmail refers toa situation that arises when a person threatens another person with some form of punishment if they do not offer some form of concessions. Blackmail is usually the result of one person somehow obtaining embarassing information about another and threatening to disclose it unless some form of payment .
  • 6.
    Cybercrimes Accessing Stored Communicationsor hacking is the act of obtaining unauthorized access to data from a computer network
  • 7.
    Cybercrimes Sports Betting theact of wagering on any sports event over the internet. In some countries, gambling is illegal even if you’re doing it over the internet.
  • 8.
    Cybercrimes Non-delivery of Merchandisethe act of devising a scheme wherein a culprit posts an item or service on the internet. And once transactions are done does not give the item or service.
  • 9.
    Cybercrimes Electronic Harassment theact of anonymously using the internet to harass, abuse, threaten or annoy other people. This is also cyberbullying. However it is hard to know who’s bullying you because the user is anonymous.
  • 10.
    Cybercrimes Child Pornography theact of using the internet to show child pornography. This is highly punishable by law.
  • 11.
    Cybercrimes Prostitution the actof using the internet to engage in prostitution.
  • 12.
    Cybercrimes Drug Trafficking theact of selling substances using the internet.
  • 13.
    Cybercrimes Criminal Copyright Infringement theact of piracy mainly for financial gain.
  • 14.
    Combatting Cybercrimes Network Securityis protection of the access to files and directories in a computer network against hacking, misuse and unauthorized changes to the system. An example of network security is an anti virus system.
  • 15.
    Combatting Cybercrimes Investigation URLtracking and logging are used by websites to track your unique IP Address. This can be used to track hackers.
  • 16.
    Combatting Cybercrimes Penalties moreand more laws are being implemented today to fight cyber crimes. Penalties include fine and imprisonment.
  • 17.
    Post Test Write Tif the statement is true. Otherwise, replace the underlined words to make it true. ___1. Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Phishing emails may contain links to websites that distribute malware.
  • 18.
    ___2. Spoofing isthe act obtaining unauthorized access to data from a computer network. ___3. Extortion is the act of using the internet to threaten or damage someone’s reputation to extort money or anything else of value. ___4. Electronic harassment is also referred to as cyberbullying. ___5. Non-delivery of service the act of devising a scheme wherein a culprit posts an item or service on the internet. And once transactions are done does not give the item or service.
  • 19.
    ___6. Encryption isthe process of converting raw data to code. ___7. In piracy, trackers are used to identify IP addresses currently sharing a pirated file. ___8. Wager gambling is the act of betting on any sports event over the internet. ___9. Most email services today have spam or bulk folder that automatically puts these suspicious emails to that folder.
  • 20.
    ___10. Network Securityis protection of the access to files and directories in a computer network against hacking, misuse and unauthorized changes to the system. An example of network security is an anti virus system.
  • 21.