SlideShare a Scribd company logo
1 of 12
President Ramon Magsaysay State University Computer Engineering Department
Living in the
Information Technology
Era
Lesson 5
Cybercrimes
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
Cybercrimes
It is the Characteristics of the culture of computers,
information, technology and virtual reality.
• Cybercrime is defined as a crime in which a computer
is the object of the crime (hacking, phishing,
spamming and child pornography) is used as a tool to
commit an offense.
• Cybercriminals may use computer technology to
access personal information, business trade secrets or
use the internet for exploitative or malicious
purposes.
What is Cyber?
Republic Act No. 10175 Cybercrime Prevention Act of
2012
a law in the Philippines approved on September 12,2012
which aims to address legal issues concerning online
interactions and internet.
Republic Act No. 10173 Data Privacy Act of 2012 I
An act protecting individual personal information.
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
Common Forms Of Cybercrimes
a. Copyright
The exclusive legal right, given to an originator or an
assignee to print, publish, perform, film, or record
literary, artistic, or musical material, and to authorize
others to do the same.
Copyright infringement is the violation, piracy or theft of
a copyright holder's exclusive rights through the
unauthorized use of a copyrighted material or work.
b. Plagiarism
An act or instance of using or closely imitating the
language and thoughts of another author without
authorization.
c. Computer Addiction
• Offline: generally used when speaking about
excessive gaming behavior, which can be practiced
both offline and online.
• Online: Also known as “Internet Addiction”, gets more
attention in general from scientific research than
offline computer addiction, mainly because most
cases of computer addiction are related to the
excessive use of the Internet.
• Virtual Self – The persona you create about
yourself virtually.
4
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
Attackers
• Hackers – computer hobbyist who enjoy pushing
computer system to their limits
• Crackers – obsessed with gaining entry to highly
secure computer systems
• Cyber Gang – bring crackers together by means of the
internet and physical meetings.
• Computer virus Author – Makers of Computer Viruses
• Disgruntled Employees – Kick out employees
• Fraud Artist – Swindlers & Shills
5
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era 6
Criminal Activities
• Unauthorized access of or interference with
computer systems, servers, or other information and
communication systems
• Unauthorized access to corrupt, alter, steal, or
destroy electronic data using computers or other
information and communication systems without the
computer or system owner’s knowledge and consent.
• The introduction of computer viruses resulting in the
corruption, alteration, theft, or loss of such data
• Illegal Access
• Illegal Interception
• Data Interference
a. Hacking
• System Interference
• Misuse of Devices
• Infection of IT Systems with Malware – if the act is
committed against critical infrastructure of the
Philippines the, penalty is between 12-20 years
reclusion temporal
• Six years up to twelve years of imprisonment also
known as prison mayor.
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
Types of Hackers
White Hat Hackers
White Hat hackers are also known as Ethical Hackers.
They are never intent to harm a system, rather they try
to find out weaknesses in a computer or a network
system as a part of penetration testing and vulnerability
assessments.
Black Hat Hackers
Black Hat hackers, also known as crackers, are those who
hack to gain unauthorized access to a system and harm
its operations or steal sensitive information.
Black Hat hacking is always illegal because of its bad
intent which includes stealing corporate data, violating
privacy, damaging the system, blocking network
communication, etc.
Grey Hat Hackers
Grey hat hackers are a blend of both black hat and white
hat hackers. They act without malicious intent but for
their fun, they exploit a security weakness in a computer
system or network without the owner’s permission or
knowledge.
Their intent is to bring the weakness to the attention of
the owners and getting appreciation or a little bounty
from the owners.
Miscellaneous Hackers
Apart from the above well-known classes of hackers, we
have the following categories of hackers based on what
they hack and how they do it.
7
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era
Types of Hackers
Red Hat Hackers
Red hat hackers are again a blend of both black hat and
white hat hackers. They are usually on the level of
hacking government agencies, top-secret information
hubs, and generally anything that falls under the
category of sensitive information.
Blue Hat Hackers
A blue hat hacker is someone outside computer security
consulting firms who is used to bug-test a system prior
to its launch. They look for loopholes that can be
exploited and try to close these gaps. Microsoft also uses
the term Blue Hat to represent a series of security
briefing events.
Elite Hackers
This is a social status among hackers, which is used to
describe the most skilled. Newly discovered exploits will
circulate among these hackers.
Script Kiddie
A script kiddie is a non-expert who breaks into computer
systems by using pre-packaged automated tools written
by others, usually with little understanding of the
underlying concept, hence the term Kiddie.
Neophyte
A neophyte, "n00b", or "newbie" or "Green Hat Hacker"
is new to hacking or phreaking and has almost no
knowledge or experience of the workings of technology
and hacking.
8
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era 9
Criminal Activities
• An attempt to obtain sensitive information such as
usernames, passwords, and credit card details and
(indirectly money), often for malicious reasons.
• Phishing
• Pharming
• Spam
• Maximum of Php 200,000 fine or prison mayor
b. Computer-related forgery, fraud and/or identity theft
• Illegal Downloading
• Obtaining files that you do not have the right to use
from the internet.
• Digital Piracy
• Practice of illegally copying and selling digital music,
video, computer software, etc.
• Copyright Infringement
• Penalty of Php 50,000 – 500, 000 and or prison mayor
c. Electronic theft
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era 10
Criminal Activities
• The use of electronic communication to bully a
person, typically by sending a message of an
intimidating or threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)
d. Cyberbullying
• Willful engagement, maintenance, control, or
operation, directly or indirectly of any lascivious
exhibition of sexual organs or sexual activity with the
aid of a computer system for favor or consideration.
• There is a discussion on this matter if it involves
“couples” or “people in relationship” who engage in
cybersex.
• Penalty at least Php 200,000 and or prison mayor
e. Cybersex
By: Engr. Froilan G. Cantillo
GEE 4 Living in the IT Era 11
Criminal Activities
• Is a form of child sexual exploitation.
• Polytechnic University of the Philippines
• Unlawful or prohibited acts defined and punishable
by Republic Act No. 9775 or the Anti-
• Child Pornography Act of 2009, committed through a
computer system.
• Penalty of 12-20 years of imprisonment or reclusion
temporal
f. Child Pornography
• Is an unprivileged false statement of fact which tends
to harm the reputation of a person or company.
• Penalty of 6-12 years of imprisonment or prison
mayor.
g. Cyber Defamation
End of Lesson 5
12
Any Questions?

More Related Content

What's hot

World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and InternetJanecatalla
 
How the internet_works
How the internet_worksHow the internet_works
How the internet_worksarun nalam
 
Living in the IT Era - Lesson 1.pptx
Living in the IT Era - Lesson 1.pptxLiving in the IT Era - Lesson 1.pptx
Living in the IT Era - Lesson 1.pptxFroilan Cantillo
 
Chapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide WebChapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide WebPatty Ramsey
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security Arah Louise
 
Internet Presentation
Internet PresentationInternet Presentation
Internet PresentationGerard Sylvester
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpointJannahAboulhassan
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ictcyb1337
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet CrimeGerman Teran
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin itRushana Bandara
 
The Internet: All about the Internet
The Internet: All about the InternetThe Internet: All about the Internet
The Internet: All about the InternetSweetLynStockwell
 
Module 6 current trends and emerging technologies
Module 6  current trends and emerging technologiesModule 6  current trends and emerging technologies
Module 6 current trends and emerging technologiesEclaro College
 
The Internet and the World Wide Web
The Internet and the World Wide WebThe Internet and the World Wide Web
The Internet and the World Wide Webdpd
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
Reflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessReflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessMark Jhon Oxillo
 

What's hot (20)

World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and Internet
 
How the internet_works
How the internet_worksHow the internet_works
How the internet_works
 
Living in the IT Era - Lesson 1.pptx
Living in the IT Era - Lesson 1.pptxLiving in the IT Era - Lesson 1.pptx
Living in the IT Era - Lesson 1.pptx
 
Chapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide WebChapter 2 The Internet & World Wide Web
Chapter 2 The Internet & World Wide Web
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
The Internet: All about the Internet
The Internet: All about the InternetThe Internet: All about the Internet
The Internet: All about the Internet
 
Module 6 current trends and emerging technologies
Module 6  current trends and emerging technologiesModule 6  current trends and emerging technologies
Module 6 current trends and emerging technologies
 
The Internet and the World Wide Web
The Internet and the World Wide WebThe Internet and the World Wide Web
The Internet and the World Wide Web
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Reflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessReflecting on the ICT Learning Process
Reflecting on the ICT Learning Process
 

Similar to Living in the IT Era - Lesson 5.pptx

What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?Daniel Agudo Garcia
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxchrixymae
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeDivithC
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human rightAgustina
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber CrimeSyangba132
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Solomon Oho
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethicsMuhammad Umar Farooq
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptxMouradAKenk
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyDee Green
 

Similar to Living in the IT Era - Lesson 5.pptx (20)

What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptx
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copy
 
Hacking
HackingHacking
Hacking
 

More from Froilan Cantillo

Living in the IT Era - Lesson 9.pptx
Living in the IT Era - Lesson 9.pptxLiving in the IT Era - Lesson 9.pptx
Living in the IT Era - Lesson 9.pptxFroilan Cantillo
 
Living in the IT Era - Lesson 2.pptx
Living in the IT Era - Lesson 2.pptxLiving in the IT Era - Lesson 2.pptx
Living in the IT Era - Lesson 2.pptxFroilan Cantillo
 
Living in the IT Era - Lesson 2.2.pptx
Living in the IT Era - Lesson 2.2.pptxLiving in the IT Era - Lesson 2.2.pptx
Living in the IT Era - Lesson 2.2.pptxFroilan Cantillo
 
Living in the IT Era - Lesson 8.pptx
Living in the IT Era - Lesson 8.pptxLiving in the IT Era - Lesson 8.pptx
Living in the IT Era - Lesson 8.pptxFroilan Cantillo
 
Introduction to AutoCAD
Introduction to AutoCADIntroduction to AutoCAD
Introduction to AutoCADFroilan Cantillo
 
01_Introduction to living in the it era
01_Introduction to living in the it era01_Introduction to living in the it era
01_Introduction to living in the it eraFroilan Cantillo
 
Program Logic and Design
Program Logic and DesignProgram Logic and Design
Program Logic and DesignFroilan Cantillo
 

More from Froilan Cantillo (7)

Living in the IT Era - Lesson 9.pptx
Living in the IT Era - Lesson 9.pptxLiving in the IT Era - Lesson 9.pptx
Living in the IT Era - Lesson 9.pptx
 
Living in the IT Era - Lesson 2.pptx
Living in the IT Era - Lesson 2.pptxLiving in the IT Era - Lesson 2.pptx
Living in the IT Era - Lesson 2.pptx
 
Living in the IT Era - Lesson 2.2.pptx
Living in the IT Era - Lesson 2.2.pptxLiving in the IT Era - Lesson 2.2.pptx
Living in the IT Era - Lesson 2.2.pptx
 
Living in the IT Era - Lesson 8.pptx
Living in the IT Era - Lesson 8.pptxLiving in the IT Era - Lesson 8.pptx
Living in the IT Era - Lesson 8.pptx
 
Introduction to AutoCAD
Introduction to AutoCADIntroduction to AutoCAD
Introduction to AutoCAD
 
01_Introduction to living in the it era
01_Introduction to living in the it era01_Introduction to living in the it era
01_Introduction to living in the it era
 
Program Logic and Design
Program Logic and DesignProgram Logic and Design
Program Logic and Design
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

Living in the IT Era - Lesson 5.pptx

  • 1. President Ramon Magsaysay State University Computer Engineering Department Living in the Information Technology Era
  • 3. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era Cybercrimes It is the Characteristics of the culture of computers, information, technology and virtual reality. • Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense. • Cybercriminals may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes. What is Cyber? Republic Act No. 10175 Cybercrime Prevention Act of 2012 a law in the Philippines approved on September 12,2012 which aims to address legal issues concerning online interactions and internet. Republic Act No. 10173 Data Privacy Act of 2012 I An act protecting individual personal information.
  • 4. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era Common Forms Of Cybercrimes a. Copyright The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same. Copyright infringement is the violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work. b. Plagiarism An act or instance of using or closely imitating the language and thoughts of another author without authorization. c. Computer Addiction • Offline: generally used when speaking about excessive gaming behavior, which can be practiced both offline and online. • Online: Also known as “Internet Addiction”, gets more attention in general from scientific research than offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the Internet. • Virtual Self – The persona you create about yourself virtually. 4
  • 5. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era Attackers • Hackers – computer hobbyist who enjoy pushing computer system to their limits • Crackers – obsessed with gaining entry to highly secure computer systems • Cyber Gang – bring crackers together by means of the internet and physical meetings. • Computer virus Author – Makers of Computer Viruses • Disgruntled Employees – Kick out employees • Fraud Artist – Swindlers & Shills 5
  • 6. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era 6 Criminal Activities • Unauthorized access of or interference with computer systems, servers, or other information and communication systems • Unauthorized access to corrupt, alter, steal, or destroy electronic data using computers or other information and communication systems without the computer or system owner’s knowledge and consent. • The introduction of computer viruses resulting in the corruption, alteration, theft, or loss of such data • Illegal Access • Illegal Interception • Data Interference a. Hacking • System Interference • Misuse of Devices • Infection of IT Systems with Malware – if the act is committed against critical infrastructure of the Philippines the, penalty is between 12-20 years reclusion temporal • Six years up to twelve years of imprisonment also known as prison mayor.
  • 7. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era Types of Hackers White Hat Hackers White Hat hackers are also known as Ethical Hackers. They are never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments. Black Hat Hackers Black Hat hackers, also known as crackers, are those who hack to gain unauthorized access to a system and harm its operations or steal sensitive information. Black Hat hacking is always illegal because of its bad intent which includes stealing corporate data, violating privacy, damaging the system, blocking network communication, etc. Grey Hat Hackers Grey hat hackers are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge. Their intent is to bring the weakness to the attention of the owners and getting appreciation or a little bounty from the owners. Miscellaneous Hackers Apart from the above well-known classes of hackers, we have the following categories of hackers based on what they hack and how they do it. 7
  • 8. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era Types of Hackers Red Hat Hackers Red hat hackers are again a blend of both black hat and white hat hackers. They are usually on the level of hacking government agencies, top-secret information hubs, and generally anything that falls under the category of sensitive information. Blue Hat Hackers A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also uses the term Blue Hat to represent a series of security briefing events. Elite Hackers This is a social status among hackers, which is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. Script Kiddie A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept, hence the term Kiddie. Neophyte A neophyte, "n00b", or "newbie" or "Green Hat Hacker" is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking. 8
  • 9. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era 9 Criminal Activities • An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons. • Phishing • Pharming • Spam • Maximum of Php 200,000 fine or prison mayor b. Computer-related forgery, fraud and/or identity theft • Illegal Downloading • Obtaining files that you do not have the right to use from the internet. • Digital Piracy • Practice of illegally copying and selling digital music, video, computer software, etc. • Copyright Infringement • Penalty of Php 50,000 – 500, 000 and or prison mayor c. Electronic theft
  • 10. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era 10 Criminal Activities • The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature. • The Anti-Bullying Act of 2013 (RA 10627) d. Cyberbullying • Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration. • There is a discussion on this matter if it involves “couples” or “people in relationship” who engage in cybersex. • Penalty at least Php 200,000 and or prison mayor e. Cybersex
  • 11. By: Engr. Froilan G. Cantillo GEE 4 Living in the IT Era 11 Criminal Activities • Is a form of child sexual exploitation. • Polytechnic University of the Philippines • Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti- • Child Pornography Act of 2009, committed through a computer system. • Penalty of 12-20 years of imprisonment or reclusion temporal f. Child Pornography • Is an unprivileged false statement of fact which tends to harm the reputation of a person or company. • Penalty of 6-12 years of imprisonment or prison mayor. g. Cyber Defamation
  • 12. End of Lesson 5 12 Any Questions?