SlideShare a Scribd company logo
1 of 7
The Disadvantages of ICT
• Cybercrimes
• Combatting cybercrimes
At the end of this lesson, the students should be
able to:
1. understand the several problems ICT has created in
their generation; and
2. write a reflective essay on how ICT can change the
world for better or for worse.
Cybercrimes
Cybercrimes are illegal acts
done through the use of the
Internet.
In 2012, Stephen Nale (Complex.com)
posted a list of ten most common Internet
cybercrimes as follows:
1. Phishing/Spoofing – the act of sending multiple
emails to multiple users in hopes of having a
number of them clicking on the links or malwares
attached to the email.
2. Blackmail/Extortion – the act of using the
Internet to threaten or damage someone’s
reputation to extort money or anything else of
value. This can be avoided if you are aware of what
you should post on the Internet.
3. Accessing Stored Communications – or hacking; the act
of obtaining unauthorized access to data from a computer
network.
4. Sports Betting – the act of wagering on any sports event
over the Internet. In some countries, gambling (including
sports betting) is illegal even if you are doing it over the
Internet.
5. Non-Delivery of Merchandise – the act of devising a
scheme wherein a culprit posts an item or service for sale
over the Internet and once the transactions have been done,
does not really give the item or service.
6. Electronic Harassment – the act of anonymously using
the Internet to harass, abuse, threaten, or annoy other people.
7. Child Pornography – the act of using the Internet to show
child pornography. This act is highly punishable by law.
8. Drug Trafficking – the act of selling illegal substances
using the Internet.
9. Criminal Copyright Infringement – the act of piracy
mainly for financial gain. In late 2014, the number one pirate
website, ThePirateBay, was raided for the second time due to
years of pirating movies, music, games, books, and other
software. These kinds of websites earn money through
advertising.
Combatting Cybercrimes
1. Network Security. Before a hacker can get through the
unauthorized files he or she is targeting, the hacker has to
get through several security measures like firewalls, secure
connections, passwords, anti-malwares, and data
encryptions. The Disadvantages of ICT 177
2. Investigation. URL tracing and logging are used by
websites to track your unique IP addresses. This can be used
by investigators to trace hackers. In piracy, trackers are used
to identify IP addresses currently sharing a pirated file.
3. Penalties. More and more laws are being created and
implemented today. Penalties include both a fine and
imprisonment.

More Related Content

Similar to The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx

Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
sureshjogesh48
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 

Similar to The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx (20)

Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
4. ONLINE SAFETY.pptx
4. ONLINE SAFETY.pptx4. ONLINE SAFETY.pptx
4. ONLINE SAFETY.pptx
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
cybercreme.pptx
cybercreme.pptxcybercreme.pptx
cybercreme.pptx
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
CYBER2000.pptx
CYBER2000.pptxCYBER2000.pptx
CYBER2000.pptx
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 

More from AnecitaLCalamohoy (6)

intro to social sciences presentation ppt.
intro to social sciences presentation ppt.intro to social sciences presentation ppt.
intro to social sciences presentation ppt.
 
INFORMATION, COMMUNICATION AND TECHNOLOGY as platform form Change.pptx
INFORMATION, COMMUNICATION AND TECHNOLOGY as platform form Change.pptxINFORMATION, COMMUNICATION AND TECHNOLOGY as platform form Change.pptx
INFORMATION, COMMUNICATION AND TECHNOLOGY as platform form Change.pptx
 
BPGL- demonstration - with infographics.pptx
BPGL- demonstration - with infographics.pptxBPGL- demonstration - with infographics.pptx
BPGL- demonstration - with infographics.pptx
 
ADVANCED WORD PROCESSING SKILLS power point
ADVANCED WORD PROCESSING SKILLS power pointADVANCED WORD PROCESSING SKILLS power point
ADVANCED WORD PROCESSING SKILLS power point
 
How to Create an Effective Presentation in PowerPoint.pptx
How to Create an Effective Presentation in PowerPoint.pptxHow to Create an Effective Presentation in PowerPoint.pptx
How to Create an Effective Presentation in PowerPoint.pptx
 
PACKAGE PREPARED FOOD STUFF power points
PACKAGE PREPARED FOOD STUFF power pointsPACKAGE PREPARED FOOD STUFF power points
PACKAGE PREPARED FOOD STUFF power points
 

Recently uploaded

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

The disadvantages of USING INFORMATION, COOMUNICATION AND TECH.CT.pptx

  • 1. The Disadvantages of ICT • Cybercrimes • Combatting cybercrimes
  • 2. At the end of this lesson, the students should be able to: 1. understand the several problems ICT has created in their generation; and 2. write a reflective essay on how ICT can change the world for better or for worse.
  • 3. Cybercrimes Cybercrimes are illegal acts done through the use of the Internet.
  • 4. In 2012, Stephen Nale (Complex.com) posted a list of ten most common Internet cybercrimes as follows: 1. Phishing/Spoofing – the act of sending multiple emails to multiple users in hopes of having a number of them clicking on the links or malwares attached to the email. 2. Blackmail/Extortion – the act of using the Internet to threaten or damage someone’s reputation to extort money or anything else of value. This can be avoided if you are aware of what you should post on the Internet.
  • 5. 3. Accessing Stored Communications – or hacking; the act of obtaining unauthorized access to data from a computer network. 4. Sports Betting – the act of wagering on any sports event over the Internet. In some countries, gambling (including sports betting) is illegal even if you are doing it over the Internet. 5. Non-Delivery of Merchandise – the act of devising a scheme wherein a culprit posts an item or service for sale over the Internet and once the transactions have been done, does not really give the item or service. 6. Electronic Harassment – the act of anonymously using the Internet to harass, abuse, threaten, or annoy other people.
  • 6. 7. Child Pornography – the act of using the Internet to show child pornography. This act is highly punishable by law. 8. Drug Trafficking – the act of selling illegal substances using the Internet. 9. Criminal Copyright Infringement – the act of piracy mainly for financial gain. In late 2014, the number one pirate website, ThePirateBay, was raided for the second time due to years of pirating movies, music, games, books, and other software. These kinds of websites earn money through advertising.
  • 7. Combatting Cybercrimes 1. Network Security. Before a hacker can get through the unauthorized files he or she is targeting, the hacker has to get through several security measures like firewalls, secure connections, passwords, anti-malwares, and data encryptions. The Disadvantages of ICT 177 2. Investigation. URL tracing and logging are used by websites to track your unique IP addresses. This can be used by investigators to trace hackers. In piracy, trackers are used to identify IP addresses currently sharing a pirated file. 3. Penalties. More and more laws are being created and implemented today. Penalties include both a fine and imprisonment.

Editor's Notes

  1. Ask the students to share to the class an instance when they (or someone they know) became a victim of cybercrime. Ask the students what actions were done to take down their issue (in re: 1st item).
  2. Divide the class into groups, ask them to make an advertisement of their choice (slogan, role play, jingle) to campaign on fight against cyberbullying.