SlideShare a Scribd company logo
RUBI R. ORBETA, BUCAF
ATD
• The Cybercrime Prevention Act of 2012,
officially recorded as Republic Act No. 10175,
is a law in the Philippines approved on
September 12, 2012. It aims to address legal
issues concerning online interactions and the
Internet in the Philippines.
The Internet is an amazing tool for
communication, allowing users to connect
instantly over great distances. Unfortunately, the
reach and anonymity the network provides is also
a great tool for criminals, who have taken
advantage of the global network to ply their trade.
There are many different types of cyber crime, and
understanding the most common crimes and
frauds can help you avoid becoming a victim.
• To protect yourself from cybercrime, you
need to familiarize yourself with all the
different kinds. There’s just no going around
it. After all, you can’t defend yourself against
something you don’t know, right? Here are of
six major types of cybercrime that you should
know about.
1. Hacking
By definition, hacking is the unauthorized
accessing of a single device (such as a laptop
or a smartphone) or a computer network, and
those who engage in the activity are called
hackers.
Keep in mind, though, that in the strictest
sense of the word, hacking is not illegal in and
of itself, and is therefore not a crime. It is simply
a skill, and it is what people can do with this
skill that may be illegal.
2. Cyber stalking
Cyber stalking is the use of the internet
and various online platforms within as well
as other electronic devices to stalk, harass,
or blackmail any person or group. In some
cases, cyber stalking can escalate to
physical violence, rape, and even murder.
3. Online identity theft
This is when a person is able to steal your
personal information (Social Security number, credit card
information, bank account numbers) through online
means. It can be achieved in a variety of ways such as
email phishing, malware injection, and brute force
hacking.
In terms of financial loss as well as the serious
hassle it causes, identity theft is one of the most
destructive forms of cybercrime. In one fell swoop, a
cybercriminal can take over your finances and take your
money.
4. Online child abuse
This is, without a doubt, the most heinous
type of cybercrime. There are many activities
that constitute online child abuse including the
downloading, selling, and distribution of child
pornography through websites and forums and
the solicitation of children for sex via
chatrooms.
Along with cyberstalking, online child
abuse (and child abuse in general) is a federal
crime under the U.S. Code.
5. Ransomware attack
A ransomware attack is when a cybercriminal
injects a specific kind of malware (called
ransomware) into your device. Ransomware gets its
name because it is designed to block access to your
data until a certain amount is paid, thereby holding it
for ransom. In most cases, ransoms are demanded
to be paid in bitcoins or other cryptocurrencies.
Ransomware attacks also cause significant
financial damage. In 2017, it was reported that the
global cost of ransomware exceeded $5 billion
dollars.
6. Internet fraud (online scams)
The purpose of an online scam is for you the
victim, into willingly giving up money under false
pretenses. One typical scenario is called the “charity
fraud”. Here, a criminal appeals to your sense of
righteousness by posing as a representative of a
charitable organization dedicated to a meaningful
cause like cancer or AIDS research. After spinning
you around, the perpetrator will then ask for a hefty
donation, which can be a either a one-time payment
or a series of payments.
1. Tighten your current security system. Your system and
all the software your organization uses offer guidelines
for maximizing security controls that you should follow.
Some are as simple as turning off unnecessary services or
using the lowest privileges settings.
2. Use patches. All it takes is a tiny hole in your system for
hackers to poke their way in. It’s critical to run regular
scans of your security system and all software to keep
them updated with patches.
3. Protect outbound data. Just as you protect your
system from incoming malware and bots with a firewall,
you need to make sure certain data never leaves your
system. It’s important to focus on egress filtering, to
prevent rogue employees or employees making honest
mistakes from releasing sensitive data or malicious
software from your network.
4. Raise awareness. It’s important for everyone in
the organization to be savvy and alert about
security issues. This means watching for phishing
scams sent through email and messaging apps that
appear bonafide but are actually attempts to
retrieve credentials or sensitive data or release
malware into the system.
5. Be smart about passwords. Most organizations
have password policies that address reuse and
strength of user passwords. But one area that often
is overlooked is the local administrator’s PC
password is the same as the password used on
servers. It wouldn’t take a hacker long to infiltrate
the entire system and create internal and external
havoc with that information.
6. Don’t ignore physical security. Just as you wouldn’t
leave your car keys in the ignition of your car for thieves,
you shouldn’t leave ID badges, credit cards, personnel
and financial files, and cell phones/tablets lying around.
Staff should be trained to keep these items on their
person or locked away when not in use.
7. Encrypt data. All PCs and personal information stored
in databases and on servers should be encrypted. This is
the best way to protect against hackers gaining access to
sensitive data.
8. Purchase a Cyber Insurance policy. If you do
experience a cyber breach, a solid Cyber insurance policy
will cover your losses and costs to repair the damage.
The Major Types of Cybercrime
The Major Types of Cybercrime
The Major Types of Cybercrime

More Related Content

What's hot

Fingerprint classification rules
Fingerprint classification rulesFingerprint classification rules
Fingerprint classification rulesKUL2700
 
Ransomeware
RansomewareRansomeware
Ransomeware
Abul Hossain Ripon
 
MALWARE
MALWAREMALWARE
MALWARE
Anupam Das
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Crime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino CitezenCrime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino Citezen
Kenneth Malte
 
Cybersex law
Cybersex lawCybersex law
Cybersex law
Ronnel Fernandez
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
Maricrs Alfarö
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Alapan Banerjee
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtCell Site Analysis (CSA)
 
Internet threats
Internet threatsInternet threats
Internet threats
GicelDelaCruz
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Exposé hackers
Exposé hackersExposé hackers
Exposé hackers
PaulineBouveau
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collection
gagan deep
 
Digital law
Digital lawDigital law
Digital law
Alieyn_
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
Onkar1431
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mohan Robert
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
Arah Louise
 
Cyber crime
Cyber crimeCyber crime

What's hot (20)

Fingerprint classification rules
Fingerprint classification rulesFingerprint classification rules
Fingerprint classification rules
 
Ransomeware
RansomewareRansomeware
Ransomeware
 
MALWARE
MALWAREMALWARE
MALWARE
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Crime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino CitezenCrime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino Citezen
 
Cybersex law
Cybersex lawCybersex law
Cybersex law
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Exposé hackers
Exposé hackersExposé hackers
Exposé hackers
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collection
 
Digital law
Digital lawDigital law
Digital law
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Organized crime preview
Organized crime previewOrganized crime preview
Organized crime preview
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to The Major Types of Cybercrime

Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
Muhammad Umar Farooq
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
RajviNikeetaRathore
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra22
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
Aswani34
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
AnnMarieTAquinoII
 
cyber crime
cyber crimecyber crime
cyber crime
priya sehgal
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
Neeraj Ahirwar
 
techalpha07
techalpha07techalpha07
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
amberkhan59
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 
Internet security
Internet securityInternet security
Internet security
Mohamed El-malki
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
homeworkping4
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
Gaurav Patel
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
CA.Kolluru Narayanarao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
Kolluru N Rao
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 

Similar to The Major Types of Cybercrime (20)

Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
techalpha07
techalpha07techalpha07
techalpha07
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Internet security
Internet securityInternet security
Internet security
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 

Recently uploaded

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 

Recently uploaded (20)

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 

The Major Types of Cybercrime

  • 1. RUBI R. ORBETA, BUCAF ATD
  • 2. • The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No. 10175, is a law in the Philippines approved on September 12, 2012. It aims to address legal issues concerning online interactions and the Internet in the Philippines.
  • 3. The Internet is an amazing tool for communication, allowing users to connect instantly over great distances. Unfortunately, the reach and anonymity the network provides is also a great tool for criminals, who have taken advantage of the global network to ply their trade. There are many different types of cyber crime, and understanding the most common crimes and frauds can help you avoid becoming a victim.
  • 4. • To protect yourself from cybercrime, you need to familiarize yourself with all the different kinds. There’s just no going around it. After all, you can’t defend yourself against something you don’t know, right? Here are of six major types of cybercrime that you should know about.
  • 5. 1. Hacking By definition, hacking is the unauthorized accessing of a single device (such as a laptop or a smartphone) or a computer network, and those who engage in the activity are called hackers. Keep in mind, though, that in the strictest sense of the word, hacking is not illegal in and of itself, and is therefore not a crime. It is simply a skill, and it is what people can do with this skill that may be illegal.
  • 6.
  • 7. 2. Cyber stalking Cyber stalking is the use of the internet and various online platforms within as well as other electronic devices to stalk, harass, or blackmail any person or group. In some cases, cyber stalking can escalate to physical violence, rape, and even murder.
  • 8.
  • 9. 3. Online identity theft This is when a person is able to steal your personal information (Social Security number, credit card information, bank account numbers) through online means. It can be achieved in a variety of ways such as email phishing, malware injection, and brute force hacking. In terms of financial loss as well as the serious hassle it causes, identity theft is one of the most destructive forms of cybercrime. In one fell swoop, a cybercriminal can take over your finances and take your money.
  • 10.
  • 11. 4. Online child abuse This is, without a doubt, the most heinous type of cybercrime. There are many activities that constitute online child abuse including the downloading, selling, and distribution of child pornography through websites and forums and the solicitation of children for sex via chatrooms. Along with cyberstalking, online child abuse (and child abuse in general) is a federal crime under the U.S. Code.
  • 12.
  • 13. 5. Ransomware attack A ransomware attack is when a cybercriminal injects a specific kind of malware (called ransomware) into your device. Ransomware gets its name because it is designed to block access to your data until a certain amount is paid, thereby holding it for ransom. In most cases, ransoms are demanded to be paid in bitcoins or other cryptocurrencies. Ransomware attacks also cause significant financial damage. In 2017, it was reported that the global cost of ransomware exceeded $5 billion dollars.
  • 14.
  • 15. 6. Internet fraud (online scams) The purpose of an online scam is for you the victim, into willingly giving up money under false pretenses. One typical scenario is called the “charity fraud”. Here, a criminal appeals to your sense of righteousness by posing as a representative of a charitable organization dedicated to a meaningful cause like cancer or AIDS research. After spinning you around, the perpetrator will then ask for a hefty donation, which can be a either a one-time payment or a series of payments.
  • 16.
  • 17.
  • 18. 1. Tighten your current security system. Your system and all the software your organization uses offer guidelines for maximizing security controls that you should follow. Some are as simple as turning off unnecessary services or using the lowest privileges settings. 2. Use patches. All it takes is a tiny hole in your system for hackers to poke their way in. It’s critical to run regular scans of your security system and all software to keep them updated with patches. 3. Protect outbound data. Just as you protect your system from incoming malware and bots with a firewall, you need to make sure certain data never leaves your system. It’s important to focus on egress filtering, to prevent rogue employees or employees making honest mistakes from releasing sensitive data or malicious software from your network.
  • 19. 4. Raise awareness. It’s important for everyone in the organization to be savvy and alert about security issues. This means watching for phishing scams sent through email and messaging apps that appear bonafide but are actually attempts to retrieve credentials or sensitive data or release malware into the system. 5. Be smart about passwords. Most organizations have password policies that address reuse and strength of user passwords. But one area that often is overlooked is the local administrator’s PC password is the same as the password used on servers. It wouldn’t take a hacker long to infiltrate the entire system and create internal and external havoc with that information.
  • 20. 6. Don’t ignore physical security. Just as you wouldn’t leave your car keys in the ignition of your car for thieves, you shouldn’t leave ID badges, credit cards, personnel and financial files, and cell phones/tablets lying around. Staff should be trained to keep these items on their person or locked away when not in use. 7. Encrypt data. All PCs and personal information stored in databases and on servers should be encrypted. This is the best way to protect against hackers gaining access to sensitive data. 8. Purchase a Cyber Insurance policy. If you do experience a cyber breach, a solid Cyber insurance policy will cover your losses and costs to repair the damage.

Editor's Notes

  1. The cost of cyber insurance depends upon several risk factors but for most small businesses annual premiums will range from $1,000 to $7,500.