Computer and internet Cybercrime Reports

jcgevana 77 views 23 slides Apr 27, 2024
Slide 1
Slide 1 of 23
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23

About This Presentation

internet Cybercrime


Slide Content

CYBERCRIMES
Common
Forms of
Cybercrimes
Criminal
Activity
History,
Events,
Evolution
PRESENTER: DALUYIN, DAISY, GONZALES, RHEA & UMPIA, ISRA

WHAT IS CYBERCRIME?
•Cybercrimeisatypeofcrimeinvolvinga
computeroracomputernetwork.
• Cybercrimes pose a growing threat to individuals,
businesses, and governments worldwide.
• Republic Act No. 10175 Cybercrime Prevention Act
of 2012 is a law in the Philippines approved on
September 12, 2012, which aims to address legal
issues concerning online interactions
and internet.
• Republic Act No. 10173 Data Privacy Act of 2012 is
an act protecting individual personal
information.

Example of a Computer
Virus in the Philippines:
Thefirstcomputervirusinthe
Philippinesisknownasthe“ILOVEYOU”
virusalsoreferredtoasthe“Love
Bug”or“Loveletter”virus.Itemerged
onMay4,2000,andquicklyspread
globally,affectingmillionsofcomputer
systemsworldwide.
Related PHL Law
CybercrimePreventionActof
2012OfficiallyrecordedasRepublicActNo.
10175,isalawinthePhilippinesthatwas
approvedonSeptember12,2012.Itaimsto
addresslegalissuesconcerningonline
interactionsandtheInternetinthe
Philippines.Amongthecybercrime
offensesincludedinthebillare
cybersquatting,cybersex,child
pornography,identitytheft,illegalaccess
todata,andlibel.Oneofthefirstlawsin
thePhilippinesspecificallycriminalizes
computercrime.

Common Forms of Cybercrimes
01
Email phishing
• Is the most common
type of phishing, and it
has been in use since
the 1990s. Hackers
send these emails to
any email address they
can obtain.
02
Identity Theft
• This type of cybercrime
happens when an
attacker gains access to
a victim’s personal
information to steal
money, access
confidential data, or
commit tax or healthcare
insurance fraud.
03
Cyberbullying
• When someone
intimidates, harasses,
threatens, or denigrates
another person online, they
are engaging in
cyberbullying and can face
criminal charges. It is also
possible to face civil
liability for such activities.
04
Social Network Fraud
• Social media users
who impersonate
another person by
setting up a false
online identity may be
breaking the law if the
impersonator intends
to hurt, defraud, or
threaten others.

Common Forms of Cybercrimes
01
Email phishing
• Is the most common
type of phishing, and it
has been in use since
the 1990s. Hackers
send these emails to
any email address they
can obtain.
02
Identity Theft
• This type of cybercrime
happens when an
attacker gains access to
a victim’s personal
information to steal
money, access
confidential data, or
commit tax or healthcare
insurance fraud.
03
Cyberbullying
• When someone
intimidates, harasses,
threatens, or denigrates
another person online, they
are engaging in
cyberbullying and can face
criminal charges. It is also
possible to face civil
liability for such activities.
04
Social Network Fraud
• Social media users
who impersonate
another person by
setting up a false
online identity may be
breaking the law if the
impersonator intends
to hurt, defraud, or
threaten others.

Common Forms of Cybercrimes
01
Email phishing
• Is the most common
type of phishing, and it
has been in use since
the 1990s. Hackers
send these emails to
any email address they
can obtain.
02
Identity Theft
• This type of cybercrime
happens when an
attacker gains access to
a victim’s personal
information to steal
money, access
confidential data, or
commit tax or healthcare
insurance fraud.
03
Cyberbullying
• When someone
intimidates, harasses,
threatens, or denigrates
another person online, they
are engaging in
cyberbullying and can face
criminal charges. It is also
possible to face civil
liability for such activities.
04
Social Network Fraud
• Social media users
who impersonate
another person by
setting up a false
online identity may be
breaking the law if the
impersonator intends
to hurt, defraud, or
threaten others.

Common Forms of Cybercrimes
01
Email phishing
• Is the most common
type of phishing, and it
has been in use since
the 1990s. Hackers
send these emails to
any email address they
can obtain.
02
Identity Theft
• This type of cybercrime
happens when an
attacker gains access to
a victim’s personal
information to steal
money, access
confidential data, or
commit tax or healthcare
insurance fraud.
03
Cyberbullying
• When someone
intimidates, harasses,
threatens, or denigrates
another person online, they
are engaging in
cyberbullying and can face
criminal charges. It is also
possible to face civil
liability for such activities.
04
Social Network Fraud
• Social media users
who impersonate
another person by
setting up a false
online identity may be
breaking the law if the
impersonator intends
to hurt, defraud, or
threaten others.

Additional Common forms of Cybercrimes
Copyright
•Theexclusivelegalright,giventoanoriginatororanassigneetoprint,publish,
perform,film,orrecordliterary,artistic,ormusicalmaterial,andtoauthorize
otherstodothesame.
•Copyrightinfringementistheviolation,piracyortheftofacopyrightholder's
exclusiverightsthroughtheunauthorizeduseofacopyrightedmaterialorwork.
Plagiarism
•Anactorinstanceofusingorcloselyimitatingthelanguageandthoughtsof
anotherauthor

CRIMINALACTIVITY
-Criminalactivityrefersto
actionsthatviolateestablished
lawsandregulations,often
leadingtolegalconsequences.
Criminalactivitiesencompassa
widerangeofbehaviorsthat
areconsideredunlawfulina
givenjurisdiction.

Examples of
Criminal Activities
include:

Theft:
Unlawful taking of
someone else's property
with the intent to
permanently deprive
them of it.
Fraud:
Deceptive practices with
the intent to gain
something of value, often
involve false
representation or
manipulation.
Cybercrime:
Illegal activities are
conducted through
digital means, such as
hacking, identity theft, or
spreading malware.
Money Laundering:
Concealing the origins of
illegally obtained money,
typically by means of
complex financial
transactions.

ADDITIONAL
CRIMINAL
ACTIVITIES

HACKING
Unauthorized
access to or
interference with
computer systems,
servers, or other
information and
communication
systems.
Unauthorized access to
corrupt, alter, steal, or
destroy electronic data using
computers
or other information and
communication systems
without the computer or
system owner’s
knowledge and consent
The introduction of
computer viruses
resulting in the
corruption,
alteration, theft, or
loss
of such data
Infection of IT
Systems with
Malware – if the act
is committed
against critical
infrastructure
of the Philippines,
the penalty is
between 12-20
years of reclusion
temporal
Six years up to
twelve years of
imprisonment also
known as prison
mayor.

CYBERSEX
Willful engagement, maintenance,
control, or operation, directly or
indirectly of any
lascivious exhibition of sexual
organs or sexual activity with the
aid of a computer system
for favor or consideration.
There is a discussion
on this matter if it
involves “couples” or
“people in
relationship” who
engage in cybersex.
Penalty at least
Php 200,000
and or prison
mayor

CHILD PORNOGRAPHY
Is a form of child sexual
exploitation. Unlawful or
prohibited acts defined and
punishable by Republic Act
No. 9775 or the Anti-Child
Pornography Act of 2009,
committed through a
computer system.
Penalty of 12-20
years of
imprisonment
or reclusion
temporal

CYBER DEFAMATION
Is an unprivileged
false statement of
fact which tends to
harm the reputation
of a person or
company.
Penalty of 6-12
years of
imprisonment or
prison mayor.

History, Major Event and
Evolution of Cybercrime
Cybercrime = Criminal Activity
ThefirstcyberattackhappenedinFrancewellbeforethe
internetwaseveninvented,in1834.Attackersstolethe
financialmarketinformationbyaccessingtheFrench
telegraphsystem.20thcentury-digitalrevolution,
cybercriminalsbecameearlyadoptersoftechnology,

The same advanced technology used for
cybersecurity — including machine learning
and AI tools — is employed by today’s
cybercriminals too. And, as the big business
of cybercrime continues to grow, threat
actors have begun collaborating in a
ransomware-as-a-service (RaaS) model to
infiltrate organizations.The RaaS model allows
the developers of a ransomware variant to
recruit affiliates that exclusively use their
ransomware in targeted attacks on
organizations. Any ransom payments extorted
from the victims are then divided between the
ransomware developers and the affiliate who
conducted the attack.
W
H
A
T
S

N
E
X
T

I
N

C
Y
B
E
R
C
R
I
M
E
S
Successful approaches to cybersecurity will
include multi-prong defenses. It will involve
service providers and third-party expertise
even for organizations large enough to
employ comprehensive cybersecurity
technology and expert staff in-house. What
every organization needs to battle
cybercrime today, as well as tomorrow, is
security operations.

The same advanced technology used for
cybersecurity — including machine learning
and AI tools — is employed by today’s
cybercriminals too. And, as the big business
of cybercrime continues to grow, threat
actors have begun collaborating in a
ransomware-as-a-service (RaaS) model to
infiltrate organizations.The RaaS model allows
the developers of a ransomware variant to
recruit affiliates that exclusively use their
ransomware in targeted attacks on
organizations. Any ransom payments extorted
from the victims are then divided between the
ransomware developers and the affiliate who
conducted the attack.
W
H
A
T
S

N
E
X
T

I
N

C
Y
B
E
R
C
R
I
M
E
S
Successful approaches to cybersecurity will
include multi-prong defenses. It will involve
service providers and third-party expertise
even for organizations large enough to
employ comprehensive cybersecurity
technology and expert staff in-house. What
every organization needs to battle
cybercrime today, as well as tomorrow, is
security operations.

LET’S
TAKE A
QUIZ!

I. TRUE OR FALSE
1. Cyberbullying is when someone intimidates, harasses, threatens, or
denigrates another person online.
2. Email Phishing is a type of cybercrime in which an attacker gains access
to a victim's personal information to steal money.
3. The first cyber attack happened in France well before the internet was
even invented, in 1834.
4. Cybercrime is Illegal activities conducted through digital means, such as
hacking, identity theft, or spreading malware.
5. Criminal activity refers to actions that violate established laws and
regulations, often leading to legal consequences.

II. IDENTIFICATION
6. Social media users who impersonate another person by setting up a false online identity may be
breaking the law if the impersonator intends to hurt, defraud, or threaten others.
7. This type of cybercrime happens when an attacker gains access to a victim’s personal
information to steal money.
8. refers to actions that violate established laws and regulations, often leading to legal
consequences.
9. Unlawful taking of someone else's property with the intent to permanently deprive them of it.
10. Concealing the origins of illegally obtained money, typically by means of complex financial
transactions.
11. Republic Act No. ____ Data Privacy Act of 2012 is an act protecting individual personal
information.
12. Unauthorized access of or interference with computer systems, servers, or other information
and communication systems.
13. An act or instance of using or closely imitating the language and thoughts of another author.
14. Is a form of child sexual exploitation. Unlawful or prohibited acts defined and punishable by
Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer
system.
15. Is an unprivileged false statement of fact which tends to harm the reputation of a person
or company.