basic awareness of cyber crime and prevention tips for responsible use of internet.
Size: 2.12 MB
Language: en
Added: Mar 06, 2025
Slides: 39 pages
Slide Content
Prepared by: Gerald Kevin P. Hernandez, RCrim, MSCJ
Introduction Today an increasing number of companies are connecting to the Internet to support sales activities or to provide their employees and customers with faster information and services. The virtual world has taken over the real one, E- business and E-commerce, which are the new mantras and electronic transactions and dominate the overall business paradigm. In this rapidly evolving e- world that depends on free flowing information, security is the major problem to be considered.
What is Cybercrime I s criminal activity that either targets or uses a computer, a computer network or a networked device. Most cybercrime is committed by cybercriminals or hackers who want to make money. However, occasionally cybercrime aims to damage computers or networks for reasons other than profit. These could be political or personal.
Categories Cyber crimes Cyber crimes can be basically divided into 3 major categories: Cyber crimes against persons. Cyber crimes against property. Cyber crimes against government.
Against Person Cybercrimes committed against persons include various crimes like transmission of child pornography, harassment of any one with the use of a computer such as email, and cyber stalking. The distribution, posting, and dissemination of absence material including pornography, and child pornography constitutes one of the most important cybercrimes known today. The potential harm of such a crime to humanity can hardly be overstated.
Against Property The second category of cyber crime is that of cybercrimes against all forms of property. These crimes include unauthorized computer trespassing through cyberspace, computer vandalism, transmission of harmful programs, and unauthorized possessions of computerized information.
Against Government The third category of cybercrimes relate to cybercrimes against government .cyber terrorism is one distinct kind of crime in this category . The growth of internet has shown that the medium of cyberspace is being used by individuals and groups to the international governments also threaten the citizens of a country. This crime manifests itself into terrorism when an individual “cracks “ into a government of military maintained website.
Implementing Rules and Regulations of Republic Act No. 10175
RULE 2 Punishable Acts and Penalties Offenses against the confidentiality, integrity and availability of computer data and systems shall be punished with imprisonment of prision mayor or a fine of at least Two Hundred Thousand Pesos (P200,000.00) up to a maximum amount commensurate to the damage incurred, or both ;
Illegal Access The access to the whole or any part of a computer system without right (Unauthorized access to a computer system or network). This is also in a form of hacking.
Illegal Interception The interception made by technical means and without right, of any non-public transmission of computer data to, from, or within a computer system, including electromagnetic emissions from a computer system carrying such computer data:
Data/ System Interference The intentional alteration, or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document or electronic data message, without right or authority, including the introduction or transmission of viruses.
Cybersquatting Is the unauthorized registration and use of Internet domain names that are identical or similar to trademarks, service marks, company names, or personal names.
Computer-related Identity Theft The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right: Provided, That if no damage has yet been caused, the penalty imposable shall be one (1) degree lower.
Computer-related Fraud It is the act of someone manipulates computer data or system to cause financial harm or obtain unjust advantage .
Cybersex The willful engagement, maintenance, control or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration. Any person found guilty cybersex shall be punished with imprisonment of prision mayor, or a fine of at least Two Hundred Thousand Pesos (P200,000.00), but not exceeding One Million Pesos (P1,000,000.00), or both.
Libel The unlawful or prohibited acts of libel, as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future shall be punished with prision correccional in its maximum period to prision mayor in its minimum period or a fine ranging from Six Thousand Pesos (P6,000.00) up to the maximum amount determined by Court, or both, in addition to the civil action which may be brought by the offended party: Provided, That this provision applies only to the original author of the post or online libel, and not to others who simply receive the post and react to it.
Credit Card Fraud Modern business is quickly replacing cash with deposits transacted on computer system creating computer fraud. Credit card information as well as personal and financial information on credit card has been frequently targeted by organized criminal crimes. Assets represented in data format often have a considerably higher value than traditionally economic assets resulting in potentially greater economic class.
Phishing Phishing, the mass distribution of “spoofed” e- mail messages, which appear to come from banks, insurance agencies, retailers or credit card companies and are designed to fool recipients into divulging personal data such as account names, passwords, or credit card numbers.
Examples: -Received an Email with a link from an unknown sender. -Received a text message telling you that you won in a raffle even you did not join any. -Received a text message asking for your OTP.
How to Make Sure a Website is Secure The padlock symbol on a web browser simply means that the data being sent between the web server and the user's computer is encrypted and cannot be read by others.
Malware – is where a computer system or network is infected with a computer virus or other typeof malware. Examples of common malware include viruses, worms, Trojan viruses, spyware, adware, and ransomware. Recent malware attacks have exfiltrated data in mass amounts.
How to get infected by Malware Downloading pirated software/programs from the internet. Clicking Pop-ups from a website Websites that contains applet programs.
Cyber stalking Cyber stalking is a new form of internet crime in our society when a person is pursued or followed online. A cyber stalker doesn’t physically follow his victim; he does it virtually by following his online activity to harvest information about the stalk and harass him or her and make threats using verbal intimidation. It’s an invasion of one’s online privacy.
Threatening The criminal sends threatening email or comes in contact in chat rooms with victim.
SEC. 2. Acts of Bullying. – For purposes of this Act, “bullying” shall refer to any severe or repeated use by one or more students of a written, verbal or electronic expression, or a physical act or gesture, or any combination thereof, directed at another student that has the effect of actually causing or placing the latter in reasonable fear of physical or emotional harm or damage to his property; creating a hostile environment at school for the other student; infringing on the rights of the other student at school; or materially and substantially disrupting the education process or the orderly operation of a school;
Any slanderous statement or accusation that causes the victim undue emotional distress like directing foul language or profanity at the target, name-calling, tormenting and commenting negatively on victim’s looks, clothes and body; and Cyber-bullying or any bullying done through the use of technology or any electronic means.
Prevention of cyber crime
Keep your software and operating systems updated. Use anti-virus software and keep it updated. Always use strong password. Never open attached from an unknown sender. Do not click on links in spam emails or untrusted websites. Never giver out personal information unless secure. Always check which website URLs you are visiting. Ignore text messages from unknown sender.