Download
cybercrimes and scams except cyber squatting and piracy n.
Skip this Video
Loading SlideShow in 5 Seconds..
Cybercrimes and scams except cyber squatting and piracy PowerPoint Presentation
Download Presentation
Cybercrimes and scams except cyber squatting and piracy

Cybercrimes and scams except cyber squatting and piracy

139 Views Download Presentation
Download Presentation

Cybercrimes and scams except cyber squatting and piracy

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Cybercrimes and scams except cyber squatting and piracy Bacarro, Caballes, Dela Paz, Inciong, Lasco, Tan

  2. Good Sides of Internet • Not only communication, the internet has also given people an easier way of getting information that they need. The internet has also contributed to business. The internet is a great communication system for the people to use. The internet is worldwide that you can actually open a conversation to people at any part of the world. What makes the internet good is that it makes the jobs of people easier.

  3. Bad Sides of Internet • One of which is that people are given easier way of getting misleading information. People can access sites that contain this misleading information in the touch of a button. Through the internet, the people were able to spread bad things. The internet has also caused so much addiction. Stress is something that spending time on the internet can do.

  4. What people do with the internet? Internet made the communication on the world very fast and convenient, thus people used the internet for many different things

  5. Business • People today can order goods online from certain sites with suppliers. d. Education – Most of the time students use the internet to do their homework. f. Entertainment – Many people use the internet to have fun. They can play internet games and can play multiplayer games through the internet. People also can watch videos that are posted in sites like YouTube. Sadly many use the internet for dirty entertainment.

  6. Education • Most of the time students use the internet to do their homework. It is because of its convenience, especially the search engines. This makes the time used for completing the requirement decrease significantly.

  7. Advertisement • Many companies nowadays invest in online advertisements. They advertise through the internet because many use it. They place their ads on sites that are popular and are regularly visited. So if a percentage of people who visit that site will see their ad and those who might want to buy their product may be interested to buy.

  8. Entertainment • Many people use the internet to have fun. They can play internet games and can play multiplayer games through the internet. People also can watch videos that are posted in sites like YouTube. There are also joke sites that one can visit. Sadly many use the internet for dirty entertainment.

  9. Information • The internet is shared by people over the world. There are newspaper sites that have compilations of news article. There are also some educational sites for many different things. With so many people who put in information in the internet there is a high possibility that you can get the information you need.

  10. Freedom of Expression • People post what they feel, experience and other things on their blogs which they want to share to other people. The people can also comment on blogs that are posted. There are also people who post their art works in sites which were made for the sole purpose of art.

  11. Cybercrimes • Ordinary Crimes • All ordinary crimes, when done over a network/computer system are considered cyber crimes. • Examples are: • Fraud • Embezzlement • Theft • Blackmail • Etc.

  12. Privacy Infringement • Hacking • Security Exploit - Exploiting a known vulnerability in a computer system • Packet Sniffer - Reading random packets of information for passwords, etc. • Rootkit - A small program or bit of code which disguises itself as part of the OS, but allows the hacker to take control of the victim’s computer. • Social Engineering - Not really hacking in the technical sense, it is befriending and/or impersonating an acquaintance of a person in order to get his/her information. • Malware • Trojan Horse - a program which pretends to do one thing but in fact does another task without the user’s consent. • Virus - “a self-replicating program that spreads by inserting copies of itself into other executable code or documents.” - Wikipedia • Worm - Much like a virus, it is self-replicating, but unlike a virus, it can travel by itself through network connections, and does not need a “host”. • Key Logger - A program which notes the keys which a user presses and sends them back to the propagator of the logger.

  13. Intercepting Data • Pharming • Rerouting the victim to a bogus website in an attempt to gain sensitive information • Spoofing attack / Phishing • Faking a program or website, making it seem legitimate in an attempt to gain sensitive information. • Child Harassment • A special case of crime because it is much more rampant in the internet as compared to analogue means. • Child Pornography • “A visual depiction of any kind, including a drawing, cartoon, sculpture, or painting, photograph, film, video, or computer-generated image or picture, whether made or produced by electronic, mechanical, or other means, of sexually explicit conduct, where it:

  14. depicts a minor engaging in sexually explicit conduct and is obscene, or • depicts an image that is, or appears to be, of a minor engaging in graphic bestiality, sadistic or masochistic abuse, or sexual intercourse, including genital-genital, oral-genital, anal-genital, or oral-anal, whether between persons of the same or opposite sex, and such depiction lacks serious literary, artistic, political, or scientific value.” - taken from http://www.missingkids.com

  15. Minors are defined to be anyone younger than 18 years of age. • The victims of this act are usually kidnapped, sold, or otherwise forced, against their will, to comply. • Many children are found in “kids only” online chat rooms where minors meet to discuss whatever tickles their fancy. Many of the victims taken from chat rooms are also a victim of Child Grooming.

  16. Child Grooming • It is defined as befriending or otherwise establishing an emotional connection with a child and his/her family with the intent to sexually harass the child. • This is done because: • Children will more often than not fail to report an incident which involves someone with whom they have a close relationship. • The parents of the children will find it harder to believe any cases of child molestation if the perpetrator is a close friend of theirs. • Although the act in itself is illegal, the steps towards it are not, and the intent to commit the act is hard to prove.

  17. SEC. 33. Penalties. R.A.8792 • c) Violations of the Consumer Act or Republic Act No. 7394 and other relevant or pertinent laws through transactions covered by or using electronic data messages or electronic documents, shall be penalized with the same penalties as provided in those laws; • d) Other violations of the provisions of this Act, shall be penalized with a maximum penalty of one million pesos (P1,000,000.00) or six (6) years imprisonment.

  18. The Love Bug • In early May of 2000, a computer virus known as the "love bug" emerged and spread rapidly around the globe. According to one report, the virus, which was designed to disseminate itself and to destroy various kinds of files on a victim's computer, "infected at least 270,000 computers in the first hours" after it was released.[6] The "love bug" forced the shutdown of computers at large corporations such as Ford Motor Company and Dow Chemical Company, as well as the computer system at the House of Lords.[7] • After security experts determined that the virus had come from the Philippines, investigators from the Philippines and from the United States set about tracking down the person(s) who created and disseminated it. They were frustrated in this effort by the Philippines' lack of computer crime laws: For one thing, it took days for investigators to obtain a warrant to search the home of their primary suspect; local prosecutors had to comb through Philippines statutes to find laws that might apply to the dissemination of the virus, and then had to persuade a judge to issue a search warrant on the basis of one possibility

  19. .[8] For another, when a suspect-Onel de Guzman-was eventually apprehended, there were no laws criminalizing what he had done. The Philippines had no statutes making it a crime to break into a computer system, to disseminate a virus or other harmful software or to use a computer in an attempt to commit theft. Lacking the ability to charge de Guzman with precisely what he had done-e.g., with disseminating a virus-Philippine prosecutors charged him with theft and with violating a statute that covered credit card fraud.[9] Those charges were eventually dropped after the Department of Justice determined that "the credit card law [did] not apply to computer hacking and that investigators did not present adequate evidence to support the theft charge." [10] • The "love bug" destroyed files and impeded e-mail traffic in more than twenty countries. [11] Some estimated that the virus caused $10 billion in damage, much of that in lost productivity.[12] The episode prompted the Philippines to adopt a cybercrime law that established fines and prison sentences for those hacked into computer systems and/or disseminated viruses or other harmful programs.[13] The new law could not be applied retroactively against the individual suspect of disseminating the "love bug" virus, so that crime went uncharged.

  20. Internet Security The internet is filled with things that could make cripple computers or make them malfunction. Generally, avoiding viruses can be done with the use of both antivirus programs and the practice of safe computing.

  21. Computer Sec. (automated) • There are programs that specialize in fighting spyware, or programs that moderate what goes in and out of your computer (firewall programs). Security programs work well when they are updated frequently. The common criteria for antivirus programs are: speed, detection rate, and features, and pricing.

  22. Personal Security • The general idea of safe computing is using common sense to see which sources of files are trusted and which aren't. Some files take on smart names like "funny UST scandal" to entice users to open it. Generally speaking, .exe files that are not from trusted sources should not be opened.