DLP 5 Computer Crimes and Fraud
DLP 5 Computer Crimes and Fraud
DLP 5 Computer Crimes and Fraud
ACTIVITY NO. :6
SUBJECT : Empowerment Technology (For the Strand)
TOPIC/s : Computer Crimes, Fraud and Internet Threats.
OBJECTIVE/s : Enumerate and explain the different computer crimes and fraud.
: Appreciate the importance of knowing this cybercrime activities.
: Visualize the cybercrime activities in our society through poster making.
Introduction
The advancement of ICT technologies have opened a vast opportunity for everyone, young and adult to use
cheaper mobile gadgets and portable computers with great features. This has created what we call the online community.
An online community is a community that is formed on the internet where a group of people are interacting, sharing, and
working toward a common goal. In an online community, members interact via social networks.
Internet security refers to computer security specifically related to the internet, often involving browser security
but also network security on a more general level as it applies to other applications or other operating systems on a
whole. Its objective is to establish rules and measures to use against attacks over internet.
Computer Fraud uses computers, the internet, internet devices and internet services to deceive people,
companies, or government agencies of money, revenue, or internet access.
Republic Act No. 10175 – Cybercrime prevention act of 2012. Aims to address legal issues concerning online
interactions and internet.
Cyber – means relating to, or involving computer or computer network.
Cyberspace – refers to the virtual computer world, and more specifically, is an electronic medium used to form a
global computer network to facilitate online communication.
Cybercrime – refers to the criminal activities carried out by means of computers or the internet.
1. Hacking – refers to the practice of modifying or altering computer software and hardware to accomplish a
goal that is considered to be outside of the creator's original objective.
2. Phishing – is the attempt to obtain sensitive information such as usernames, passwords, and credit card
details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an
electronic communication.
3. Illegal Downloading – refers to obtaining files that you do not have the right to use from the Internet.
4. Digital Piracy – refers to the practice of illegally copying and selling digital music, video, computer software,
etc.
5. Identity Theft - is the deliberate use of someone else's identity, usually as a method to gain a financial
advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's
disadvantage or loss
6. Distributed Denial of Services (DDoS) – is one in which a multitude of compromised systems attack a
single target, thereby causing denial of service for users of the targeted system.
7. Social Engineering – the art of manipulating people so they give up confidential information.
8. Trojan Horse – a booby trap in the form of an email attachment. If you download the attachment, it unleashes
a virus on your computer. The virus may wipe files from system and suck up personal data for identity thieves.
9. Cyber-Harassment – can be Cyberstalking and Cyberbullying. These are not about stealing money or
identities. They are personal attacks, targeting someone online just as some bullies and stalkers target
victims offline.
a. Cyberbullying - is the use of technology to torment, threaten, harass or embarrass another person
using the internet or other technologies such as posting embarrassing pictures on social media or
sending hurtful or threatening text messages.
b. Cyberstalking – a crime using internet, email, or other types of electronic communications to stalk,
harass, or threaten another person. It often involves harassing emails, instant or text messages, or
social media posts, or creating websites for the sole purpose of tormenting the victim.
c. Cyber Defamation – is an unprivileged false statement of fact which tends to harm the reputation of
a person or company
Two types of Defamation:
1. Slander – Verbal
2. Libel – Written
d. Cybersex – is a virtual sex encounter in which two or more people (connected remotely via internet)
send each other sexually explicit contents or sexually explicit acts
e. Child Pornography – is a form of child sexual exploitation
10. 419 Scam – is named for a section of the Nigerian legal code, because it often involves emails sent from
Nigeria.
11. Intrusion – a computer system is compromised by breaking the security of such a system or causing it to
enter into an insecure state or other users can gain unauthorized access to a system. The system data are
accessed without permission.
Internet Threats
1. Malware – stands for malicious software.
a. Virus - a malicious program designed to replicate itself and transfer from one computer to
another either through the internet and local networks or data storage like flash drives and CD’s.
b. Worm – a malicious program that transfers from one computer to another by any type of means.
Often, it uses a computer network to spread itself.
c. Trojan – a malicious program that is disguised as a useful program but once downloaded or installed,
leaves your PC unprotected and allows hackers to get your information.
d. Spyware – a program that runs in the background without you knowing it (thus called “spy”). It has
the ability to monitor what you are currently doing and typing through keylogging.
*keyloggers – used to record the keystroke done by the users. This is done to steal their
password or any other sensitive information. It can record email, messages, or any information
you type using your keyboard.
e. Adware – a program designed to send your advertisements, mostly as pop-ups.
2. Spam – unwanted email mostly from bots or advertisers. It can be used to send malware.
ACTIVITY
On a long bond paper, make a poster visualizing the specific cybercrime activities in our society. Make it creative
Rubrics:
Creativity – 5
Message – 5
Relativity – 5
Total – 15 pts