Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

00 2nd Sem (Midterms) - Empotech

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

The perpetrator registers and uses

EMPOTECH Do not re-sell this reviewer:)


Original: NewEye-07_Yve Elle
internet domain names that are
identical or similar to company names
______________________________________ (i.e., Go0gle.com instead of
Google.com), personal names, trademarks,
LESSON 1: ONLINE SAFETY, SECURITY,
product names, service marks, and so on,
ETHICS, AND ETIQUETTE
with malicious intent to profit from the
Cybercrime actual brand/trademark owner in one way or
another.
also called computer crime, the use of a
• Computer-Related Identity Theft -
computer as an instrument to further illegal
occurs when someone steals your personal
ends, such as committing fraud, trafficking in
information—such as your Social Security
child pornography and intellectual property,
Number, bank account number, and credit
stealing identities, or violating privacy. card information.
 criminal activity or a crime that involves • Unsolicited Commercial
the Internet, a computer system, or Communications – include voice mails or
computer technology: identity theft, SMS made via telecommunications service
phishing, and other kinds of cybercrime. for the purpose of informing about, soliciting
 A crime committed with or through the or promoting commercial transaction
use of information and communication bordering on product, service, or investment.
technologies such as radio, television, A common scenario is your mobile
cellular phone, computer and network, or office phone ringing for a few brief
and other communication device or minutes from an unknown number.
application. Upon answering, the caller hangs up to try
and get you to return the call.

Why is there a need for the Philippines to have a


cybercrime law? What issues were raised against the
Cybercrime Prevention Act of 2012? Were
Cybercrime Prevention Act of 2012 | RA10175
those concerns justifiable? Why or why not?
AN ACT DEFINING CYBERCRIME, PROVIDING FOR
(a) Offenses against the confidentiality, integrity
THE PREVENTION, INVESTIGATION, SUPPRESSION
and availability of computer data and
AND THE IMPOSITION OF PENALTIES THEREFORE
systems:
AND FOR OTHER PURPOSES
(1) Illegal Access. – The access to the whole or
Cybercrime law is essential to upholding the any part of a computer system without right.
protection of every individual, business, and
government that can be a victim of these crimes. It (2) Illegal Interception.
ensures the safety of our information, money, and
families.

What CRIMES WERE PUNISHABLE under the


Cybercrime Prevention Act of 2012 (R.A. 10175)?
• Child Pornography

• Libel

• Aiding or Abetting in the Commission of


Cybercrime

• Attempt in the Commission of


Cybercrime.

• Cybersquatting - unauthorized registration


and use of Internet domain names that are
identical or similar to trademarks, service
marks, company names, or personal names.
What cybercrime- related laws were might be uploaded to a large (pornographic) online
mentioned in the given news? Give a brief platform.
description of these laws?

Aside from RA10175…


What advices were given by the authorities on how
RA 9995 | ANTI-VOYEURISM ACT | Anti-Photo and people can be protected against cybercrimes?
Video Voyeurism Act of 2009
1. Consider extra caution in opening random
It provides protection to the victim who consents to emails and links.
the sexual act or any similar activity and the
2. Avoid engaging in computer-related
recording of it but not to the copying and
malicious acts.
reproduction of said material and holds the offender
liable for violating such provision. 3. Know your limitations and practice safety
usage of social media accounts.

4. Practice netiquettes.
RA 9262 | VAWCI|

Anti-Violence Against Women and Their


Do not re-sell this reviewer:)
Children Act of 2004
Original: NewEye-07_Yve Elle
State values the dignity of women and children and
guarantees full respect for human rights. The State
also recognizes the need to protect the family and
its members particularly women and children, from
violence and threats to their personal safety and
security.

Article 353 of the Revised Penal Code| LIBEL|


Libel is defined as public and malicious
imputation of a crime, or of a vice or defect,
real or imaginary, or any act, omission,
condition, status, or circumstance tending to
cause the dishonor, discredit, or contempt of
a natural or juridical person, or to blacken the
memory of the dead. Libel laws are classified as
crimes against honor, which seek to protect an
individual against unjust attacks against the
character and reputation of his person.

What cybercrimes were mentioned in the


given news? Give a brief explanation of each
crime.
Computer-related Forgery - impersonation of
legitimate individuals, authorities, agencies, and
other entities online for fraudulent purposes.

Sextortion - a crime that involves blackmailing a


victim. The extorter threatens to share images,
videos, or information about the victim’s
sexual preferences unless the victim pays up or
engages in more sexual acts. Usually, the
perpetrator will threaten to share the sexual content
with the victim’s family, colleagues, friends, and
other acquaintances. Alternatively, the content
LESSON 1.2: ONLINE ONLINE SAFETY,  Know what you are talking about and
SECURITY, ETHICS, AND ETIQUETTE make sense saying it.

NETIQUETTE RULE 6: Share expert knowledge


 etiquette for the internet. It describes the  Ask questions online
rules of conduct for respectful and  Share what you know online.
appropriate communication on the  Post the answers to your questions online
internet. because someone may have the same
question you do.
10 rules of Netiquette
RULE 1: Remember the Human
RULE 7: Keep disagreement healthy
 You need to remember that you are
talking to a real person when you are  Never reduce the discussion to personal
online. issues and avoid inappropriate language.
 The internet brings people together who  Netiquette however forbid people who
would otherwise never meet. are flaming to hurt discussion groups by
 Remember this saying when sending an putting the group down.
email: Would I say this to the person’s
face.
RULE 8: Respect other people's privacy
RULE 2: Be ethical  Do not read other people’s mail without
their permission.
 You need to behave the same way online
 Going through other people’s things
that you do in real life.
could cost you, your job or you could
 You need to remember that you can get
even go to jail.
caught doing things you should not be
 Not respecting other people’s privacy is a
doing online just like you can in real life.
bad netiquette.

RULE 3: Know where you are


RULE 9: Don't abuse your power
 Always take a look around when you
enter a new domain when surfing the  Do not take advantage of other people
web. just because you have more knowledge
 Get a sense of what the discussion group or power than them.
is about before you join it.  Treat others as you would want them to
treat you if the roles were reversed.
RULE 4: Respect other people's time and
data limits
RULE 10: Be forgiving of other people's
 “It's your responsibility to ensure that the mistakes
time they spend reading your posting
isn't wasted “  Do not point out mistakes to people
 Keep your post and emails to minimum online.
by saying what you want to say.  Remember that you were once the new
 Remember everyone won’t answer your kid on the block.
questions.  You still need to have a good manner
even though you are online and cannot
see the person face to face.
RULE 5: Make yourself look good online Do not re-sell this reviewer:)
Original: NewEye-07_Yve Elle
 Be polite and pleasant to everyone.
 Always check your spelling and grammar
before posting.
IN SCIENCE LESSON 1.2: DANGERS ON THE INTERNET
When participating in online
forums or discussion boards related to
scientific research, it's important to use EMAIL SPAM
proper scientific terminology and
 Known as junk email.
provide accurate information.
 Unsolicited commercial email sent from
Netiquette also involves being
one source with identical message sent
respectful of other scientists'
to multiple recipients.
research and theories, even if you
 Dangerous spams carry virus like Trojan
disagree with them.
Horse and other malicious software
(malware_
IN HISTORY
When discussing historical events
or figures online, it's important to avoid
SPAMMER- used to refer to a person who creates
offensive language or stereotypes,
electronic spam.
and to provide accurate information
and sources. Netiquette also involves
being respectful of different
perspectives and interpretations of
history and avoiding personal
attacks or arguments.

IN MATH
When participating in online math
communities or discussion groups, it's
important to provide clear and
concise explanations and solutions,
and to avoid using jargon or
confusing terminology. Netiquette
also involves being respectful of
different approaches and methods
to solving mathematical problems.

IN ART
When sharing artwork or
participating in online art communities,
it's important to respect others'
copyright and intellectual property
rights, and to give credit to sources
and inspirations. Netiquette also
involves being respectful of different
artistic styles and techniques and
avoiding personal attacks or
negative criticism.

TYPES OF SPYWARE:
 Adware: tracks a user’s web surfing
history and activity to optimize
advertising efforts
 Keyloggers: a type of spyware that
monitors user activity

Do not re-sell this reviewer:)


Original: NewEye-07_Yve Elle
 Cookies: when used maliciously can How to detect a virus or a worm?
tack a user’s web activity for gaining
DEVICE PROBLEMS
information
 System Monitor: captures virtually  Slow device performance
everything the user does on an infected  Weird and annoying pop-ups
device  Your settings changing randomly
 Trojan: a digital attack that disguises  Random computer crashes and freezes
itself as desirable code/software
 Mobile Spyware: Operates undetected
in the background, stealing information INCREASED POWER CONSUMPTION
such as passwords and messages
 Your battery draining faster
 Your data allowance being burned
through
VIRUS vs. WORM COMPARISON
 Your device’s professor is overworked
VIRUS WORM  Your device overheating quickly and
continually
 Require a host  It’s a stand-
file to infect alone program
 Can’t infect  It replicates YOU GET OTHER TYPES OF MALWARE
another device and infects by
Both viruses and worms can be a
unless an using email
gateway for other types of malware. This means
infected file is service, instant
you might suddenly notice more weird things
replicated and messaging
like:
sent to that apps, etc.
device  Doesn’t  Ransom demands via ransomware
 Require user require user  Invasive ads via aware
input to spread input to spread  Identity theft via keyloger
 Can infect files  Can’t infect
 Can corrupt files
files like .exe  Can’t modify ---------------------------------------------------------
or .sys any stored - The Commandments for Computer
 Can damage programs Ethics By Dr. Ramon C. Barquin, 1992, Computer
software and  Slows systems Ethics Institute
even hardware down by
 Spreads more taking up too
slowly many ● Rule #1: Thou shalt not use a
computational computer to harm other people.
resources You should not program a computer to
 Has lower do dangerous things to people. For
latency example, to program a robot to kill
people, make viruses, or weapons of
mass destruction. What this means is
Do not re-sell this reviewer:) that computers are not an excuse to do
Original: NewEye-07_Yve Elle bad things to people. The programmer is
responsible for the actions of his
programs.
● Rule #2: Thou shalt not interfere
with other people's computer work.
Everyone has the right to use computers.
Likewise creating a computer virus is
wrong because it wastes people’s time
and money and destroys potentially
valuable property. As the hippies used to
say: “Live and let live!”
● Rule #3: Thou shalt content. Why not ‘get a life’ and create
not snoop around in other people's your own unique and original content?
computer files: You will be much happier in the long run
It is illegal to open and read someone's creating new things rather than stealing
real physical mail, and it is also illegal to from other people.
snoop on network connections and read
● Rule #9) Thou shalt think about the
someone’s email, passwords, files,
social consequences of the program
databases, etc.
you are writing or the system you
● Rule #4) Thou shalt not use a are designing.
computer to steal. Do you write software that helps people
This one is obvious. Stealing is just as to steal, kill, spy, gamble, or spread
bad with a computer or without one. Use pornography? Please ask yourself why. Is
your IT powers for good! there a way you can use your IT talents
for good purposes? Wouldn’t the world
● Rule #5: Thou shalt not use a
be a better place if everyone was
computer to bear false witness.
engaged in positive behavior instead of
This commandment means that you
negative behavior? Think about it!
shouldn’t use a computer to create false
facts. For instance, photoshopping a ● 10) Thou shalt always use a
picture to make an innocent man look computer in ways that ensure
guilty. Perhaps another equally important consideration and respect for your
commandment should be, “Don’t believe fellow humans.
everything you see on the Internet”. Just Things that you do ‘online’ can have real
like in traditional media, it is a common effects in your ‘offline’ life as well.
practice to spread half-truths, Perhaps Mark Zuckerberg, the founder of
exaggerations, lies, and rumors on the Facebook, said it best, “Having two
Internet. This is wrong. identities for yourself is an example of a
lack of integrity."
● Rule #6: Thou shalt not copy or use
proprietary software for which you
have not paid.
“If you are on social media, and you are
Think about how hard it is to write good
not learning, not laughing, not being
software. Think about all the people and
inspired or not networking, then you
costs involved. You have two choices: 1)
are using it wrong.”
buy a license or 2) find an open source
alternative. Using pirated software not
only unethical it is dangerous because of Do not re-sell this reviewer:)
hidden malware. Original: NewEye-07_Yve Elle

● Rule #7: Thou shalt not use other


people's computer resources.
without authorization or proper
compensation.
Is it ethical to use a neighbor’s lawn
mower or mixer without telling them?
How about their Internet connection? No
it isn’t! Is it legal or ethical to do bad
things on a computer while logged in as
someone else? No it isn’t! Don’t do it!
● Rule #8: Thou shalt not appropriate
other people's intellectual output.
If you copy text or images from a website
and post them on your own website it is
a crime in most countries, and definitely
not ethical. Why? You are causing
irreparable damage to the creator of the
LESSON 2: BASIC PRINCIPLES OF
GRAPHICS AND LAYOUT

LAYOUT
o The process of planning and arranging
graphics or text in a page or book.

BASIC PRINCIPLES OF GRAPHICS AND  There's no one way to use white space
LAYOUT
correctly, but it's good to understand its
PROXIMITY purpose. White space helps you define
and separate different sections; it gives
 all about using visual space to show your content room to breathe. If your
relationships in your content. In work ever starts to feel cluttered or
practice, it's pretty simple—all you have uncomfortable, a little white space might
to do is make sure related items are be just what the doctor ordered.
grouped together

 Groups that are NOT related to each


other should be separated to visually
emphasize their lack of a relationship. All
ALIGNMENT
in all, this makes your work easier to
understand at a glance, whether it's  something you deal with all the time,
purely text or something more visual. even if you don't realize it. Whenever you
type an email or create a document, the
text is aligned automatically. When
aligning objects by yourself (for instance,
images or separate text boxes), getting it
right can be tricky. The most important
thing is to be consistent

Do not re-sell this reviewer:)


Original: NewEye-07_Yve Elle

WHITE SPACE
 An important part of every composition.
Now, this doesn't mean literal white
space; it just means negative space, like  It might help to imagine your content
the spaces between your content, arranged inside of a grid, just like the
between lines, and even the outer example below. Notice how there's an
margins invisible line centering each image to the
text? Each grouping is also evenly spaced stand out. High-level or important items
and aligned, with equal-sized margins are usually larger, bolder, or more eye-
catching in some way

CONTRAST
 Contrast simply means that one item is
different from another. In layout and
composition, contrast can help you do
many things, like catch the reader's eye,
create emphasis, or call attention to
something important. Do not re-sell this reviewer:)
Original: NewEye-07_Yve Elle

REPETITION
 Repetition is a reminder that every
project should have a consistent look and
feel. This means finding ways to reinforce
your design by repeating or echoing
 To create contrast in the example below, certain elements
we've used color, more than one style of
text, and objects of differing sizes. This
makes the design more dynamic and,
therefore, more effective at
communicating its message.

HIERARCHY  For instance, if you have a specific color


palette, look for ways to carry it through.
 Contrast is also closely tied to hierarchy,
If you've chosen a special header style,
which is a visual technique that can help
use it every time.
the viewer navigate your work. In other
 It's not just for aesthetic reasons—being
words, it shows them where to begin and
consistent can also make your work
where to go next using different levels of
easier to read. When viewers know what
emphasis
to expect, they can relax and focus on
the content

BALANCE
 The distribution of the graphic design
elements, such as shapes, text boxes and
 Establishing hierarchy is simple: Just images, of a design evenly throughout a
decide which elements you want the certain layout. Designers can choose
reader to notice first, then make them
between a balanced (stable) design or off EMPHASIS
balanced (dynamic) layout.
 Emphasis can be created by size, weight,
position, color, shape, and style. Adding
emphasis to an object creates a focal
point, which grabs an audience’s
attention. It’s where you want the viewer
to look first, but doesn’t overpower the
rest of the design (or it would be out of
balance)

Symmetrical – This type of design is


formed along a vertical axis and or
horizontal axis, where the weight of the
elements is evenly divided into both
sides of the layout.

Asymmetrical – This type of balance


employs scale, contrast and color to
even out the flow of a layout. I tis
UNITY, VARIETY, AND HARMONY
usually found in websites, where two
sides of a webpage differ from a each  Unity is a force operating within a design
other but contain similar elements. that gives it the appearance of oneness
or resolution. This ensures no single part
Radial – Here, the elements of a design is more important than the other. It also
are placed in a circular pattern on the refers to the relationship of the elements
layout. This provides a sense of when you place them all together. The
movement and dynamism to the eyes of elements of the design must agree to the
the viewer. total meaning, theme, or mood of the
output

Do not re-sell this reviewer:)


Original: NewEye-07_Yve Elle

You might also like