The document discusses online safety and security, including cybercrimes and internet threats. It summarizes Republic Act 10175, also known as the Cybercrime Prevention Act of 2012, which aims to address legal issues concerning online interactions in the Philippines. The Act defines various cybercrimes such as cyber-squatting, cybersex, child pornography, and identity theft. It also outlines the salient features of the Act and penalties for perpetrators of cybercrimes. Common internet threats like malware, spam, and phishing are explained. Tips for being a safe and responsible digital citizen are provided.
The document discusses online safety and security, including cybercrimes and internet threats. It summarizes Republic Act 10175, also known as the Cybercrime Prevention Act of 2012, which aims to address legal issues concerning online interactions in the Philippines. The Act defines various cybercrimes such as cyber-squatting, cybersex, child pornography, and identity theft. It also outlines the salient features of the Act and penalties for perpetrators of cybercrimes. Common internet threats like malware, spam, and phishing are explained. Tips for being a safe and responsible digital citizen are provided.
The document discusses online safety and security, including cybercrimes and internet threats. It summarizes Republic Act 10175, also known as the Cybercrime Prevention Act of 2012, which aims to address legal issues concerning online interactions in the Philippines. The Act defines various cybercrimes such as cyber-squatting, cybersex, child pornography, and identity theft. It also outlines the salient features of the Act and penalties for perpetrators of cybercrimes. Common internet threats like malware, spam, and phishing are explained. Tips for being a safe and responsible digital citizen are provided.
The document discusses online safety and security, including cybercrimes and internet threats. It summarizes Republic Act 10175, also known as the Cybercrime Prevention Act of 2012, which aims to address legal issues concerning online interactions in the Philippines. The Act defines various cybercrimes such as cyber-squatting, cybersex, child pornography, and identity theft. It also outlines the salient features of the Act and penalties for perpetrators of cybercrimes. Common internet threats like malware, spam, and phishing are explained. Tips for being a safe and responsible digital citizen are provided.
Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 38
Online Safety and
Security Empowerment Technologies Activity time!
How Safe are You?
What are the things you do to have online safety and security? It is a law in the Philippines approved on Republic Act September 12,2012. No. 10175: It aims to address the legal issuances The concerning online interactions and the Internet in the Philippines. Cybercrime Prevention Among the Cybercrime Prevention Act of 2012, the cybercrime offenses included in Act of 2012 the bill are cybersquatting, cybersex, child pornography, identity theft, illegal; access to data and libel. The salient features of the Act include: internationally consistent definitions for certain cybercrimes, nuanced liability for perpetrators of What are the cybercrimes, Salient increased penalties, Features of greater authority granted to law enforcement Republic Act authorities, 10175? expansive jurisdictional authority to prosecute cybercrimes, provisions for international cybercrime coordination efforts and greater ability to combat cybercrimes. Cyber-squatting – the practice of registering CYBERCRIMES names, especially by wearing known company or brand names, as Internet domains, in the hope of reselling them at a profit. Cybersex – sexual arousal using computer technology, CYBERCRIMES especially by wearing virtual reality equipment or by exchanging messages with another person via the Internet. Child Pornography CYBERCRIMES – pornography related to children (below 18 years old). Identity Theft – unauthorized usage of system accounts like their CYBERCRIMES name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. Misuse of Devices – The use, production, sale, CYBERCRIMES procurement, importation, distribution, or otherwise making available, without right. System Interference – an intentional disruption of a certain system without authority by inputting, transmitting, damaging, CYBERCRIMES deleting, deteriorating, altering or suppressing computer data or computer program, electronic document, or electronic data message and transmission of viruses. Data Interference – an intentional or reckless alteration, damaging, deletion or deterioration of computer data, CYBERCRIMES electronic document, or electronic data message, without right, including the introduction or transmission of viruses. Illegal access to data CYBERCRIMES – The access to the whole or any part of a computer system without right. Cyber Libel. – defined as a public and malicious imputation of a crime, or of a vice or defect, real or imaginary, or any act, omission, condition, status, or circumstance tending CYBERCRIMES to cause the dishonor, discredit, or contempt of a natural or juridical person, or to blacken the memory of one who is dead, and committed through a computer system or any other similar means which may be devised in the future. INTERNE 1.MALWARE T 2.SPAM THREATS 3.PHISHING a) VIRUS a malicious program designed to 1. MALWARE = replicate itself and transfer from “MALicious one computer to another through softWARE” internet and local networks or data storage like flash drives or CDs. b) WORM a malicious program that transfer from one computer to another by 1. MALWARE = any type of means. Often it uses a “MALicious softWARE” computer network to spread itself. For example, the ILOVEYOU worm (LOVE BUG WORM) created by a Filipino. c) TROJAN A malicious program that 1. MALWARE = disguised as a useful program but “MALicious once downloaded or installed, softWARE” leaves your PC unprotected and allows hackers to get your information. c) TROJAN Rogue Security Software 1. MALWARE = It tricks the user into posing that “MALicious it is a security software. It asks softWARE” the user to pay to improve his/her security but in reality they are not protected at all. d) RANSOMWARE It holds PC as a hostage and 1. MALWARE = demands money. It locks your “MALicious computer, threatening to destroy softWARE” data, then demanding ransom or a payment for a release of your data files or to regain the ability to use your computer again. e) SPYWARE 1. MALWARE = A program that runs in the “MALicious background without you knowing softWARE” it. It has the ability to monitor what you are currently doing and typing through key logging e) SPYWARE Keyloggers It is used to record the keystroke 1. MALWARE = done by the users. This is done to “MALicious steal their password or any other softWARE” sensitive information. It can record email, messages, or any information you type using your keyboard. f) ADWARE 1. MALWARE = A program designed to send you “MALicious advertisement, mostly as pop- softWARE” ups. It refers to an unwanted email 2. SPAMS mostly from bots or advertisers. It can be used to send malware. Its goal is to acquire sensitive personal information like passwords and credit cards details. This is done by sending 3. PHISHING you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information. PHARMING A more complicated way of 3. PHISHING phishing where it exploits the DNS (Domain Name Service) system. A cyber citizen utilizes technology in What is a an appropriate manner including Cyber Citizen? etiquette, communication, education, access, commerce, responsibility, rights, safety, and security. Cyber Citizenship is What makes a a term that refers to being responsible good Cyber when using the Internet. What you do Citizen? online when no one is looking tells a lot about character and morals. Be respectful – and expect respect. Respect yourself and other people is How to be a important in all relationships, and it’s no safe and different when you’re online. responsible Protect your reputation. digital citizen? Protect your privacy. Watch your tone. Be skeptical 1. Be mindful of what you share online and what site you share it to. 2. Do not just accept terms and conditions; read it. 3. Check out the privacy policy page of a website to learn how the website handles the information you share. Tips to stay 4. Know the security features of the social networking site safe online you use. By keeping your profile private, search engines will not be able to scan your profile. 5. Do not share your password to anyone. 6. Avoid logging in to public networks/wi-fi. Browsing in “incognito(private) mode”, a feature of the browser, will not protect you from hackers. 7. Do not talk to strangers whether online or face-to-face. 8. Never post anything about a future vacation. It is similar to posting, “Rob my house at this date”. 9. Add friends you know in real life. 10. Avoid visiting untrusted websites.
Tips to stay 11. Install and update an anti-virus software on your
computer. Use only one anti-virus to avoid conflicts. safe online 12. If you have a wi-fi at home, make it a private network by adding a password. 13. Avoid downloading anything from untrusted websites. You are most vulnerable in peer-to-peer downloads as the downloads is mostly not monitored by the site owner. 14. Buy the software; do not use pirated ones. 15. Do not reply or click links from suspicious emails Any question? What is your
(L. O. T. D.) LEARNING OF THE DAY? Any question? Quiz time! GET ¼ SHEET OF PAPER
1. The Cybercrime Prevention Act of 2012 is also known as
2. Term that refers to the practice of registering names, especially by wearing known company or brand names, as Internet domains, in the hope of reselling them at a profit. 3. Malware stands for? 4. One of the example of this malware is “iloveyou”. 5. It can be classified as unwanted email. Quiz time! GET ¼ SHEET OF PAPER
6. Its aim is to get your personal information through sending you an
email that will guide you to their prepared fake website. 7. A malware that replicate itself without the help of a command of a computer user. 8. A malware that replicate itself through internet, flash drives, cds and local network. 9. A more complicated way of phishing. 10.Case of Enchong Dee against Claudine Bautista is one of the trending example of what cybercrime? Key to correction: