Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Online Safety and Security

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 38

Online Safety and

Security
Empowerment Technologies
Activity time!

How Safe are You?


What are the things
you do to have online
safety and security?
 It is a law in the Philippines approved on
Republic Act September 12,2012.
No. 10175:  It aims to address the legal issuances
The concerning online interactions and the
Internet in the Philippines.
Cybercrime
Prevention  Among the Cybercrime Prevention Act of
2012, the cybercrime offenses included in
Act of 2012 the bill are cybersquatting, cybersex,
child pornography, identity theft, illegal;
access to data and libel.
The salient features of the Act include:
 internationally consistent definitions for
certain cybercrimes,
 nuanced liability for perpetrators of
What are the cybercrimes,
Salient  increased penalties,
Features of  greater authority granted to law enforcement
Republic Act authorities,
10175?  expansive jurisdictional authority to prosecute
cybercrimes,
 provisions for international cybercrime
coordination efforts and greater ability to
combat cybercrimes.
Cyber-squatting
– the practice of registering
CYBERCRIMES
names, especially by wearing
known company or brand names,
as Internet domains, in the hope
of reselling them at a profit.
Cybersex
– sexual arousal using
computer technology,
CYBERCRIMES
especially by wearing virtual
reality equipment or by
exchanging messages with
another person via the
Internet.
Child Pornography 
CYBERCRIMES – pornography related to
children (below 18 years old).
Identity Theft
 – unauthorized usage of
system accounts like their
CYBERCRIMES name, identifying number, or
credit card number, without
their permission, to commit
fraud or other crimes.
Misuse of Devices 
– The use, production, sale,
CYBERCRIMES
procurement, importation,
distribution, or otherwise
making available, without
right.
System Interference 
– an intentional disruption of a
certain system without authority by
inputting, transmitting, damaging,
CYBERCRIMES deleting, deteriorating, altering or
suppressing computer data or
computer program, electronic
document, or electronic data
message and transmission of viruses.
Data Interference
 – an intentional or reckless
alteration, damaging, deletion or
deterioration of computer data,
CYBERCRIMES electronic document, or
electronic data message,
without right, including the
introduction or transmission of
viruses.
Illegal access to data 
CYBERCRIMES – The access to the whole or any
part of a computer system without
right.
Cyber Libel. 
– defined as a public and malicious
imputation of a crime, or of a vice or defect,
real or imaginary, or any act, omission,
condition, status, or circumstance tending
CYBERCRIMES to cause the dishonor, discredit, or
contempt of a natural or juridical person, or
to blacken the memory of one who is dead,
and committed through a computer system
or any other similar means which may be
devised in the future.
INTERNE
1.MALWARE
T 2.SPAM
THREATS
3.PHISHING
a) VIRUS
a malicious program designed to
1. MALWARE = replicate itself and transfer from
“MALicious one computer to another through
softWARE” internet and local networks or
data storage like flash drives or
CDs.
b) WORM
a malicious program that transfer
from one computer to another by
1. MALWARE =
any type of means. Often it uses a
“MALicious
softWARE” computer network to spread itself.
For example, the ILOVEYOU
worm (LOVE BUG WORM) created
by a Filipino.
c) TROJAN
A malicious program that
1. MALWARE = disguised as a useful program but
“MALicious once downloaded or installed,
softWARE” leaves your PC unprotected and
allows hackers to get your
information.
c) TROJAN
Rogue Security Software
1. MALWARE =
It tricks the user into posing that
“MALicious it is a security software. It asks
softWARE” the user to pay to improve his/her
security but in reality they are not
protected at all.
d) RANSOMWARE
It holds PC as a hostage and
1. MALWARE =
demands money. It locks your
“MALicious computer, threatening to destroy
softWARE” data, then demanding ransom or
a payment for a release of your
data files or to regain the ability
to use your computer again.
e) SPYWARE
1. MALWARE =
A program that runs in the
“MALicious background without you knowing
softWARE” it. It has the ability to monitor
what you are currently doing and
typing through key logging
e) SPYWARE
 Keyloggers
It is used to record the keystroke
1. MALWARE = done by the users. This is done to
“MALicious steal their password or any other
softWARE” sensitive information. It can record
email, messages, or any
information you type using your
keyboard.
f) ADWARE
1. MALWARE = A program designed to send you
“MALicious advertisement, mostly as pop-
softWARE” ups.
It refers to an unwanted email
2. SPAMS mostly from bots or advertisers.
It can be used to send malware.
Its goal is to acquire sensitive
personal information like
passwords and credit cards
details. This is done by sending
3. PHISHING you an email that will direct the
user to visit a website and be
asked to update his/her
username, password, credit card,
or personal information.
PHARMING
A more complicated way of
3. PHISHING phishing where it exploits the
DNS (Domain Name Service)
system.
 A cyber citizen utilizes technology in
What is a an appropriate manner including
Cyber Citizen? etiquette, communication, education,
access, commerce, responsibility, rights,
safety, and security. Cyber Citizenship is
What makes a a term that refers to being responsible
good Cyber when using the Internet. What you do
Citizen? online when no one is looking tells a lot
about character and morals.
 Be respectful – and expect respect.
Respect yourself and other people is
How to be a important in all relationships, and it’s no
safe and different when you’re online.
responsible  Protect your reputation.
digital citizen?  Protect your privacy.
 Watch your tone.
 Be skeptical
1. Be mindful of what you share online and what site you
share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn
how the website handles the information you share.
Tips to stay
4. Know the security features of the social networking site
safe online you use. By keeping your profile private, search engines
will not be able to scan your profile.
5. Do not share your password to anyone.
6. Avoid logging in to public networks/wi-fi. Browsing in
“incognito(private) mode”, a feature of the browser, will
not protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation. It is similar
to posting, “Rob my house at this date”.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.

Tips to stay 11. Install and update an anti-virus software on your


computer. Use only one anti-virus to avoid conflicts.
safe online 12. If you have a wi-fi at home, make it a private network by
adding a password.
13. Avoid downloading anything from untrusted websites.
You are most vulnerable in peer-to-peer downloads as the
downloads is mostly not monitored by the site owner.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails
Any question?
What is your

(L. O. T. D.)
LEARNING OF THE DAY?
Any question?
Quiz time! GET ¼ SHEET OF PAPER

1. The Cybercrime Prevention Act of 2012 is also known as


2. Term that refers to the practice of registering names,
especially by wearing known company or brand names,
as Internet domains, in the hope of reselling them at a
profit.
3. Malware stands for?
4. One of the example of this malware is “iloveyou”.
5. It can be classified as unwanted email.
Quiz time! GET ¼ SHEET OF PAPER

6. Its aim is to get your personal information through sending you an


email that will guide you to their prepared fake website.
7. A malware that replicate itself without the help of a command of a
computer user.
8. A malware that replicate itself through internet, flash drives, cds and
local network.
9. A more complicated way of phishing.
10.Case of Enchong Dee against Claudine Bautista is one of the
trending example of what cybercrime?
Key to correction:

1.RA No. 10175 6.Phishing


2.Cyber-squatting 7.Worm
3.Malicious software 8.Virus
4.Worm 9.Pharming
5.Spam 10.cyberlibel

You might also like