Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12
Living in the
Information Technology Era
President Ramon Magsaysay State University Computer Engineering Department
Lesson 5 Cybercrimes Cybercrimes What is Cyber? It is the Characteristics of the culture of computers, Republic Act No. 10175 Cybercrime Prevention Act of information, technology and virtual reality. 2012 • Cybercrime is defined as a crime in which a computer a law in the Philippines approved on September 12,2012 is the object of the crime (hacking, phishing, which aims to address legal issues concerning online spamming and child pornography) is used as a tool to interactions and internet. commit an offense. • Cybercriminals may use computer technology to Republic Act No. 10173 Data Privacy Act of 2012 I access personal information, business trade secrets or use the internet for exploitative or malicious An act protecting individual personal information. purposes.
GEE 4 Living in the IT Era By: Engr. Froilan G. Cantillo
Common Forms Of Cybercrimes a. Copyright c. Computer Addiction The exclusive legal right, given to an originator or an • Offline: generally used when speaking about assignee to print, publish, perform, film, or record excessive gaming behavior, which can be practiced literary, artistic, or musical material, and to authorize both offline and online. others to do the same. • Online: Also known as “Internet Addiction”, gets more Copyright infringement is the violation, piracy or theft of attention in general from scientific research than a copyright holder's exclusive rights through the offline computer addiction, mainly because most unauthorized use of a copyrighted material or work. cases of computer addiction are related to the excessive use of the Internet. • Virtual Self – The persona you create about b. Plagiarism yourself virtually. An act or instance of using or closely imitating the language and thoughts of another author without authorization.
GEE 4 Living in the IT Era By: Engr. Froilan G. Cantillo 4
Attackers • Hackers – computer hobbyist who enjoy pushing computer system to their limits • Crackers – obsessed with gaining entry to highly secure computer systems • Cyber Gang – bring crackers together by means of the internet and physical meetings. • Computer virus Author – Makers of Computer Viruses • Disgruntled Employees – Kick out employees • Fraud Artist – Swindlers & Shills
GEE 4 Living in the IT Era By: Engr. Froilan G. Cantillo 5
Criminal Activities a. Hacking • Unauthorized access of or interference with computer • System Interference systems, servers, or other information and • Misuse of Devices communication systems • Infection of IT Systems with Malware – if the act is • Unauthorized access to corrupt, alter, steal, or committed against critical infrastructure of the destroy electronic data using computers or other Philippines the, penalty is between 12-20 years information and communication systems without the reclusion temporal computer or system owner’s knowledge and consent. • Six years up to twelve years of imprisonment also • The introduction of computer viruses resulting in the known as prison mayor. corruption, alteration, theft, or loss of such data • Illegal Access • Illegal Interception • Data Interference
GEE 4 Living in the IT Era By: Engr. Froilan G. Cantillo 6
Types of Hackers White Hat Hackers Grey Hat Hackers White Hat hackers are also known as Ethical Hackers. Grey hat hackers are a blend of both black hat and white They are never intent to harm a system, rather they try hat hackers. They act without malicious intent but for to find out weaknesses in a computer or a network their fun, they exploit a security weakness in a computer system as a part of penetration testing and vulnerability system or network without the owner’s permission or assessments. knowledge. Black Hat Hackers Their intent is to bring the weakness to the attention of Black Hat hackers, also known as crackers, are those who the owners and getting appreciation or a little bounty hack to gain unauthorized access to a system and harm from the owners. its operations or steal sensitive information. Miscellaneous Hackers Black Hat hacking is always illegal because of its bad Apart from the above well-known classes of hackers, we intent which includes stealing corporate data, violating have the following categories of hackers based on what privacy, damaging the system, blocking network they hack and how they do it. communication, etc.
GEE 4 Living in the IT Era By: Engr. Froilan G. Cantillo 7
Types of Hackers Red Hat Hackers Elite Hackers Red hat hackers are again a blend of both black hat and This is a social status among hackers, which is used to white hat hackers. They are usually on the level of describe the most skilled. Newly discovered exploits will hacking government agencies, top-secret information circulate among these hackers. hubs, and generally anything that falls under the Script Kiddie category of sensitive information. A script kiddie is a non-expert who breaks into computer Blue Hat Hackers systems by using pre-packaged automated tools written A blue hat hacker is someone outside computer security by others, usually with little understanding of the consulting firms who is used to bug-test a system prior underlying concept, hence the term Kiddie. to its launch. They look for loopholes that can be Neophyte exploited and try to close these gaps. Microsoft also uses the term Blue Hat to represent a series of security A neophyte, "n00b", or "newbie" or "Green Hat Hacker" briefing events. is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking.
GEE 4 Living in the IT Era By: Engr. Froilan G. Cantillo 8
Criminal Activities b. Computer-related forgery, fraud and/or identity theft c. Electronic theft • An attempt to obtain sensitive information such as • Illegal Downloading usernames, passwords, and credit card details and • Obtaining files that you do not have the right to use (indirectly money), often for malicious reasons. from the internet. • Phishing • Digital Piracy • Pharming • Practice of illegally copying and selling digital music, • Spam video, computer software, etc. • Maximum of Php 200,000 fine or prison mayor • Copyright Infringement • Penalty of Php 50,000 – 500, 000 and or prison mayor
GEE 4 Living in the IT Era By: Engr. Froilan G. Cantillo 9
Criminal Activities d. Cyberbullying e. Cybersex • The use of electronic communication to bully a • Willful engagement, maintenance, control, or person, typically by sending a message of an operation, directly or indirectly of any lascivious intimidating or threatening nature. exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration. • The Anti-Bullying Act of 2013 (RA 10627) • There is a discussion on this matter if it involves “couples” or “people in relationship” who engage in cybersex. • Penalty at least Php 200,000 and or prison mayor
GEE 4 Living in the IT Era By: Engr. Froilan G. Cantillo 10
Criminal Activities f. Child Pornography g. Cyber Defamation • Is a form of child sexual exploitation. • Is an unprivileged false statement of fact which tends to harm the reputation of a person or company. • Polytechnic University of the Philippines • Penalty of 6-12 years of imprisonment or prison • Unlawful or prohibited acts defined and punishable mayor. by Republic Act No. 9775 or the Anti- • Child Pornography Act of 2009, committed through a computer system. • Penalty of 12-20 years of imprisonment or reclusion temporal
GEE 4 Living in the IT Era By: Engr. Froilan G. Cantillo 11