Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
7 views

Lesson 5

Uploaded by

vernout7
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Lesson 5

Uploaded by

vernout7
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Living in the

Information Technology
Era

President Ramon Magsaysay State University Computer Engineering Department


Lesson 5
Cybercrimes
Cybercrimes
What is Cyber?
It is the Characteristics of the culture of computers, Republic Act No. 10175 Cybercrime Prevention Act of
information, technology and virtual reality. 2012
• Cybercrime is defined as a crime in which a computer a law in the Philippines approved on September 12,2012
is the object of the crime (hacking, phishing, which aims to address legal issues concerning online
spamming and child pornography) is used as a tool to interactions and internet.
commit an offense.
• Cybercriminals may use computer technology to
Republic Act No. 10173 Data Privacy Act of 2012 I
access personal information, business trade secrets or
use the internet for exploitative or malicious An act protecting individual personal information.
purposes.

GEE 4 Living in the IT Era By: Engr. Froilan G. Cantillo


Common Forms Of Cybercrimes
a. Copyright c. Computer Addiction
The exclusive legal right, given to an originator or an • Offline: generally used when speaking about
assignee to print, publish, perform, film, or record excessive gaming behavior, which can be practiced
literary, artistic, or musical material, and to authorize both offline and online.
others to do the same.
• Online: Also known as “Internet Addiction”, gets more
Copyright infringement is the violation, piracy or theft of attention in general from scientific research than
a copyright holder's exclusive rights through the offline computer addiction, mainly because most
unauthorized use of a copyrighted material or work. cases of computer addiction are related to the
excessive use of the Internet.
• Virtual Self – The persona you create about
b. Plagiarism yourself virtually.
An act or instance of using or closely imitating the
language and thoughts of another author without
authorization.

GEE 4 Living in the IT Era By: Engr. Froilan G. Cantillo 4


Attackers
• Hackers – computer hobbyist who enjoy pushing
computer system to their limits
• Crackers – obsessed with gaining entry to highly
secure computer systems
• Cyber Gang – bring crackers together by means of the
internet and physical meetings.
• Computer virus Author – Makers of Computer Viruses
• Disgruntled Employees – Kick out employees
• Fraud Artist – Swindlers & Shills

GEE 4 Living in the IT Era By: Engr. Froilan G. Cantillo 5


Criminal Activities
a. Hacking
• Unauthorized access of or interference with computer • System Interference
systems, servers, or other information and
• Misuse of Devices
communication systems
• Infection of IT Systems with Malware – if the act is
• Unauthorized access to corrupt, alter, steal, or
committed against critical infrastructure of the
destroy electronic data using computers or other
Philippines the, penalty is between 12-20 years
information and communication systems without the
reclusion temporal
computer or system owner’s knowledge and consent.
• Six years up to twelve years of imprisonment also
• The introduction of computer viruses resulting in the
known as prison mayor.
corruption, alteration, theft, or loss of such data
• Illegal Access
• Illegal Interception
• Data Interference

GEE 4 Living in the IT Era By: Engr. Froilan G. Cantillo 6


Types of Hackers
White Hat Hackers Grey Hat Hackers
White Hat hackers are also known as Ethical Hackers. Grey hat hackers are a blend of both black hat and white
They are never intent to harm a system, rather they try hat hackers. They act without malicious intent but for
to find out weaknesses in a computer or a network their fun, they exploit a security weakness in a computer
system as a part of penetration testing and vulnerability system or network without the owner’s permission or
assessments. knowledge.
Black Hat Hackers Their intent is to bring the weakness to the attention of
Black Hat hackers, also known as crackers, are those who the owners and getting appreciation or a little bounty
hack to gain unauthorized access to a system and harm from the owners.
its operations or steal sensitive information. Miscellaneous Hackers
Black Hat hacking is always illegal because of its bad Apart from the above well-known classes of hackers, we
intent which includes stealing corporate data, violating have the following categories of hackers based on what
privacy, damaging the system, blocking network they hack and how they do it.
communication, etc.

GEE 4 Living in the IT Era By: Engr. Froilan G. Cantillo 7


Types of Hackers
Red Hat Hackers Elite Hackers
Red hat hackers are again a blend of both black hat and This is a social status among hackers, which is used to
white hat hackers. They are usually on the level of describe the most skilled. Newly discovered exploits will
hacking government agencies, top-secret information circulate among these hackers.
hubs, and generally anything that falls under the
Script Kiddie
category of sensitive information.
A script kiddie is a non-expert who breaks into computer
Blue Hat Hackers
systems by using pre-packaged automated tools written
A blue hat hacker is someone outside computer security by others, usually with little understanding of the
consulting firms who is used to bug-test a system prior underlying concept, hence the term Kiddie.
to its launch. They look for loopholes that can be
Neophyte
exploited and try to close these gaps. Microsoft also uses
the term Blue Hat to represent a series of security A neophyte, "n00b", or "newbie" or "Green Hat Hacker"
briefing events. is new to hacking or phreaking and has almost no
knowledge or experience of the workings of technology
and hacking.

GEE 4 Living in the IT Era By: Engr. Froilan G. Cantillo 8


Criminal Activities
b. Computer-related forgery, fraud and/or identity theft c. Electronic theft
• An attempt to obtain sensitive information such as • Illegal Downloading
usernames, passwords, and credit card details and
• Obtaining files that you do not have the right to use
(indirectly money), often for malicious reasons.
from the internet.
• Phishing
• Digital Piracy
• Pharming
• Practice of illegally copying and selling digital music,
• Spam video, computer software, etc.
• Maximum of Php 200,000 fine or prison mayor • Copyright Infringement
• Penalty of Php 50,000 – 500, 000 and or prison mayor

GEE 4 Living in the IT Era By: Engr. Froilan G. Cantillo 9


Criminal Activities
d. Cyberbullying e. Cybersex
• The use of electronic communication to bully a • Willful engagement, maintenance, control, or
person, typically by sending a message of an operation, directly or indirectly of any lascivious
intimidating or threatening nature. exhibition of sexual organs or sexual activity with the
aid of a computer system for favor or consideration.
• The Anti-Bullying Act of 2013 (RA 10627)
• There is a discussion on this matter if it involves
“couples” or “people in relationship” who engage in
cybersex.
• Penalty at least Php 200,000 and or prison mayor

GEE 4 Living in the IT Era By: Engr. Froilan G. Cantillo 10


Criminal Activities
f. Child Pornography g. Cyber Defamation
• Is a form of child sexual exploitation. • Is an unprivileged false statement of fact which tends
to harm the reputation of a person or company.
• Polytechnic University of the Philippines
• Penalty of 6-12 years of imprisonment or prison
• Unlawful or prohibited acts defined and punishable
mayor.
by Republic Act No. 9775 or the Anti-
• Child Pornography Act of 2009, committed through a
computer system.
• Penalty of 12-20 years of imprisonment or reclusion
temporal

GEE 4 Living in the IT Era By: Engr. Froilan G. Cantillo 11


End of Lesson 5
Any Questions?

12

You might also like