Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Inbound 3741383423091718019

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 51

Netiquette and

Computer Ethics
By: Angie T. Sauza, LPT
What is Netiquette?

• Network etiquette
that is the etiquette of cyberspace and “etiquette”
Internet etiquette
“Having good netiquette involves being
mindful of your behavior, avoiding
offensive or derogatory language, and
treating others as you would in face-to-
face interactions.”
- AVIGAIL LEV, PSYD, FOUNDER & DIRECTOR OF THE BAY AREA CBT
CENTER
10 Basic Netiquette Rules
• Make Real People a Priority
• Use Respectful Language
• Share with Discretion
• Don’t Exclude Others
• Choose Friends Wisely
• Respect People’s Privacy
• Fact Check Before Posting
• Don’t Spam
• Respond to Emails and Texts Promptly
• Update Online Information
Ten Commandments of Computer Ethics
• Thou shalt not use a computer to harm other people.
• Thou shalt not interfere with other people’s computer work.
• Thou shalt not snoop around in other people’s computer files.
• Thou shalt not use a computer to steal.
• Thou shalt not use a computer to bear false witness
• Thou shalt not copy or use proprietary software for which you have not paid.
• Thou shalt not use other people’s computer resources without authorization or
proper compensation.
• Thou shalt not appropriate other people’s intellectual output.
• Thou shalt think about the social consequences of the program you are writing or
the system you are designing.
• Thou shalt always use a computer in ways that ensure consideration and respect
for your fellow humans.
Cybercrimes

Cyber
-it is the characteristics of the culture of computers,
information, technology and virtual reality.
Cybercrime is defined as a crime in which a computer
is the object of the crime such as hacking, phishing,
spamming and child pornography
Cybercriminals use computer technology to access
personal information, business trade secrets or use the
internet for exploitative or malicious purposes
Impact of e-crimes
This includes:
• Loss of online business and consumer confidence in the digital economy,
• The potential for critical infrastructure to be compromised affecting water
supply, health services, national communications, energy distribution,
financial services, and transport,
• Loss of personal financial resources and the subsequent emotional
damage.
• Loss of business assets,
• Costs to government agencies and businesses in re-establishing credit
histories, accounts and identities,
• Costs to businesses in improving cyber security measures,
• Stimulating other criminal activity, or
• Costs in time and resources for law enforcement agencies.
Classifications of e-crimes

• Computer crime: Using of direct electronic operation that can


attack security to obtain data and information illegally.
• High-tech crime: A broad range of criminal activities that
penetrate computers, illegally in violation of country laws, or
federal laws. These crimes are done by hacking, money
laundering, malware, harassment, electronic, and identity theft.
• White-collar crime: A crime committed by a person of
respectability and high social status in the course of his
occupation to obtain money. The famous persons who were
convicted of white-collar are Kenneth Lay, Bernard Madoff, and
Bernard Embers.
Classifications of e-crimes (Continuation)

• Cybercrime: It is a criminal activity that is done by using


computers and the internet including anything from illegal
downloading of music files and games to stealing millions of
dollars from online accounts. Also, non-monetary offenses, such as
creating and distributing viruses on other computers or posting
confidential business information on internet through music 10
and game files.
• Cyber terrorism: Premeditated and politically motivated attack
against information, computer systems, computer programs, and
data, which results in violence against civilian targets. Possible
cyber terrorism targets include the banking industry, military
installations, power plants, air traffic control centers.
Common forms of cybercrimes:

• Copyright
The exclusive legal right, given to an originator or an
assignee to print, publish, perform, film, or record literary,
artistic, or musical material, and to authorize others to do
the same.
Copyright infringement is the violation, piracy or theft of a
copyright holder's exclusive rights through the unauthorized
use of a copyrighted material or work.
Common forms of cybercrimes:
• Plagiarism
An act or instance of using or closely imitating the language and
thoughts of another author without authorization.

Copying large pieces of text from a source without citing that


source. Taking passages from multiple sources, piecing them
together, and turning in the work as your own. Copying from a
source but changing a few words and phrases to disguise
plagiarism.
Common forms of cybercrimes:

• Computer Addiction

• Offline: generally used when speaking about excessive gaming


behavior, which can be practiced both offline and online.
• Online: Also known as “Internet Addiction”, gets more attention in
general from scientific research than offline computer addiction,
mainly because most cases of computer addiction are related to the
excessive use of the Internet.

Virtual Self -The persona you create about yourself virtually.


HISTORY OF CYBERCRIMES

• The real beginning of e-crime started in 1960, when there


were attacks in the United States on the telecommunication
systems, it led to destroying long distance phone
communications (Kabay, 2008).
• Creeper Virus
In 1971, wire fraud by communication was escalated in the
United States when the rogue program called Creeper, which
spread through early bulletin board networks. In the same
year, a person called Draper built a blue box that allowed
making long distance free calls (Sterling, 1992).
HISTORY OF CYBERCRIMES

I LOVE YOU
• One of the most infamous viruses in May 2000
• Network worm
• ILOVEYOU was not the first malware to exploit a hole in
Microsoft’s e-mail client, but it certainly initiated one of the
most serious virus outbreaks at the beginning of the new
millennium.
HISTORY OF CYBERCRIMES

• Theft on Twitter account

The Associated Press news agency (AP) took control of its


Twitter account and posted false tweets, including one saying
two explosions rocked the White House and injured US
President Barack Obama.
False Rumor of Explosion at White House Causes Stocks to Briefly Plunge; AP Confirms Its Twitter Feed Was Hacked (cn
bc.com)
Criminal activities and Internet threats
Hacking

• Hacking developed by a highly skills programmer (Hacker)


that enters a computer system and network in an illegal
way
• Six years up to twelve years of imprisonment also known as
prison mayor.
• Infection of IT Systems with Malware
Computer-related forgery, fraud and/or
identity theft

• An attempt to obtain sensitive information such as


usernames, passwords, and credit card details and
(indirectly money), often for malicious reasons.
• Phishing scams
• Pharming
• Spam
• Maximum of Php 200,000 fine or prison mayor
Electronic theft

• Illegal Downloading
• Obtaining files that you do not have the right to use from
the internet.
• Digital Piracy
• Practice of illegally copying and selling digital music, video,
computer software, etc.
• Copyright Infringement
• Penalty of Php 50,000 – 500, 000 and or prison mayor
Cyberbullying

• The use of electronic communication to bully a person,


typically by sending a message of an intimidating or
threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)
Cybersex

• Willful engagement, maintenance, control, or operation,


directly or indirectly of any lascivious exhibition of sexual
organs or sexual activity with the aid of a computer system
for favor or consideration.
• There is a discussion on this matter if it involves “couples”
or “people in relationship” who engage in cybersex.
• Penalty at least Php 200,000 and or prison mayor
Child Pornography

• Is a form of child sexual exploitation.


• Unlawful or prohibited acts defined and punishable by
Republic Act No. 9775 or the Anti- Child Pornography Act of
2009, committed through a computer system.
• Penalty of 12-20 years of imprisonment or reclusion
temporal
Cyber defamation

• Is an unprivileged false statement of fact which tends to


harm the reputation of a person or company.
• Penalty of 6-12 years of imprisonment or prison mayor.

Cyber defamation categories


Libel Words or pictures that are written, printed, and
copied in internet
Slander Spoken words or sounds, sign language, and
gesticulations
Cyber stalking

• Cyber stalking is defined as using the internet or other


electronic means with a view to harass or threaten any
individual, group of individuals, or an organization.
• Includes monitoring, false accusations, identity theft,
making threats, damage to data or equipment, the request
of minors for sex, or gathering information that may be
used to threaten or harass
Cyber stalking Categories
Send e-mails to user for harassment and
Email Stalking extortion. In some cases, send viruses to
intimidate the user.
Takes on public through internet such as a
Internet Stalking chat room, social network, and Web sites by
sending personal data, pictures, and video
to several locations to meet their demand,
which is often physical.

Computer-to-computer connection, the


Computer Stalking activities of stalker is working through the
Internet and the Windows operating system
to assume control over the computer of the
targeted victim. The defensive option for
the victim is to get disconnected and
reassign their current address of internet.
Malware

• The term of malware generally covers viruses, worms and


Trojans
• Viruses are programs having the ability to self-replicate and
attach themselves to other executable programs.
• Worm is one of the programs that distribute full function or
parts of them to computers. Worms are famous in
reproduction and publishing; it is often used for the transfer
of viruses from computers to break through barriers
• Trojan a malicious digital pest whose sole aim is to wreak
havoc on its victims' computers unnoticed
Virus Categories
Resident Virus A virus that is implanted in the memory on a
target system. It becomes active whenever the
system starts to operate. It implements specific
action on the work every time.
Non-resident A virus that transmits infection on network
Virus location, removable, and local systems. It does
not remain in the system for a long time.
Boot sector Virus A virus that targets a boot sector on the hard
drive. It is being loaded into memory each time
when an attempt is being made to boot from
the infected drive.
Macro Virus A virus that has written especially in macro
language in Word, Outlook, Excel, Etc. It is
being executed as soon as the documents are
contained and automatically open.
Worm Categories
Email worms Spread through email messages,
especially with attachments.
Internet worms Spread directly over the internet by
abusing access to open system
weaknesses.
Network worms Spread over open, unprotected network
shares
Multi vector Spread over two or more various
worms capabilities
Trojan Categories
Proxy Trojan Designed to use a target computer through
proxy server, which can attach to perform a
multitude of operations anonymously.
Password Stealer Designed to steal passwords from the
Trojan targeted systems. This Trojan will very often
first drop a key logging component into
infected device
IM Trojan Designed to steal account information or
data through instant messaging programs
such as Skype, MSN, and etc.
Dropper Trojan Designed to install other malware on target
systems. It is usually used in the beginning
of a malware attack.
Game Thief Trojan Designed to steal information through online
gaming account.
Trojan-Banker Designed to steal online banking information
Wifi Eavesdropping

• Virtual listening
• Potentially access your computer with the right equipment.
• Steal your personal information including logins and
passwords.
Spam

• Annoy you with unwanted junk mail.


• Create a burden for communications service providers and
businesses to filter electronic messages.
• Phish for your information by tricking you into following
links or entering details with too good-to-be-true offers and
promotions.
• Provide a vehicle for malware, scams, fraud and threats to
your privacy.
Ransomware

• There are two common types of ransomware:


• Lock screen ransomware displays an image that prevents
you from accessing your computer
• Encryption ransomware: encrypts files on your system's
hard drive and sometimes on shared network drives, USB
drives, external hard drives, and even some cloud storage
drives, preventing you from opening them
Recommended cyber safety tips

• Use antivirus softwares


• change passwords frequently
• insert firewalls
• Adopt regular scanning against spyware
• install software patches
• uninstall unnecessary software
• separate user accounts
• maintain backup
• check security settings
• Perform IT audits
Laws in the Philippines against
Cybercrimes

• Republic Act No. 10175 Cybercrime Prevention Act of


2012
• Republic Act No. 10173 Data Privacy Act of 2012
Cybercrime Prevention Act of 2012

• The Cybercrime Prevention Act of 2012 focuses on the pre-


emption, prevention, and prosecution of cybercrimes such
as offenses against the privacy, confidentiality, integrity,
and availability of computer data and systems, computer-
related offenses, and content-related offenses.
The Offenses that fall under R.A. 10175

• Offenses Against Confidentiality, Integrity, and Availability


of Computer Data and Systems
1. Illegal access
2. Illegal interception
3. Data Interference
4. System Interference
5. Misuse of Devices
6. Cyber Squatting
• Computer-Related Offenses

1. Computer-related forgery
2. Computer-related Fraud
3. Computer-related Identity Theft
• Content-Related Offenses

1. Cybersex
2. Child Pornography
3. Unsolicited Commercial Communications
4. Libel
Authorized to collect or record traffic statistics

ensure that the technical nature of cybercrime


and its prevention get the attention it
deserves

submit timely and regular reports to the


Department of Justice
Reporting a Cybercrime

• On the Philippine National Police Anti-Cybercrime Group’s


website, complaints may be filed through:
1. Walk-in, Anti-Cybercrime Group Building, Camp Crame,
Quezon City, Manila
2. Complaint Action Center Hotline [+63 (8) 723-0401 local
7491]
3. Viber [+639618298083]
4. Facebook [facebook.com/anticybercrimegroup]
5. Twitter [@pnpacg]
Data Privacy Act of 2012

• Republic Act No. 10173, also known as the Data Privacy Act of 2012
(DPA), aims to protect personal data in information and
communications systems both in the government and the private
sector. The DPA created the National Privacy Commission (NPC)
which is tasked to monitor its implementation.
The function of the NPC

• Rule making.
• Advisory. The NPC is the advisory body on matters related to personal
data protection.
• Public education. – The NPC shall launch initiatives to educate the public
about data privacy, data protection and fair information rights and
responsibilities.
• Compliance and monitoring. – The body has compliance and monitoring
functions to ensure personal information controllers comply with the law. It
is also tasked to manage the registration of personal data processing
systems.
• Complaints and investigations.
• Enforcement.
Offenses and Penalties
Crime Imprisonment Fine
Unauthorized Processing Processing personal data without the 1 year – 6 Php500,000 to
consent of the data subject, or without years Php4,000,000
being authorized under DPA or any
existing law.

Processing of Processing personal data for other 1year 6mos – Php500,000 to


Personal/Sensitive purposes which are no longer 7 years Php2,000,000
Information for authorized by law or consent
Unauthorized Purpose

Access to Persons who provide access to personal Php500,000 to


1-6 years
Personal/Sensitive data due to negligence, without being Php4,000,000
Information due to authorized under DPA or any existing
Negligence law.
Unauthorized Access Persons who knowingly and unlawfully, or violating 1-3 years Php500,000
or Intentional Breach data confidentiality and security data systems, to
breaks in any way into any system where personal Php2,000,0
data is stored. 00
Concealment of Persons who, after having knowledge of a security 1year Php500,000
Security Breach breach involving sensitive personal information and 6mos – to
of the obligation to notify the Commission, 5 years Php1,000,0
intentionally or by omission conceals the fact .[Duty 00
to notify Privacy Commission in case of breach
(within 72 hours)]
Malicious Disclosure Any PIC or PIP or any of its officials, employees or 1year Php
agents, who, with malice or in bad faith, discloses 6mos – 500,000 to
unwarranted or false information relative to any 5 years Php
personal data obtained by him or her 1,000,000
Unauthorized 1 – 5 years Php 500,000 to
Disclosure Any personal information controller or Php 2,000,000
personal information processor or any of
its officials, employees or agents, who
discloses to a third-party personal
information not covered by malicious
disclosure
Improper 6 months – 3 years Php 100,000 to
Disposal Negligently dispose, discard or abandon Php 1,000,000
personal data of an in an area accessible
to the public or placed in its container for
trash collection.

Combination or A combination or series of any of the acts 3– 6 years Php1,000,000.00


Series of Acts defined as a crime to
Php5,000,000.00
Cyber crimes in the Philippines

MANILA, Philippines – The National Bureau of


Investigation (NBI) has arrested five suspects in
the BDO cyberhacking incident that involved funds
stolen from over 700 bank clients.

5 arrested over BDO hacking incident – NBI (rapple


r.com)
Cybercrime incidents in Metro Manila rose
by 152% during the first half of the year,
the Philippine National Police said.

The police also received at least 1,063


cases of illegal online access in the first
six months of 2023.

ATM and credit card fraud also rose


during the first half of the year with 625
incidents reported

Cybercrimes in Metro Manila up by 152% in first half of 2023 – PNP (cnnphilippines.c


om)
persons of interest include over 400 Filipinos while
the rest are Chinese and Indian nationals.
References

• https://www.researchgate.net/publication/331914032
• 5 arrested over BDO hacking incident – NBI (rappler.com)
• R.A. No. 10175: The Cybercrime Prevention Act: The Net Co
mmandments – Philippine Legal Research (legalresearchph.
com)
• Data Privacy | Bulacan State University (bulsu.edu.ph)

You might also like