EMTEC1
CYBERCRIMES
AND INTERNET
THREATS
Objectives:
At the end of the lesson, the students will be able to
consider one and other's safety when
sharing information using the internet.
determine and avoid the perils and
dangers of the internet.
be responsible in the use of social
networking sites.
Evidently, the internet has a vast reach,
linking people and devices globally.
It has become the universal source of
information for millions of people, at
home, at school, and at work.
INTERNET
is known as the
Information Superhighway
Source: We Are Social
CYBERCRIMES
CYBERCRIME
Cybercrime is any criminal activity that
involves a computer, networked device, or
network.
While most cybercrimes are carried out in
order to generate profit for the
cybercriminals, some cybercrimes are carried
out against computers or devices directly to
damage or disable them.
Cybercrime is any crime that targets or uses a
computer device and can be done by an
individual or an organization.
Common
Cybercrimes
Malware Hacking Spamming Phishing Pharming
Identity Theft Piracy Online Cyberbullying
Grooming
MALWARE
Malware, short for “malicious software,”
refers to any intrusive software developed
by cybercriminals (often called “hackers”)
to steal data and damage or destroy
computers and computer systems.
KINDS OF
MALWARE
Virus Worm Trojan Spyware Adware
VIRUS
A computer virus is a type of malicious software, or malware,
that spreads between computers and causes damage to
data and software.
A malicious program is designed to replicate itself and
transfer from one computer to another either through.
Networks, like the Internet,
through email
Data storage, through flash drives or CDs
WORM
It is a malicious program that
transfers from one computer to
another by any type of means. It
uses computer network to spread
itself.
For example, the ILOVEYOU
worm (Love Bug Worm) created
by a Filipino
TROJAN
A Trojan is a type of malicious
software that disguises itself as
legitimate software in order to
gain access to a computer
system.
Once inside, it can perform
various actions such as stealing
sensitive information or allowing
unauthorized access to the
infected computer.
SPYWARE
Spyware is a type of software that
is designed to gather information
about a user or organization
without their knowledge or
consent.
This information can include
browsing habits, login credentials,
and other sensitive data.
ADWARE
Adware is software that displays
advertisements on a computer or
mobile device, typically in the
form of pop-up ads or banners.
Adware can be bundled with
other software and installed
without the user's knowledge.
SPAM
Unwanted or unsolicited electronic
messages, typically sent in bulk to a
large number of recipients through
email, instant messaging, or other
forms of online communication.
Spam messages can be used to
promote products or services, spread
malware, or phish for personal
information.
ONLINE GROOMING
The act of building an emotional
connection with a child or teenager
through the internet in order to
exploit them sexually.
ONLINE GROOMING
This can involve luring or
manipulating the child or
teenager into sending sexually
explicit images or engaging in
sexual activity.
PIRACY
Piracy: Unauthorized copying or
distribution of copyrighted
material, such as music, movies, or
software.
This can include downloading or
sharing copyrighted files without
permission from the copyright
owner.
IDENTITY THEFT
Identity Theft: The unauthorized
use of an individual's personal
information, such as name, social
security number, or credit card
information, for fraudulent
activities.
This can include opening bank
accounts, applying for loans, or
making unauthorized purchases.
Identity theft cases in the Philippines
PHISHING:
A tactic used by cybercriminals to
trick individuals into giving sensitive
information, such as login credentials
or financial information, by disguising
themselves as a trustworthy entity
through email, text message, or social
media.
PHARMING
A cyber attack in which an attacker
redirects a website's traffic to a
fake version of the site in order to
steal personal information, such as
login credentials, financial
information or personal details.
PHARMING
CYBERBULLYING
The use of technology to harass,
threaten, or intimidate someone,
usually a child or teenager. This can
include sending threatening or
abusive messages, spreading
rumors or embarrassing images, or
creating fake social media
accounts to impersonate the
victim.
HACKING
The act of gaining unauthorized
access to a computer system, network,
or website in order to steal or destroy
data, disrupt service, or gain control of
the system.
Most Used Passwords Online
(Easy to Hack)
News in the country related to
hacking.
Government Provisions for
Online Courtesy and Etiquette
Republic Act 10627 or the Anti-bullying Act of
2013
Republic Act 10175 or Cybercrime Prevention
Act of 2012
Date Privacy Act of 2012
Conclusion
Students should be aware that while the
internet provides a wealth of information and
resources, it also poses potential dangers in the
form of cybercrime and internet threats.
These threats can include hacking, phishing,
identity theft, and cyberbullying. It is important
for students to understand how to protect
themselves from these threats and take steps
to safeguard their personal information and
online presence.
References:
Cyber Crime and Security Presentation
(slideshare.net)
Empowerment Technologies: Innovative
Training Works, Inc. (1st ed.). (2016). Manila,
Philippines: REX Book Store
Empowerment Technologies Teacher's
Resources Material: Innovative Training Works,
Inc. (1st ed.). (2016). Manila, Philippines: REX
Book Store
Internet Security Threat Report by Symantec