0% found this document useful (0 votes)
39 views33 pages

Cybercrimes and Online Threats Emp. Tech.

The document outlines the objectives of a lesson on cybercrimes and internet threats, emphasizing the importance of online safety and responsible use of social networking. It defines cybercrime, lists common types such as malware, phishing, and cyberbullying, and discusses various forms of malware and their impacts. The conclusion stresses the need for awareness and protective measures against internet threats to safeguard personal information.

Uploaded by

dwaynelikesrock
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views33 pages

Cybercrimes and Online Threats Emp. Tech.

The document outlines the objectives of a lesson on cybercrimes and internet threats, emphasizing the importance of online safety and responsible use of social networking. It defines cybercrime, lists common types such as malware, phishing, and cyberbullying, and discusses various forms of malware and their impacts. The conclusion stresses the need for awareness and protective measures against internet threats to safeguard personal information.

Uploaded by

dwaynelikesrock
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

EMTEC1

CYBERCRIMES
AND INTERNET
THREATS
Objectives:

At the end of the lesson, the students will be able to

consider one and other's safety when


sharing information using the internet.

determine and avoid the perils and


dangers of the internet.

be responsible in the use of social


networking sites.
Evidently, the internet has a vast reach,
linking people and devices globally.

It has become the universal source of


information for millions of people, at
home, at school, and at work.
INTERNET
is known as the
Information Superhighway
Source: We Are Social
CYBERCRIMES
CYBERCRIME

Cybercrime is any criminal activity that


involves a computer, networked device, or
network.
While most cybercrimes are carried out in
order to generate profit for the
cybercriminals, some cybercrimes are carried
out against computers or devices directly to
damage or disable them.

Cybercrime is any crime that targets or uses a


computer device and can be done by an
individual or an organization.
Common
Cybercrimes

Malware Hacking Spamming Phishing Pharming

Identity Theft Piracy Online Cyberbullying


Grooming
MALWARE

Malware, short for “malicious software,”


refers to any intrusive software developed
by cybercriminals (often called “hackers”)
to steal data and damage or destroy
computers and computer systems.
KINDS OF
MALWARE

Virus Worm Trojan Spyware Adware


VIRUS

A computer virus is a type of malicious software, or malware,


that spreads between computers and causes damage to
data and software.

A malicious program is designed to replicate itself and


transfer from one computer to another either through.

Networks, like the Internet,


through email

Data storage, through flash drives or CDs


WORM

It is a malicious program that


transfers from one computer to
another by any type of means. It
uses computer network to spread
itself.

For example, the ILOVEYOU


worm (Love Bug Worm) created
by a Filipino
TROJAN

A Trojan is a type of malicious


software that disguises itself as
legitimate software in order to
gain access to a computer
system.

Once inside, it can perform


various actions such as stealing
sensitive information or allowing
unauthorized access to the
infected computer.
SPYWARE

Spyware is a type of software that


is designed to gather information
about a user or organization
without their knowledge or
consent.

This information can include


browsing habits, login credentials,
and other sensitive data.
ADWARE

Adware is software that displays


advertisements on a computer or
mobile device, typically in the
form of pop-up ads or banners.

Adware can be bundled with


other software and installed
without the user's knowledge.
SPAM

Unwanted or unsolicited electronic


messages, typically sent in bulk to a
large number of recipients through
email, instant messaging, or other
forms of online communication.

Spam messages can be used to


promote products or services, spread
malware, or phish for personal
information.
ONLINE GROOMING

The act of building an emotional


connection with a child or teenager
through the internet in order to
exploit them sexually.
ONLINE GROOMING

This can involve luring or


manipulating the child or
teenager into sending sexually
explicit images or engaging in
sexual activity.
PIRACY

Piracy: Unauthorized copying or


distribution of copyrighted
material, such as music, movies, or
software.

This can include downloading or


sharing copyrighted files without
permission from the copyright
owner.
IDENTITY THEFT

Identity Theft: The unauthorized


use of an individual's personal
information, such as name, social
security number, or credit card
information, for fraudulent
activities.

This can include opening bank


accounts, applying for loans, or
making unauthorized purchases.
Identity theft cases in the Philippines
PHISHING:

A tactic used by cybercriminals to


trick individuals into giving sensitive
information, such as login credentials
or financial information, by disguising
themselves as a trustworthy entity
through email, text message, or social
media.
PHARMING

A cyber attack in which an attacker


redirects a website's traffic to a
fake version of the site in order to
steal personal information, such as
login credentials, financial
information or personal details.
PHARMING
CYBERBULLYING

The use of technology to harass,


threaten, or intimidate someone,
usually a child or teenager. This can
include sending threatening or
abusive messages, spreading
rumors or embarrassing images, or
creating fake social media
accounts to impersonate the
victim.
HACKING

The act of gaining unauthorized


access to a computer system, network,
or website in order to steal or destroy
data, disrupt service, or gain control of
the system.
Most Used Passwords Online
(Easy to Hack)

News in the country related to


hacking.
Government Provisions for
Online Courtesy and Etiquette

Republic Act 10627 or the Anti-bullying Act of


2013

Republic Act 10175 or Cybercrime Prevention


Act of 2012

Date Privacy Act of 2012


Conclusion

Students should be aware that while the


internet provides a wealth of information and
resources, it also poses potential dangers in the
form of cybercrime and internet threats.

These threats can include hacking, phishing,


identity theft, and cyberbullying. It is important
for students to understand how to protect
themselves from these threats and take steps
to safeguard their personal information and
online presence.
References:

Cyber Crime and Security Presentation


(slideshare.net)

Empowerment Technologies: Innovative


Training Works, Inc. (1st ed.). (2016). Manila,
Philippines: REX Book Store

Empowerment Technologies Teacher's


Resources Material: Innovative Training Works,
Inc. (1st ed.). (2016). Manila, Philippines: REX
Book Store

Internet Security Threat Report by Symantec

You might also like