CYBERCRIM
ES
Prepared by: Denver
Dayag
CYBER
It is the Characteristics of the
culture of computers,
information, technology, and
virtual reality.
CYBERCR
Cybercrime refers to any
IMEcriminal activity that
utilizes computers or the
internet to achieve illegal
ends. This broad category
encompasses a wide range
of offenses, such as
Identity theft, Internet
fraud, Hacking, Malware
distribution, and Child
pornography
CYBERCRIMINA
LS
Cybercriminals are individuals or
groups who engage in
cybercrime for various motives,
including financial gain, political
activism, or personal
satisfaction. They employ a
range of sophisticated
techniques to exploit
vulnerabilities in computer
systems and networks, often
operating in the "deep web" to
trade malicious goods and
CYBERCRIMINA
LS
HACKERS
INDETITY THIEVES
INTERNET STALKER
CYBER TERRORIST
SCAMMERS AND
PHISHERS
Republic Act No. 10175
Cybercrime Prevention Act of
INTERNET
2012 which aims to address
the legal issue concerning
online interactions and
internet.
Republic Act No. 10173
LAW
Data Privacy Act of 2012 an
act protecting individual
personal information in
information and
communication system.
COMMON
FORMS OF
COPY
CYBERCRIME COPYRIGHT
RIGHT INFRIGMENT
The exclusive legal right, Is the violation, piracy
given to an originator or an or theft of a copyright
assignee to print, publish, holder’s exclusive
perform, film, or record rights through the
literary, artistic or musical unauthorized us of a
material, and to authorize copyrighted material or
others to do the same. work.
COMMON
FORMS OF
CYBERCRIME
PLAGIARIS
M
An act or instance of
using or closely
imitating the language
and thoughts of another
author without
authorization.
COMMON
FORMS OF
CYBERCRIME
OFFLINE ONLINE
COMPUTE Generally used
when speaking
Also known as “
Internet
R about excessive
gaming behavior,
Addiction”, gets
more attention in
ADDICTIO which can be
practiced both
general from
scientific research
N offline and online.
than offline
computer
HACKING
Unauthorized access to corrupt, alter,
steal, or destroy electronic data using
computers or other information and
communication system without the
computer or system owner’s knowledge
CRIMINAL
and consent.
FORGERY,FRAUD, OR IDENTITY
THEFT
An attempt to obtain sensitive such as
usernames, passwords, and credit card
details and, often for malicious reasons.
ELECTRONIC
THEFT files that you do not have the
Obtaining
ACTIVITIE
right to use from the internet. Practice of
illegally copying and selling digital music,
video, computer software, etc...
S
CYBERBULLYING
The use of electronic communication to
bully a person. The Anti-Bullying Act of
2013 (RA 10627).
CYBERSEX
CRIMINAL
Willful engagement, maintenance,
control, or operation, directly or indirectly
of any lascivious exhibition of sexual
organs or sexual activity with the aid of a
computer system.
CHILD
IsPORNOGRAPHY
a form of child sexual exploitation. The
ACTIVITIE
Anti-Child Pornography Act by 2009(RA
No. 9775) S
CYBER DEFAMATION
Is an unprivileged false
statement of fact which CRIMINAL
tends to harm the reputation
of a person or company.
ACTIVITIE
S
HACKIN
Hacking is a term used to
G
describe taken by
someone to gain
INTER
unauthorized access to
computer.
MALWARE
NET Malware is one of the
more common ways to
infiltrate or damage your
THREA computer.
PHARMIN
A means to point you to
G
TS malicious and
illegitimate website by
redirecting the
legitimate URL.
PHISHIN
Fake emails, text
G
messages and websites
created to look like they’re
INTER
from aunthentic
companies.
RANSOMWAR
NET Ransomware
E is a type of malware restrict access to
your computer or your files and displays a message that
demands payment in order for the restriction to be
THREA remove.
SPAM
Spam is one of the more
TS common methods of
both sending
information out and
collecting it from
unsuspecting people.
SPYWARE (Spyware &
Spyware and Adware are
Adware)
often used by third parties
to infiltrate your computer.
INTER TROJAN
NET A malicious prgram that is disguise as, or embedded
HORSE
within, legitimate software.
THREA VIRUSES
Malicious computer program that are often sent as
TS an email attachment or a download with the intent of
infecting your computer, as well as the computers of
everyone in your contact list.
INTER WIFI EAVESDROPPING
NET Virtual
“listening in” on
THREA information
that’s shared
TS over an
unsecure WIFI
network.
RULES OF
CYBER ETHICS
• Do not break • Do not use rude • Adhere to
into someone or offensive copyright
else’s computer language restriction
• Do not attempt to • Do not use
• Do not
make someone someone else’s
Cyberbully
else’s compute password
unusable
• Do not
Plagiarize
AWARENESS IN
USING SOCIAL
MEDIA
MENTAL HEALTH
It allows individuals to recognize
the signs of social media
addiction and take steps to
maintain a balanced and mindful
approach to their online activities
AWARENESS IN
USING SOCIAL
MEDIA
PRIVACY AND
Understanding theSECURITY
privacy settings, data
collection practices, and potential security
risks associated with social media
platforms can empower users to protect
their personal information and maintain
control over their online presence.
AWARENESS IN
USING SOCIAL
MEDIA
MEDIA LITERACY
Social media awareness encompasses
media literacy skills, which involve
critically evaluating and analyzing the
information presented on social
mediaplatforms.
TEN THINGS NOT
TO DO ON SOCIAL
NETWORKING
information
SITES
• Don't overshare personal • Don't engage in
cyberbullying
• Don't accept friend requests from • Don't post photos or videos that
strangers could compromise your privacy
• Don't click on suspicious • Don't use weak
links passwords
• Don't download files from untrusted • Don't ignore privacy
sources settings
• Don't post inflammatory or offensive • Don't forget to log
content out
Thynk Unlimited
THANK YOU
FOR YOUR
ATTENTION