cybercrimes and scams except cyber squatting and piracy

22
Cybercrimes and scams Cybercrimes and scams except cyber except cyber squatting and piracy squatting and piracy Bacarro, Caballes, Dela Paz, Inciong, Bacarro, Caballes, Dela Paz, Inciong, Lasco, Tan Lasco, Tan

Upload: tahlia

Post on 11-Jan-2016

45 views

Category:

Documents


1 download

DESCRIPTION

Cybercrimes and scams except cyber squatting and piracy. Bacarro, Caballes, Dela Paz, Inciong, Lasco, Tan. Good Sides of Internet. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Cybercrimes and scams except cyber squatting and piracy

Cybercrimes and scams Cybercrimes and scams except cyber squatting and except cyber squatting and piracypiracy

Bacarro, Caballes, Dela Paz, Inciong, Lasco, TanBacarro, Caballes, Dela Paz, Inciong, Lasco, Tan

Page 2: Cybercrimes and scams except cyber squatting and piracy

Good Sides of InternetGood Sides of Internet

Not only communication, the internet has Not only communication, the internet has also given people an easier way of getting also given people an easier way of getting information that they need. The internet information that they need. The internet has also contributed to business. The has also contributed to business. The internet is a great communication system internet is a great communication system for the people to use. The internet is for the people to use. The internet is worldwide that you can actually open a worldwide that you can actually open a conversation to people at any part of the conversation to people at any part of the world. What makes the internet good is world. What makes the internet good is that it makes the jobs of people easier.that it makes the jobs of people easier.

Page 3: Cybercrimes and scams except cyber squatting and piracy

Bad Sides of InternetBad Sides of Internet

One of which is that people are given One of which is that people are given easier way of getting misleading easier way of getting misleading information. People can access sites that information. People can access sites that contain this misleading information in the contain this misleading information in the touch of a button. Through the internet, touch of a button. Through the internet, the people were able to spread bad things. the people were able to spread bad things. The internet has also caused so much The internet has also caused so much addiction. Stress is something that addiction. Stress is something that spending time on the internet can do. spending time on the internet can do.

Page 4: Cybercrimes and scams except cyber squatting and piracy

What people do with the internet? What people do with the internet?

Internet made the communication on Internet made the communication on the world very fast and convenient, the world very fast and convenient, thus people used the internet for thus people used the internet for many different thingsmany different things

Page 5: Cybercrimes and scams except cyber squatting and piracy

Business Business

People today can order goods online from People today can order goods online from certain sites with suppliers. d. Education – certain sites with suppliers. d. Education – Most of the time students use the internet Most of the time students use the internet to do their homework. f. Entertainment – to do their homework. f. Entertainment – Many people use the internet to have fun. Many people use the internet to have fun. They can play internet games and can They can play internet games and can play multiplayer games through the play multiplayer games through the internet. People also can watch videos that internet. People also can watch videos that are posted in sites like YouTube. Sadly are posted in sites like YouTube. Sadly many use the internet for dirty many use the internet for dirty entertainment.entertainment.

Page 6: Cybercrimes and scams except cyber squatting and piracy

Education Education

Most of the time students use the Most of the time students use the internet to do their homework. It is internet to do their homework. It is because of its convenience, because of its convenience, especially the search engines. This especially the search engines. This makes the time used for completing makes the time used for completing the requirement decrease the requirement decrease significantly.significantly.

Page 7: Cybercrimes and scams except cyber squatting and piracy

AdvertisementAdvertisement

Many companies nowadays invest in Many companies nowadays invest in online advertisements. They online advertisements. They advertise through the internet advertise through the internet because many use it. They place because many use it. They place their ads on sites that are popular their ads on sites that are popular and are regularly visited. So if a and are regularly visited. So if a percentage of people who visit that percentage of people who visit that site will see their ad and those who site will see their ad and those who might want to buy their product may might want to buy their product may be interested to buy. be interested to buy.

Page 8: Cybercrimes and scams except cyber squatting and piracy

EntertainmentEntertainment

Many people use the internet to have Many people use the internet to have fun. They can play internet games fun. They can play internet games and can play multiplayer games and can play multiplayer games through the internet. People also can through the internet. People also can watch videos that are posted in sites watch videos that are posted in sites like YouTube. There are also joke like YouTube. There are also joke sites that one can visit. Sadly many sites that one can visit. Sadly many use the internet for dirty use the internet for dirty entertainment.entertainment.

Page 9: Cybercrimes and scams except cyber squatting and piracy

InformationInformation

The internet is shared by people over The internet is shared by people over the world. There are newspaper sites the world. There are newspaper sites that have compilations of news that have compilations of news article. There are also some article. There are also some educational sites for many different educational sites for many different things. With so many people who put things. With so many people who put in information in the internet there is in information in the internet there is a high possibility that you can get a high possibility that you can get the information you need. the information you need.

Page 10: Cybercrimes and scams except cyber squatting and piracy

Freedom of ExpressionFreedom of Expression

People post what they feel, People post what they feel, experience and other things on their experience and other things on their blogs which they want to share to blogs which they want to share to other people. The people can also other people. The people can also comment on blogs that are posted. comment on blogs that are posted. There are also people who post their There are also people who post their art works in sites which were made art works in sites which were made for the sole purpose of art.for the sole purpose of art.

Page 11: Cybercrimes and scams except cyber squatting and piracy

CybercrimesCybercrimes

• Ordinary CrimesOrdinary Crimes All ordinary crimes, when done over a All ordinary crimes, when done over a

network/computer system are considered network/computer system are considered cyber crimes.cyber crimes.

Examples are:Examples are:• FraudFraud• EmbezzlementEmbezzlement• TheftTheft• BlackmailBlackmail• Etc.Etc.

Page 12: Cybercrimes and scams except cyber squatting and piracy

• Privacy InfringementPrivacy Infringement HackingHacking

• Security Exploit - Exploiting a known vulnerability in a Security Exploit - Exploiting a known vulnerability in a computer systemcomputer system

• Packet Sniffer - Reading random packets of information for Packet Sniffer - Reading random packets of information for passwords, etc.passwords, etc.

• Rootkit - A small program or bit of code which disguises Rootkit - A small program or bit of code which disguises itself as part of the OS, but allows the hacker to take itself as part of the OS, but allows the hacker to take control of the victim’s computer.control of the victim’s computer.

• Social Engineering - Not really hacking in the technical Social Engineering - Not really hacking in the technical sense, it is befriending and/or impersonating an sense, it is befriending and/or impersonating an acquaintance of a person in order to get his/her acquaintance of a person in order to get his/her information.information.

• MalwareMalware Trojan Horse - a program which pretends to do one Trojan Horse - a program which pretends to do one

thing but in fact does another task without the user’s thing but in fact does another task without the user’s consent.consent.

Virus - “Virus - “a self-replicating program that spreads by a self-replicating program that spreads by inserting copies of itself into other executable code or inserting copies of itself into other executable code or documents.” - Wikipediadocuments.” - Wikipedia

Worm - Much like a virus, it is self-replicating, but unlike Worm - Much like a virus, it is self-replicating, but unlike a virus, it can travel by itself through network a virus, it can travel by itself through network connections, and does not need a “host”.connections, and does not need a “host”.

• Key Logger - A program which notes the keys which a user Key Logger - A program which notes the keys which a user presses and sends them back to the propagator of the presses and sends them back to the propagator of the logger.logger.

Page 13: Cybercrimes and scams except cyber squatting and piracy

Intercepting DataIntercepting Data• PharmingPharming

Rerouting the victim to a bogus website in an Rerouting the victim to a bogus website in an attempt to gain sensitive informationattempt to gain sensitive information

• Spoofing attack / PhishingSpoofing attack / Phishing Faking a program or website, making it seem Faking a program or website, making it seem

legitimate in an attempt to gain sensitive legitimate in an attempt to gain sensitive information.information.

• Child HarassmentChild Harassment A special case of crime because it is much more A special case of crime because it is much more

rampant in the internet as compared to analogue rampant in the internet as compared to analogue means.means.

Child PornographyChild Pornography• ““A visual depiction of any kind, including a A visual depiction of any kind, including a

drawing, cartoon, sculpture, or painting, drawing, cartoon, sculpture, or painting, photograph, film, video, or computer-generated photograph, film, video, or computer-generated image or picture, whether made or produced by image or picture, whether made or produced by electronic, mechanical, or other means, of electronic, mechanical, or other means, of sexually explicit conduct, where it: sexually explicit conduct, where it:

Page 14: Cybercrimes and scams except cyber squatting and piracy

depicts a minor engaging in sexually depicts a minor engaging in sexually explicit conduct and is obscene, orexplicit conduct and is obscene, or

depicts an image that is, or appears to depicts an image that is, or appears to be, of a minor engaging in graphic be, of a minor engaging in graphic bestiality, sadistic or masochistic bestiality, sadistic or masochistic abuse, or sexual intercourse, including abuse, or sexual intercourse, including genital-genital, oral-genital, anal-genital-genital, oral-genital, anal-genital, or oral-anal, whether between genital, or oral-anal, whether between persons of the same or opposite sex, persons of the same or opposite sex, and such depiction lacks serious and such depiction lacks serious literary, artistic, political, or scientific literary, artistic, political, or scientific value.” - taken from value.” - taken from http://http://www.missingkids.comwww.missingkids.com

Page 15: Cybercrimes and scams except cyber squatting and piracy

• Minors are defined to be anyone younger Minors are defined to be anyone younger than 18 years of age.than 18 years of age.

• The victims of this act are usually The victims of this act are usually kidnapped, sold, or otherwise forced, kidnapped, sold, or otherwise forced, against their will, to comply.against their will, to comply.

• Many children are found in “kids only” Many children are found in “kids only” online chat rooms where minors meet to online chat rooms where minors meet to discuss whatever tickles their fancy. discuss whatever tickles their fancy. Many of the victims taken from chat Many of the victims taken from chat rooms are also a victim of Child rooms are also a victim of Child Grooming.Grooming.

Page 16: Cybercrimes and scams except cyber squatting and piracy

Child GroomingChild Grooming• It is defined as befriending or otherwise It is defined as befriending or otherwise

establishing an emotional connection with a child establishing an emotional connection with a child and his/her family with the intent to sexually and his/her family with the intent to sexually harass the child.harass the child.

• This is done because:This is done because: Children will more often than not fail to report Children will more often than not fail to report

an incident which involves someone with an incident which involves someone with whom they have a close relationship.whom they have a close relationship.

The parents of the children will find it harder The parents of the children will find it harder to believe any cases of child molestation if the to believe any cases of child molestation if the perpetrator is a close friend of theirs.perpetrator is a close friend of theirs.

Although the act in itself is illegal, the steps Although the act in itself is illegal, the steps towards it are not, and the intent to commit towards it are not, and the intent to commit the act is hard to provethe act is hard to prove..

Page 17: Cybercrimes and scams except cyber squatting and piracy

SEC. 33. Penalties.SEC. 33. Penalties. R.A.8792 R.A.8792 c) Violations of the Consumer Act or c) Violations of the Consumer Act or

Republic Act No. 7394 and other relevant Republic Act No. 7394 and other relevant or pertinent laws through transactions or pertinent laws through transactions covered by or using electronic data covered by or using electronic data messages or electronic documents, shall messages or electronic documents, shall be penalized with the same penalties as be penalized with the same penalties as provided in those laws; provided in those laws;

d) Other violations of the provisions of this d) Other violations of the provisions of this Act, shall be penalized with a maximum Act, shall be penalized with a maximum penalty of one million pesos penalty of one million pesos (P1,000,000.00) or six (6) years (P1,000,000.00) or six (6) years imprisonment. imprisonment.

Page 18: Cybercrimes and scams except cyber squatting and piracy

The Love BugThe Love Bug In early May of 2000, a computer virus known as the "love bug" In early May of 2000, a computer virus known as the "love bug"

emerged and spread rapidly around the globe. According to one emerged and spread rapidly around the globe. According to one report, the virus, which was designed to disseminate itself and to report, the virus, which was designed to disseminate itself and to destroy various kinds of files on a victim's computer, "infected at destroy various kinds of files on a victim's computer, "infected at least 270,000 computers in the first hours" after it was released.least 270,000 computers in the first hours" after it was released.[6][6] The "love bug" forced the shutdown of computers at large The "love bug" forced the shutdown of computers at large corporations such as Ford Motor Company and Dow Chemical corporations such as Ford Motor Company and Dow Chemical Company, as well as the computer system at the House of Lords.Company, as well as the computer system at the House of Lords.[7][7]

After security experts determined that the virus had come from After security experts determined that the virus had come from the Philippines, investigators from the Philippines and from the the Philippines, investigators from the Philippines and from the United States set about tracking down the person(s) who created United States set about tracking down the person(s) who created and disseminated it. They were frustrated in this effort by the and disseminated it. They were frustrated in this effort by the Philippines' lack of computer crime laws: For one thing, it took Philippines' lack of computer crime laws: For one thing, it took days for investigators to obtain a warrant to search the home of days for investigators to obtain a warrant to search the home of their primary suspect; local prosecutors had to comb through their primary suspect; local prosecutors had to comb through Philippines statutes to find laws that might apply to the Philippines statutes to find laws that might apply to the dissemination of the virus, and then had to persuade a judge to dissemination of the virus, and then had to persuade a judge to issue a search warrant on the basis of one possibilityissue a search warrant on the basis of one possibility

Page 19: Cybercrimes and scams except cyber squatting and piracy

.[8] For another, when a suspect-Onel de Guzman-was .[8] For another, when a suspect-Onel de Guzman-was eventually apprehended, there were no laws criminalizing eventually apprehended, there were no laws criminalizing what he had done. The Philippines had no statutes making what he had done. The Philippines had no statutes making it a crime to break into a computer system, to disseminate it a crime to break into a computer system, to disseminate a virus or other harmful software or to use a computer in an a virus or other harmful software or to use a computer in an attempt to commit theft. Lacking the ability to charge de attempt to commit theft. Lacking the ability to charge de Guzman with precisely what he had done-e.g., with Guzman with precisely what he had done-e.g., with disseminating a virus-Philippine prosecutors charged him disseminating a virus-Philippine prosecutors charged him with theft and with violating a statute that covered credit with theft and with violating a statute that covered credit card fraud.[9] Those charges were eventually dropped after card fraud.[9] Those charges were eventually dropped after the Department of Justice determined that "the credit card the Department of Justice determined that "the credit card law [did] not apply to computer hacking and that law [did] not apply to computer hacking and that investigators did not present adequate evidence to support investigators did not present adequate evidence to support the theft charge." [10] the theft charge." [10]

The "love bug" destroyed files and impeded e-mail traffic in The "love bug" destroyed files and impeded e-mail traffic in more than twenty countries. [11] Some estimated that the more than twenty countries. [11] Some estimated that the virus caused $10 billion in damage, much of that in lost virus caused $10 billion in damage, much of that in lost productivity.[12] The episode prompted the Philippines to productivity.[12] The episode prompted the Philippines to adopt a cybercrime law that established fines and prison adopt a cybercrime law that established fines and prison sentences for those hacked into computer systems and/or sentences for those hacked into computer systems and/or disseminated viruses or other harmful programs.[13] The disseminated viruses or other harmful programs.[13] The new law could not be applied retroactively against the new law could not be applied retroactively against the individual suspect of disseminating the "love bug" virus, so individual suspect of disseminating the "love bug" virus, so that crime went uncharged. that crime went uncharged.

Page 20: Cybercrimes and scams except cyber squatting and piracy

Internet SecurityInternet Security

The internet is filled with things that The internet is filled with things that could make cripple computers or could make cripple computers or make them malfunction. Generally, make them malfunction. Generally, avoiding viruses can be done with avoiding viruses can be done with the use of both antivirus programs the use of both antivirus programs and the practice of safe computing.and the practice of safe computing.

Page 21: Cybercrimes and scams except cyber squatting and piracy

Computer Sec. (automated)Computer Sec. (automated)

There are programs that specialize in There are programs that specialize in fighting spyware, or programs that fighting spyware, or programs that moderate what goes in and out of moderate what goes in and out of your computer (firewall programs). your computer (firewall programs). Security programs work well when Security programs work well when they are updated frequently. The they are updated frequently. The common criteria for antivirus common criteria for antivirus programs are: speed, detection rate, programs are: speed, detection rate, and features, and pricing.and features, and pricing.

Page 22: Cybercrimes and scams except cyber squatting and piracy

Personal SecurityPersonal Security

The general idea of safe computing is The general idea of safe computing is using common sense to see which using common sense to see which sources of files are trusted and which sources of files are trusted and which aren't. Some files take on smart aren't. Some files take on smart names like "funny UST scandal" to names like "funny UST scandal" to entice users to open it. Generally entice users to open it. Generally speaking, .exe files that are not from speaking, .exe files that are not from trusted sources should not be trusted sources should not be opened. opened.