0% found this document useful (0 votes)
23 views

Cybercrime

Cybercrime involves crimes committed using the internet. There are several types of cybercrimes such as hacking, copyright infringement, child pornography, and cyber threats like malware. Malware includes viruses, worms, and Trojans that can harm computers. Other internet threats are spam and phishing which aim to steal personal information. Netiquette rules teach internet users to respect others, know their environment, and protect privacy online. People must think before posting to avoid issues like copyright infringement and protecting their online reputation.

Uploaded by

angielou
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Cybercrime

Cybercrime involves crimes committed using the internet. There are several types of cybercrimes such as hacking, copyright infringement, child pornography, and cyber threats like malware. Malware includes viruses, worms, and Trojans that can harm computers. Other internet threats are spam and phishing which aim to steal personal information. Netiquette rules teach internet users to respect others, know their environment, and protect privacy online. People must think before posting to avoid issues like copyright infringement and protecting their online reputation.

Uploaded by

angielou
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

CYBERCRIME

Cybercrime – a crime committed or assisted through


the use of the Internet.

 Also known as computer related crime

 The computer may be the commission of the


crime, or the target.
Types of Crimes:
• Hacking
• Copyright infringement
• Unwarranted mass surveillance
• Child pornography
• Child grooming
INTERNET THREATS

• Malware
-stands for malicious software
INTERNET THREATS

• Malware
-stands for malicious software
- Different types of malware
Virus - a malicious program designed to replicate
itself and transfer from one computer to another
either through the Internet and local networks or
data storage like flash drives and CDs.
Worm - a malicious program that transfers from
one computer to another by any type of means.

Trojan - a malicious program that is disguised as a


useful program but once downloaded or installed.
Leaves your PC unprotected and allows hackers to get
your information.
 Spam
- Unwanted email mostly from bots or advertisers.
 
 Phishing
- Its goal is to acquire sensitive personal information like
passwords and credit card details.
Rules of Netiquette

 Rule No. 1
- Remember the human.
You need to remember that you are talking to a real person when you
are online.
The internet brings people together who would otherwise never meet.
Remember this saying when sending an email: Would I say this to the
person’s face.
 Rule No. 2
- Adhere to the same standards online that you follow in real life.
You need to behave the same way online that you do in real life.
You need to remember that you can get caught doing things you should
not be doing online just like you can in real life.
You are still talking to a real person with feelings even though you can’t
see them.
 
 Rule No. 3
- Know where you are in cyberspace.
Always take a look around when you enter a new domain when surfing
the web.
Get a sense of what the discussion group is about before you join it.
 Rule No. 4
- Respect other people’s time and bandwidth.
Remember people have other things to do besides read your email. You
are not the center of their world.
Keep your post and emails to minimum by saying what you want to say.
Remember everyone won’t answer your questions
Rule No. 5
Make yourself look good online.
-Be polite and pleasant to everyone.
-Always check your spelling and grammar before posting.
-Know what you are talking about and make sense saying it.
 Rule No. 6
- Share expert knowledge.
Ask questions online.
Share what you know online.
Post the answers to your questions online because someone may
have the same question you do.
 Rule No. 8
- Respect other people’s privacy.
Do not read other people’s mail without their permission.
Going through other people’s things could cost you, your job or you
could even go to jail.
Not respecting other people’s privacy is a bad netiquette.
 Rule No. 9
- Don’t abuse your power.
Do not take advantage of other people just because you have more
knowledge or power than them
Treat others as you would want them to treat you if the roles were
reversed.
 Rule No. 10
- Be forgiving of other people’s mistake.
Do not point out mistakes to people online.
Remember that you were once the new kid on the block.
You still need to have a good manner even though you are online
and cannot see the person face to face.
PROTECTING REPUTATIONS ONLINE

- Once you post something over the Internet, search engines keep
them in their archives for search results. This makes anything you
post to last forever even if you delete it in your page. Something
you and your friends find funny today may be something that
could harm someone’s reputation later.
THINK BEFORE YOU CLICK
What are the things you might want to consider before posting over the
internet?
 
COPYRIGHT INFRINGEMENT

- If you create something - an idea, an invention, a form of literary work, or a


research, you have the right as to how it should be used by others. This is
called intellectual property. In other words, the copyright law includes
your rights over you work, and anyone who uses it without your consent is
punishable by law.
Tips that could help you avoid copyright infringement:
understand;
be responsible;
be creative; and
know the law.
ONLINE RESEARCH

Tips that could help you avoid copyright infringement:


have a question in mind;
narrow it down;
advance search;
look for a credible source; and
give credit.

You might also like