100%(2)100% нашли этот документ полезным (2 голоса)
1K просмотров22 страницы
The document discusses cybercrimes and methods for combating them. It lists 10 common cybercrimes, including phishing, blackmail, hacking, illegal gambling, fraud, harassment, child pornography, drug trafficking, and copyright infringement. It then describes three methods for combating cybercrimes: network security measures, investigation through IP address tracing, and penalties under developing cybercrime laws. Key terms related to cybercrimes are also defined. Students are assigned seatwork questions about new cybercrimes, copyright law implementation, and how ICT could benefit their future careers.
The document discusses cybercrimes and methods for combating them. It lists 10 common cybercrimes, including phishing, blackmail, hacking, illegal gambling, fraud, harassment, child pornography, drug trafficking, and copyright infringement. It then describes three methods for combating cybercrimes: network security measures, investigation through IP address tracing, and penalties under developing cybercrime laws. Key terms related to cybercrimes are also defined. Students are assigned seatwork questions about new cybercrimes, copyright law implementation, and how ICT could benefit their future careers.
The document discusses cybercrimes and methods for combating them. It lists 10 common cybercrimes, including phishing, blackmail, hacking, illegal gambling, fraud, harassment, child pornography, drug trafficking, and copyright infringement. It then describes three methods for combating cybercrimes: network security measures, investigation through IP address tracing, and penalties under developing cybercrime laws. Key terms related to cybercrimes are also defined. Students are assigned seatwork questions about new cybercrimes, copyright law implementation, and how ICT could benefit their future careers.
Cybercrimes • Cybercrimes are illegal acts done through the use of the Internet. In 2012, Stephen Nale (Complex.com) posted a list of ten most common Internet cybercrimes as follows: 1. Phishing/Spoofing – the act of sending multiple emails to multiple users in hopes of having a number of them clicking on the links or malwares attached to the email. 2. Blackmail/Extortion – the act of using the Internet to threaten or damage someone’s reputation to extort money or anything else of value. This can be avoided if you are aware of what you should post on the Internet. 3. Accessing Stored Communications
– or hacking; the act of obtaining
unauthorized access to data from a computer network. 4. Sports Betting – the act of wagering on any sports event over the Internet. In some countries, gambling (including sports betting) is illegal even if you are doing it over the Internet. 5. Non-Delivery of Merchandise – the act of devising a scheme wherein a culprit posts an item or service for sale over the Internet and once the transactions have been done, does not really give the item or service. 6. Electronic Harassment – the act of anonymously using the Internet to harass, abuse, threaten, or annoy other people. 7. Child Pornography – the act of using the Internet to show child pornography. This act is highly punishable by law. 8. Drug Trafficking – the act of selling illegal substances using the Internet. 9. Criminal Copyright Infringement – the act of piracy mainly for financial gain. In late 2014, the number one pirate website, ThePirateBay, was raided for the second time due to years of pirating movies, music, games, books, and other software. These kinds of websites earn money through advertising. Combatting Cybercrimes 1. Network Security. Before a hacker can get through the unauthorized files he or she is targeting, the hacker has to get through several security measures like firewalls, secure connections, passwords, anti-malwares, and data encryptions. Combatting Cybercrimes 2. Investigation. URL tracing and logging are used by websites to track your unique IP addresses. This can be used by investigators to trace hackers. In piracy, trackers are used to identify IP addresses currently sharing a pirated file. Combatting Cybercrimes 3. Penalties. More and more laws are being created and implemented today. Penalties include both a fine and imprisonment. Key Terms • Phishing – also referred to as spoofing; an act of spamming e-mails • Spam – unwanted emails • Blackmail – act of asking something in return of not showing something that could damage someone’s reputation Key Terms • Hacking – the act of obtaining authorized information • Cyberbullying – an act of harassment using electronic means • Copyright infringement – an act of piracy mainly for financial gain Key Terms • Encryption – the process of converting raw data into code SEATWORK: 1. What are other cybercrimes that were not discussed in this lesson that you think students of your generation should be aware of? Why? SEATWORK: 2. Are the laws on copyright being implemented in the Philippines? Defend your answer. SEATWORK: 3. As a future professional in your respective field, what are the things that you think ICT can do to help you in your field? Performance Task:
• Make an advertisement (slogan) to
campaign on fight against cybercrime. (20 pts.) • *OSLO PAPER