Anda di halaman 1dari 22

Lesson 15

The Disadvantages of ICT


Cybercrimes
• Cybercrimes are illegal acts done
through the use of the Internet.
In 2012, Stephen Nale (Complex.com)
posted a list of ten most common
Internet cybercrimes as follows:
1. Phishing/Spoofing
– the act of sending multiple
emails to multiple users in hopes
of having a number of them
clicking on the links or malwares
attached to the email.
2. Blackmail/Extortion
– the act of using the Internet to
threaten or damage someone’s
reputation to extort money or
anything else of value. This can be
avoided if you are aware of what
you should post on the Internet.
3. Accessing Stored Communications

– or hacking; the act of obtaining


unauthorized access to data from
a computer network.
4. Sports Betting
– the act of wagering on any sports
event over the Internet. In some
countries, gambling (including sports
betting) is illegal even if you are
doing it over the Internet.
5. Non-Delivery of Merchandise
– the act of devising a scheme
wherein a culprit posts an item or
service for sale over the Internet and
once the transactions have been
done, does not really give the item or
service.
6. Electronic Harassment
– the act of anonymously using
the Internet to harass, abuse,
threaten, or annoy other people.
7. Child Pornography
– the act of using the Internet to
show child pornography. This act
is highly punishable by law.
8. Drug Trafficking
– the act of selling illegal
substances using the Internet.
9. Criminal Copyright Infringement
– the act of piracy mainly for financial gain.
In late 2014, the number one pirate website,
ThePirateBay, was raided for the second
time due to years of pirating movies, music,
games, books, and other software. These
kinds of websites earn money through
advertising.
Combatting Cybercrimes
1. Network Security. Before a hacker
can get through the unauthorized files
he or she is targeting, the hacker has to
get through several security measures
like firewalls, secure connections,
passwords, anti-malwares, and data
encryptions.
Combatting Cybercrimes
2. Investigation. URL tracing and
logging are used by websites to track
your unique IP addresses. This can be
used by investigators to trace hackers.
In piracy, trackers are used to identify
IP addresses currently sharing a pirated
file.
Combatting Cybercrimes
3. Penalties. More and more
laws are being created and
implemented today. Penalties
include both a fine and
imprisonment.
Key Terms
• Phishing – also referred to as spoofing;
an act of spamming e-mails
• Spam – unwanted emails
• Blackmail – act of asking something
in return of not showing something
that could damage someone’s
reputation
Key Terms
• Hacking – the act of obtaining
authorized information
• Cyberbullying – an act of
harassment using electronic means
• Copyright infringement – an act of
piracy mainly for financial gain
Key Terms
• Encryption – the process of
converting raw data into code
SEATWORK:
1. What are other cybercrimes that
were not discussed in this lesson that
you think students of your
generation should be aware of?
Why?
SEATWORK:
2. Are the laws on copyright being
implemented in the Philippines?
Defend your answer.
SEATWORK:
3. As a future professional in your
respective field, what are the
things that you think ICT can do
to help you in your field?
Performance Task:

• Make an advertisement (slogan) to


campaign on fight against
cybercrime. (20 pts.)
• *OSLO PAPER

Anda mungkin juga menyukai