Professional Documents
Culture Documents
Addison Madalang
Melglen Lonogan
Billy Nalundasan
Marion Marcelino
1st/SY 2019-2020
First problem that is identified in our advocacy is loss of information where user’s data can be
deleted or changed and it can also be stolen. Second is Damaged Reputation where some big
company’s reputation can be damaged due to hackers. Third is Decreased Privacy where these
hackers gain access to your computer and they can see everything that you are doing and attack
you if they want. And the last problem is financial losses where, every year, report of hacked
How to Solve:
To avoid being hacked you need to update our OS (Operating Systems) frequently to keep hackers
from accessing your computers through vulnerabilities in outdated programs. Also you should
download up-to-date security programs to secure your computers. You should destroy all traces of
your personal info on hardware you plan on selling. Do not use open Wi-Fi on your router; it makes
it too easy for threat actors to steal your connections and download illegal files. Input hard
passwords so that they can’t easily access your account. And the last is keep sensitive data off the
According to The Computer Fraud and Abuse Act (CFAA) the leading federal anti-hacking
legislation that prohibits unauthorized access to another's computer system. Although the law was
originally meant to protect the computer systems of U.S. government entities and financial
institutions, the scope of the Act expanded with amendments to include practically any computer
in the country (including devices such as servers, desktops, laptops, cellphones, and tablets).
The internet has birthed an exponential increase in communication, transaction processing, service
accessibility and, unfortunately, cybercrime. With computer systems and the internet being used
by billions worldwide, there is an abundant pool of victims to be exploited. Statistics over the years
have shown that the impact of cybercrime has been astounding, with financial losses worldwide
recorded at $158 billion in 2016, according to Forbes.com. The quantum of loss to data and
information can only be imagined. Computer systems and the internet are characterized by
anonymity. This haven of anonymity permits cybercrimes of various types and degrees to transcend
all physical borders. Computer hacking is defined as the deliberate access or infiltration of a
computer system or program without authorization. It is also the intentional access to a computer
Threat Report, computer hacking affects all arms of information and communication technology.
There are web threats, social media scams, communications and email threats, data breaches, cloud
and data storage compromises, law enforcement and critical data breaches. Nothing and no one is
computer without authorization. However, the law fails to explain exactly what a lack of
authorization means. In addition, the law refers to exceeding authorized access to a computer, but
a lack of definition of the term has caused extensive legal debate. Extremely harsh penalties can be
1. Definition of advocacy
An action that will give computer users an idea about hacking and what can they do to
avoid it.
2. Objectives
To help any computer user to avoid getting hacked.
Give idea to any user of computer about hacking and what can and the consequence if
To give tips on any computer user so that they can avoid getting hacked.
3. Materials
D. references:
Retrieved from
https://itstillworks.com/negative-effects-hackers-2867.html
Retrieved from
https://www.google.com/amp/s/blog.malwarebytes.com/101/2015/10/10-ways-to-protect-against-
hackers/amp/
Retrieved from
https://criminal.findlaw.com/criminal-charges/hacking-laws-and-punishments.html
Retrieved from
https://study.com/academy/lesson/computer-hacking-laws-consequences.html
Retrieved from
https://grassodefense.com/federal-hacking-laws/