You are on page 1of 10

UNIVERSITY OF CAGAYAN VALLEY

Tuguegarao City, Cagayan, Philippines

COLLEGE FRESHMEN PROGRAM


First Semester, School Year 2021-2022

MODULE IN LIVING IN IT ERA

Course Code: GEEL 1 / Elective 1MT


Course Title: Living in IT Era
Credit Units: 3 units
Course Description:

This course explores the science, culture and ethics of information technology, its various uses and
applications, as well as its influence on culture and society. It will provide knowledge on new
technologies, modern innovations, technology trends and the history of Information Technology
age. It aims to strike a balance between conceptual instruction and socially and culturally oriented
discussions as it not only explains the basic concepts or key terms in IT but also features the major
IT trends along with the issues and challenges these developments bring.

Learning Outcomes:

At the end of this module, students are expected to:

Cognitive:

➢ Identify the instrument of illegal cybercrimes such committing fraud, intellectual property,
trafficking, etc.,

Affective:

➢ Discuss the legal issues concerning to online interactions and internet such the data privacy
act and cybercrime prevention act.

Psychomotor:

➢ Distinguishes the criminal activities, internet threats, cyber ethics and apply in everyday
life.

Intended Learning Outcomes:

➢ Explain the cybercrime


➢ Identify the different criminal activities
➢ Identify the various Internet threats

GEEL 1 / Elective 1MT | Living in the Information Technology Era | Cybercrimes 1


UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City, Cagayan, Philippines

COLLEGE FRESHMEN PROGRAM


First Semester, School Year 2021-2022

LESSON 12. CYBERCRIMES

Learning Activities:

Cybercrime, also called computer crime, the use of a computer as an instrument to further illegal
ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing
identities, or violating privacy. Cybercrime, especially through the Internet, has grown in
importance as the computer has become central to commerce, entertainment, and government.

Most cybercrime is an attack on information about individuals, corporations, or governments.


Although the attacks do not take place on a physical body, they do take place on the personal or
corporate virtual body, which is the set of informational attributes that define people and
institutions on the Internet. In other words, in the digital age our virtual identities are essential
elements of everyday life: we are a bundle of numbers and identifiers in multiple computer
databases owned by governments and corporations. Cybercrime highlights the centrality of
networked computers in our lives, as well as the fragility of such seemingly solid facts as individual
identity.

What is Cyber?

It is the Characteristics of the culture of computers, information, technology and virtual reality.

Cybercrime

Is defined as a crime in which a computer is the object of the crime (hacking, phishing,
spamming and child pornography) is used as a tool to commit an offense.

Cybercriminals

May use computer technology to access personal information, business trade secrets or use
the internet for exploitative or malicious purposes.

Republic Act No. 10175 Cybercrime Prevention Act of 2012

A law in the Philippines approved on September 12, 2012, which aims to address legal issues
concerning online interactions and Internet.

GEEL 1 / Elective 1MT | Living in the Information Technology Era | Cybercrimes 2


UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City, Cagayan, Philippines

COLLEGE FRESHMEN PROGRAM


First Semester, School Year 2021-2022

Republic Act No. 10173 Data Privacy Act of 2012

An act protecting individual personal information.

Common forms of Cybercrimes

Copyright

The exclusive legal right, given to an originator or an assignee to print, publish, perform,
film, or record literary, artistic, or musical material, and to authorize others to do the same.

• Copyright Infringement

Is the violation, piracy, or theft of a copyright holder's exclusive rights


through the unauthorized use of a copyrighted material or work.

Plagiarism

An act or instance of using or closely imitating the language and thoughts of another author
without authorization.

Computer Addiction

• Offline
Generally used when speaking about excessive gaming behavior, which can
be practiced both offline and online.

• Online
Also known as “Internet Addiction”, gets more attention in general from
scientific research than offline computer addiction, mainly because most
cases of computer addiction are related to the excessive use of the Internet.

*Virtual Self - The persona you create about yourself virtually.

GEEL 1 / Elective 1MT | Living in the Information Technology Era | Cybercrimes 3


UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City, Cagayan, Philippines

COLLEGE FRESHMEN PROGRAM


First Semester, School Year 2021-2022

Criminal Activities

Hacking

• Unauthorized access of or interference with computer systems, servers, or other


information and communication systems
• Unauthorized access to corrupt, alter, steal, or destroy electronic data using
computers or other information and communication systems without the computer
or system owner’s knowledge and consent
• The introduction of computer viruses resulting in the corruption, alteration, theft,
or loss of such data
• Illegal Access
• Illegal Interception
• Data Interference
• System Interference
• Misuse of Devices
• Infection of IT Systems with Malware – if the act is committed against critical
infrastructure of the Philippines the penalty is between 12-20 years reclusion
temporal

Computer-related forgery, fraud and/or identity theft

• An attempt to obtain sensitive information such as usernames, passwords, and


credit card details and (indirectly money), often for malicious reasons.
• Phishing
• Pharming
• Spam

Electronic theft

• Illegal Downloading
• Obtaining files that you do not have the right to use from the internet.
• Digital Piracy
• Practice of illegally copying and selling digital music, video, computer software,
etc.
• Copyright Infringement

GEEL 1 / Elective 1MT | Living in the Information Technology Era | Cybercrimes 4


UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City, Cagayan, Philippines

COLLEGE FRESHMEN PROGRAM


First Semester, School Year 2021-2022

Cyberbullying

• The use of electronic communication to bully a person, typically by sending a


message of an intimidating or threatening nature.
• The Anti-Bullying Act of 2013 (RA 10627)

Cybersex

• Willful engagement, maintenance, control, or operation, directly or indirectly of


any lascivious exhibition of sexual organs or sexual activity with the aid of a
computer system for favor or consideration.
• There is a discussion on this matter if it involves “couples” or “people in
relationship” who engage in cybersex.

Child Pornography

• Is a form of child sexual exploitation.


• Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or
the Anti-Child Pornography Act of 2009, committed through a computer system.

Cyber Defamation

• Is an unprivileged false statement of fact which tends to harm the reputation of a


person or company.

Internet Threats

Malware - is one of the more common ways to infiltrate or damage your computer. Malicious
software that infects your computer, such as computer viruses, worms, Trojan horses, spyware,
and adware.

What it can do:

• Intimidate you with scareware, which is usually a pop-up message that tells you your
computer has a security problem or other false information.
• Reformat the hard drive of your computer causing you to lose all your information.
• Alter or delete files.

GEEL 1 / Elective 1MT | Living in the Information Technology Era | Cybercrimes 5


UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City, Cagayan, Philippines

COLLEGE FRESHMEN PROGRAM


First Semester, School Year 2021-2022

• Steal sensitive information.


• Send emails on your behalf.
• Take control of your computer and all the software running on it

Pharming - Pharming is a common type of online fraud. A means to point you to a malicious and
illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can
still be redirected to a fake website.

What it can do:

• Convince you that the site is real and legitimate by spoofing or looking almost identical
to the actual site down to the smallest details. You may enter your personal information
and unknowingly give it to someone with malicious intent.

Phishing - Phishing is used most often by cyber criminals because it's easy to execute and can
produce the results they're looking for with very little effort.
Fake emails, text messages and websites created to look like they're from authentic companies.
They're sent by criminals to steal personal and financial information from you. This is also known
as “spoofing”.

What it does:

• Trick you into giving them information by asking you to update, validate or confirm
your account. It is often presented in a manner than seems official and intimidating, to
encourage you to take action.
• Provides cyber criminals with your username and passwords so that they can access
your accounts (your online bank account, shopping accounts, etc.) and steal your credit
card numbers.

Ransomware - Ransomware is a type of malware that restricts access to your computer or your
files and displays a message that demands payment in order for the restriction to be removed. The
two most common means of infection appear to be phishing emails that contain malicious
attachments and website pop-up advertisements.

What it can do:

There are two common types of ransomware:


• Lock screen ransomware: displays an image that prevents you from accessing your
computer.
GEEL 1 / Elective 1MT | Living in the Information Technology Era | Cybercrimes 6
UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City, Cagayan, Philippines

COLLEGE FRESHMEN PROGRAM


First Semester, School Year 2021-2022

• Encryption ransomware: encrypts files on your system's hard drive and sometimes on
shared network drives, USB drives, external hard drives, and even some cloud storage
drives, preventing you from opening them
• Ransomware will display a notification stating that your computer or data have been
locked and demanding a payment be made for you to regain access. Sometimes the
notification states that authorities have detected illegal activity on your computer, and
that the payment is a fine to avoid prosecution.

Trojan Horses - A Trojan horse may not be a term you're familiar with, but there's a good chance
you or someone you know has been affected by one. A malicious program that is disguised as, or
embedded within, legitimate software. It is an executable file that will install itself and run
automatically once it's downloaded.

What it can do:

• Delete your files.


• Use your computer to hack other computers.
• Watch you through your web cam.
• Log your keystrokes (such as a credit card number you entered in an online purchase).
• Record usernames, passwords and other personal information.

Worms - Worms are a common threat to computers and the Internet as a whole. A worm, unlike
a virus, goes to work on its own without attaching itself to files or programs. It lives in your
computer memory, doesn't damage or alter the hard drive and propagates by sending itself to other
computers in a network – whether within a company or the Internet itself.

What they can do:

• Spread to everyone in your contact list.


• Cause a tremendous amount of damage by shutting down parts of the Internet, wreaking
havoc on an internal network and costing companies’ enormous amounts of lost
revenue.

Rules of Cyber Ethics

Cyber ethics refers to the code of responsible behavior on the Internet. Just as we are taught to act
responsibly in everyday life, with lessons such as "Don't take what doesn't belong to you," and

GEEL 1 / Elective 1MT | Living in the Information Technology Era | Cybercrimes 7


UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City, Cagayan, Philippines

COLLEGE FRESHMEN PROGRAM


First Semester, School Year 2021-2022

"Do not harm others," -- we must act responsibly in the cyber world as well. The basic rule is do
not do something in cyber space that you would consider wrong or illegal in everyday
life. When determining responsible behaviors, consider the following:

➢ Do not use rude or offensive language.


➢ Don't be a bully on the Internet.
➢ Do not call people names, lie about them, send embarrassing pictures of them, or do
anything else to try to hurt them.
➢ Do not copy information from the Internet and claim it as yours. That is called
plagiarism.
➢ Adhere to copyright restrictions when downloading material including software,
games, movies, or music from the Internet.
➢ Do not break into someone else's computer.
➢ Do not use someone else's password.
➢ Do not attempt to infect or in any way try to make someone else's computer unusable.

Awareness in using Social Media

Privacy & Social Media

Privacy does not exist on social media sites. Yes, there are privacy options and controls, but too
much can go wrong and your sensitive information can end up being exposed. Things such as your
account being hacked, your friend's accounts being hacked, privacy controls changing, getting the
privacy controls wrong, or people who you thought were your friends are no longer your friends.

Long story short, if you don't want mom or your boss reading it--don't post it. This means being
careful and watching what your friends post about you, including pictures. If nothing else,
remember that employers now include sites like Facebook and Twitter as part of any standard
background check.

Scams & Social Media

Social media websites are a breeding ground for scams. If one of your friend's posts seems odd or
suspicious, it may be an attack. For example, your friend posts that they have been mugged while
on vacation in London and need you to wire them money. Or perhaps they are posting links about
great ways to get rich, or some shocking incident you must see. Many of these scams or malicious

GEEL 1 / Elective 1MT | Living in the Information Technology Era | Cybercrimes 8


UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City, Cagayan, Philippines

COLLEGE FRESHMEN PROGRAM


First Semester, School Year 2021-2022

links are the very same attacks you have been receiving in e-mail for years, but now bad guys are
replicating them in social media. If you see a friend posting very odd things, call or text them to
verify that they really posted the information.

Work & Social Media

Do not post anything sensitive about work. Be sure you understand your organization's policies
about what you can and cannot post about your job.

What Not to Share

Anything you wouldn’t be comfortable having your family see:

➢ Inappropriate photos
➢ Offensive comments and language
➢ Personal Information

10 Things NOT to do on Social Networking Sites

1. Post your full name


2. Post your date of birth
3. Post contact information
4. Post pictures you don't want everyone to see
5. Assume communication here is private
6. Post information about your school or work
7. Talk about places and times of where you're going to be
8. Post information about your new purchases
9. Add friends you don't really know
10. Do enable privacy on your accounts

GEEL 1 / Elective 1MT | Living in the Information Technology Era | Cybercrimes 9


UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City, Cagayan, Philippines

COLLEGE FRESHMEN PROGRAM


First Semester, School Year 2021-2022

Reference/s:

https://teachcomputerscience.com/computer-ethics/
http://www.albion.com/netiquette/corerules.html
https://www.techopedia.com/definition/5499/computer-ethics
http://www.mccc.edu/~virtcoll/Netiquette
http://ecampus.matc.edu/student_support/pdfs/7-essential-rules-of-netiquette.pdf
https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-eng.aspx

Prepared by:

IT INSTRUCTORS

GEEL 1 / Elective 1MT | Living in the Information Technology Era | Cybercrimes 10

You might also like