Professional Documents
Culture Documents
TYPES OF CLOUDS
PUBLIC CLOUD allows systems and services to be easily accessible to the general
public. Public cloud may be less secured because of its openness, e.g. e-mail
PRIVATE CLOUD allows systems and services to be accessible within an
organization. It offers increased security because of its private nature.
COMMUNITY CLOUD allows systems and services to be accessible by group of
organizations.
HYBRID CLOUD is a mixture of public and private cloud. However, the critical
activities are performed using private cloud while the non-critical activities
are performed using public cloud
Using the Internet should also mean keeping and protecting your privacy. This
includes being careful about what you post online. Take time to read the
website’s privacy policy. Note what information the website gathers about you,
how this data is
intended to be used, what information is shared publicly, and what is secured.
Most websites include data policies, which explain how your information is
used. The data policy states what information the website collects from you,
how it is used and shared, how you can manage your information, and how to
report suspicious activity on your account.
Social networks have allowed us to keep connected with our loved ones and stay
updated about goings-on in their lives. Technology allows us view others’ lives
as well as give others a peek of our own. Because of this, we must be extra
vigilant with what we post on the Internet. Microsoft (2014) provides several
suggestions on protecting yourself on the Internet.
INTERNET RISK
Cyberbullying
It happens when someone intentionally abused, harass, and mistreated by
other person using electronic communication.
Identity Theft
It is a crime of stealing personal information for the purpose of assuming that
person’s name or identity to make any form of transactions.
Cyber Stalking
A criminal practice where electronic communication is used to stalk or harass
individual or group.
Sexting
The act of sending sexually explicit text messages, images, and videos.
INTERNET THREATS
Malware – also known as Malicious Software.
Types of Malware
1. Virus – a malicious program that replicate itself by copying itself to
another program.
2. Trojan Horse – a malicious program that disguised as legitimate
program that user will accept and use but take control of your computer.
3. Worm – malicious program that copy’s itself and spreads to other
computers.
4. Spyware – A malicious program that gathers information from victim’s
computer and send it back to the hacker.
5. Adware – An unwanted advertisement that will pop-up several times on
victim’s computer then behave abnormally and tedious to close them.
6. Keylogger – A program that runs in the background and steals user
credentials and confidential information and send back to hack by recording
every keystroke that a user makes on their computer or device.
7. Botnet – A collection of infected internet–connected devices such as
PC and mobile phone that are controlled by a common type of malware.
8. Rootkit – A software tools used by hackers to gain control over a
computer on a network without being exposed.
9. Ransomware – A ransom virus that block the user from accessing the
programs or files and demands to pay the ransom through online method
for the removal of the virus.
Spam
Also known as junk email or unwanted email send by advertiser or bot. It can
be used to send malware.
Phishing
A cyberattack method using deceptive emails and websites to acquiring
sensitive personal information.
Cybercrime
A crime in which computer is used as object and tool in committing a crime such
hacking, phishing, spamming, child pornography, libel, hate crimes, identity
thief and others.
Cybercrime Law
A law that deals with all forms of cybercrime ( R.A.10175, Cybercrime
Prevention Act of 2012)
For readings
1. Cybercrime Law in the Philippines | Brief Synopsis | RALB Law
2. https://www.foreclosurephilippines.com/republic-act-10175-cybercrime-
prevention-act-of-2012-full-text/
The Philippines is one of the countries that suffer from cybercrime. That is
why they have put in place laws that will protect all their citizens.
The Philippines consist laws that are to guard against cybersecurity threats.
These include the following:
The Cybercrime Prevention Act of 2012, for instance. It is the main law against
cybercrime in the Philippines.
This penalizes individuals who are responsible for data theft or destruction.
It also prohibits the production, distribution, or use of computer viruses.
https://youtu.be/ja0zoq_GjzM