You are on page 1of 1

Lesson 12: ICT PROJECT FOR SOCIAL CHANGE Lesson 13: DISADVANTAGES OF ICT

Concept Paper – It is a document used to convince a Cybercrimes are illegal acts done through the use of the
panel of potential funders to help a product, program, or Internet. People all over the world use the Internet to
service become a reality. commit a host of crimes, some of which the public doesn’t
even know are capable of being done electronically.
CONCENT PAPER ELEMENTS
1. Introduction – This includes your mission and vision 10 Most Common Internet Cybercrime
and a brief introduction of your project / campaign. 1. PHISHING - the act of sending multiple emails to
2. Purpose – This includes the reason why the project / multiple users in hopes of having a number of
campaign is worth your sponsor’s time, effort and money. them clicking on the links or malwares attached
3. Description – This includes all the necessary to the email.
information about the project. It involves the website/s 2.
or page you are going to produce and the purpose of each 3. Spoofing- attack is when a malicious party
and how they work in unison. impersonates another device or user on a network
4. Support – This contains the budget needed for the in order to launch attacks against network hosts,
project, though some concept papers do not specify any steal data, spread malware or bypass access
amount requested from the sponsor. controls. There are several different types of
5. Contact Information – This includes information on spoofing attacks that malicious parties can use to
how the group can be contacted. accomplish this.

Your project/campaign must met the SMART criteria: 4. Blackmail/Extortion the act of using the
S – Specific Internet to threaten or damage someone’s
M – Measurable reputation to extort money or anything else of
A – Attainable value. This can be avoided if you are aware of
R – Realistic what you should post on the Internet.
T – Time-bounded
5. Accessing Stored Communications hacking;
PUBLISHING AND SUSTAINING ICT PROJECT the act of obtaining unauthorized access to data
from a computer network.
DIFFERENT PLATFORMS TO UPLOAD ICT PROJECT:
❑ Social Media 6. Sports Betting -the act of wagering on any sports
❑ YouTube event over the Internet. In some countries,
❑ Change.org gambling (including sports betting) is illegal even
❑ Blogs / CMS / Websites if you are doing it over the Internet.

WordPress - is a free and open-source content 7. Non-Delivery of Merchandise the act of devising
management systems based on php and MySQL a scheme wherein a culprit posts an item or
service for sale over the Internet and once the
File Manager - is an uploading tool web interface that transactions have been done, does not really give
allows you to manage all your files. There are many file the item or service
manager present now. (File Manager App, Google Drive,
DropBox, etc.) 8. Electronic Harassment the act of anonymously
using the Internet to harass, abuse, threaten, or
Website Management - a website management platform annoy other people.
is an integrated set of tools that allows teams to create,
design, develop, launch, manage, administer, and 9. Child Pornography the act of using the Internet
monitor website contents. to show child pornography. This act is highly
punishable by law.
A Web Content Management System (WCMC) is a
software Content Management System (CMS) 10. Drug Trafficking the act of selling illegal
specifically for web content. substances using the Internet.

EXAMPLES OF WEB MANAGEMENT PLATFORMS: 11. Criminal Copyright Infringement the act of
1.WordPress -Is a free and open-source content piracy mainly for financial gain. In late 2014, the
management system (CMS) based on PHP and MySQL. number one pirate website, ThePirateBay, was
raided for the second time due to years of pirating
2.Drupal -A free and open-source content- management movies, music, games, books, and other software.
framework written in PHP and distributed under the GNU These kinds of websites earn money through
general public license. advertising

3.Joomla -Is a free and open -source content COMBATTING CYBERCRIME


management system (CMS) for publishing web content. 1. Network Security. Before a hacker can get
Joomla is written in PHP, uses object- oriented through the unauthorized files he or she is
programming (OOP) techniques. targeting, the hacker has to get through several
security measures like firewalls, secure
connections, passwords, anti-malwares, and data
encryptions.
2. Investigation. URL tracing and logging are used
by websites to track your unique IP addresses.
This can be used by investigators to trace
hackers. In piracy, trackers are used to identify IP
addresses currently sharing a pirated file.
3. Penalties. More and more laws are being created
and implemented today. Penalties include both a
fine and imprisonment.

You might also like