You are on page 1of 25

This module is created under the Department of Natural Science of University of Makati.

Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

LEARNING MODULES FOR COLLEGE STUDENTS


FIRST EDITION
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

Credits
AUTHORS AND CONTRIBUTORS

LEONARDO PASQUITO, MAED


Faculty, Natural Science Department
College of Science
University of Makati
leonardo.pasquito@umak.edu.ph

CURRICULUM PRODUCTION AND EDITING


Leonardo Pasquito, MaEd, and Joy R. Regalario- Pascual, R.N., MaEd

UNIT 4: LIVING IN THE I.T. ERA


This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

Lesson 4: Issues and Concerns in the IT Era


Filipinos are declared as the most active users of web-based social network sites such
as Facebook, Instagram, Snapchat and Twitter. The use of social networking website has become
so extensive in the Philippines that the country has been tagged as "The Social Networking Capital
of the World." They are also regarded as the top photo uploaders and web video viewers, while
they are 2nd when it comes to the number of blog readers and video uploaders.
The popularity of social networking in the Philippines can be traced
in the Filipinos' culture of "friends helping friends." Social
networking has extensive uses in the Philippines. It was used to
promote television programs, job openings, election campaign,
medium to communicate fans and constituents, tool for police
investigations, receiving information and tips from the public,
searching suspects’ face and identity. However, it also becomes the
forum of high-profile cyber wars and increasing ethical problems.

Issues and Concerns in the IT Era

A. CYBERCRIMES

Cybercrime, also known as Internet Crime, refers to illegal online activity committed using the
Internet. Because Internet crimes usually engage people from various geographic areas and
countries, finding and penalizing guilty participants is difficult.

Types of Internet crimes


1. Cyberbullying (cyber harassment). This is a form of
harassment using electronic forms of contact usually
of repeated behavior and an intent to harm. This is
common among teenagers. This may include posting
rumors about a person, threats, sexual remarks,
disclose victims' personal information, or pejorative
labels or hate speech. There is cyberbullying when
there is:
a. repeated behavior with intent to harm.
b. cyberstalking
c. sending or posting cruel rumors and falsehoods to damage reputation and
friendships
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

d. Impersonation
e. excluding someone from an online
group.
f. sexual remarks
g. making the person the subject of
ridicule in online forums
h. hacking into or vandalizing sites
about a person

Persons who are bullied online may exhibit the following behaviors: (1) lower self-
esteem, (2) increased suicidal ideation, (3) retaliating, (4) being scared, (5) frustrated,
(6) angry, and (7) depressed.

Two (2) Forms of Cyberbullying


1. Cyberstalking Cyberstalking is use
of the Internet and email to
"stalk" or repeatedly follow
another individual with a
threatening behavior such as
appearing at the victim's place of
work or home, or leaving
threatening messages.

Example of Internet stalking


A fifty-year-old security guard used the Internet to stalk a woman who had rejected
his sexual advances. He retaliated by posting in the Internet her personal details
such as her physical description, exact address and telephone number, and even
included details about how one could break her home security system. As a result,
several men attempted to break-in to her house. The security guard was
arrestedand sentenced to prison for Internet stalking.

2. Internet Trolling. Internet trolling is a common form of bullying in online gaming


or social media, the purpose of which is to elicit a reaction, disruption, or for their
own personal amusement. Internet trolls intentionally try to provoke or offend
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

others in order to elicit a reaction. A troll may do this for his own amusement or
just because he is a combative
person.
3. Cyberextortion.
Cyberextortion occurs when a
person uses the Internet to
demand money, goods or sex,
from another person by
threatening to inflict harm to his
person, his reputation, or his
property if he refuses.

Example of Cyberextortion:

An individual sends to a company an email stating that they have received


confidential information about their company and will exploit a security leak or
launch an attack that will harm the company's network and demands money in
exchange for the prevention of the attack.

Tips on How to Prevent Cyberextortion

The most common way criminal hackers succeed in pulling off their crimes is by tricking
the victim into clicking a link inside an e-mail or opening the e-mail’s attachment. These
can lead to all kinds of viruses and security issues such as infecting the computer with
ransomware, which blocks you from accessing your files, and you must then pay the
extortionist in bitcoins to unlock the files. Here are the following tips on how to prevent
cyberextortion:

1. Do not use passwords such as:


a. password that can be found in a dictionary
b. password using the keyboard sequences
c. very short password (under eight characters)
2. Create a unique password for every account you have. The ideal or unique password
is an incoherent mix of upper and lower case letters, numbers and symbols—like
what a two-year-old would produce if playing with the keyboard.
3. Never click links inside e-mails because clicking them may download a virus or
may lures you into typing in your password, username and other personal
information. Usually, these e-mails are designed to look like they came from your
employer, bank, PayPal, UPS, IRS, heath plan carrier or even a relative in need.
They carry a command or sense of urgency by sing phrases such as “Act now,” or
“within 24 hours” or “You must or Please help…”
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

4. Never open attachments. This includes attachments from a company or individual


claiming they want to hire you for work.
5. Do not post personal information on social media because hackers may use them to
guess your password or login information. For example, based from what you have
posted, the hacker may figure out that your password is a combination of your name
and date of birth such as Joseph1972.
6. Have one e-mail account for business and one for personal.
7. Never use public Wi-Fi for sensitive transactions or shopping because they are
usually unsecured.
2. Internet Bomb Treat. This is a threat,
usually through text or internet, to detonate an
explosive or device to cause property damage,
death, or injuries. Criminal laws for this crime
is typically meted with severe penalties or
punishment. Bomb threats are often called in
at educational institutions by students who feel
under pressure due to academic pressure.
3. Classified Global Data Theft. This is a form of stealing of all
data in your device especially from mobile devices. Aside from
mobile devices, the thieves and intruders usually targets the
USB thumb drive, 3G mobile phone network, Wireless LAN,
Removable hard disk, Notebook computer, MP3, PDA, Phones,
Printer output, Bank or confidential business information.

How to Prevent Data Theft


Here are some general tips to maintain the security of your mobile device.
1. When configuring your mobile device.
Turn off location services if it is not
necessary to run location-based
application.
2. When using your mobile device. Protect
your online user account such as FB,
Twitter or Messenger with passwords or
authentication mechanism. Do not leave a
mobile device unattended, even for a
moment. Do not open links or email from
untrusted sources. Do not download programs from unknown sources. Be
cautious when connecting to publicly available Wi-Fi hotspots.
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

3. When disposing your mobile device. Completely clear all data and settings
on your mobile device before disposal.
4. Learn how to prevent data loss from IT outsourcing. Data theft sometimes
happens when you hire services of IT persons for repair services, application
development and maintenance, network management, desktop management
and others where you allow such person to gain access to your data files.
5. Encrypt your data. Encryption is a process for scrambling and transforming
data from an easily readable format (such as Plain Text) into an unreadable
format (known as Cipher Text) so that it will appear useless and not
understandable. Encryption techniques are used to protect confidentiality of
data and hide it from curious
individuals.
4. Password Trafficking. This is the act of
hacking, sharing, selling or buying stolen
passwords so that criminals can then use the
password to gain access to the victim's bank
account with the purpose to steal their identity, extort
money for a ransom, by threatening not to
release that information unless the victim pay a huge amount of money.

Password can be stolen through the following methods:


a. Password Scamming. This is the act of deceiving someone into voluntarily
revealing his password by using phishing sites (sites that look legitimate to trick a
user into typing his password).

How to protect yourself from password scamming.

1. Type your passwords in secured forms.


2. Do not reply to emails asking you for your log-in credentials, even if
they seem to come from a legitimate entity.
3. Always check the address of the website you are trying to connect to by
looking at your browser's address bar. If the address is different from
the one usually used by that website, then it is a fake account.

b. Password Hacking. This is a password-stealing techniques through the use of


keyloggers and viruses. Keyloggers are programs that can record every key pressed
on your keyboard and send those records to a third party.
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

How to protect yourself from password hacking.


1. Enable the built-in Windows firewall.
2. Download a free anti-virus application.
3. Run a regular system cans to delete any potential security threat.

c. Personal Data Hacking. This is a data breach in which sensitive, protected or


confidential data is copied, transmitted, viewed, stolen or used by an individual
without permission

How to Prevent Personal Data Hacking:


a. Come up with a new password for
every account you have. It may be
inconvenient but creating unique and
secure passwords for each of your
accounts is an important step to be
secured online.
b. Do not download files from unknown
sources.
c. Do not visit suspicious websites
d. Use antivirus software.
e. Be aware of phishing scams. To avoid phishing scams, make sure that an email
is illegitimate. The following are indicators of phising scams:
1. Suspicious sender address. Often times email will appear to be sent from an
official source, but there will be something different about it if it is a scam. For
example, an email from phil.gov@apple.com is likely legitimate. But an email
from phil.gov@apple.co.ssl.manila is not.
2. Illegitimate emails taking you to fake websites. When you get an email, be
extremely cautious of links in that email. Often these links look like they will
take you to a legitimate website, but end up to a website the hacker is trying to
imitate.
3. General greetings. Take note of a phishing scam greetings. If the email usually
says "dear valued customer" instead of using your name, it is likely a scam.
5. Software Piracy. Software piracy is the unauthorized copying, reproduction, use, or
manufacture of software products. Take note that when you
buy the software, you just become a licensed user rather
than an owner. So you are only allowed to make copies of
the program for backup purposes, but it is against the law
to give copies to friends and colleagues. This is a violation
of the end user license agreement (EULA) you conform
when you purchase a commercial software package. The
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

EULA states that you can install the original copy of software on one computer and make
a backup copy in case the original is lost or damaged but not to copy, reproduce, use or
manufacture the said software for consumption of others.

Types of Software Piracy


The following are methods by which illegal copies of software circulate among computer
users.
1. Softlifting. This is the most common type of piracy. Softlifting means
purchasing a single licensed copy of software and then loading the software
onto several computers. On school campuses, softlifting is common by lending
programs to their classmates and friends.
2. Hard disk loading. This refers to selling unauthorized copies of software to
new computers usually committed by hardware dealers, where they load an
unauthorized copy of software to a computer buyer. The dealer usually does not
provide the buyer with manuals or the original CDs of the software. This is how
operating systems, like Windows, are often pirated.
3. Unbundling. This is selling stand-alone software originally meant to be
included in a specific product. An example of this form of piracy is someone
providing drivers to a specific printer without authorization.
4. Counterfeiting. This is the act of producing fake copies of a software, making
it look original by providing the box, CDs, and manuals. Microsoft products are
the ones most commonly counterfeited, because of their widespread use.
Counterfeiting is usually done by making a copy of a CD with a CD-burner and
providing a photocopy of the manual to buyers. Counterfeit software is usually
sold on street corners at very low price.

How to Prevent Software Piracy

There is no best solution to this problem and no publisher can fully stop software piracy,
but at the very least, one can reduce the harm. Below are quick and easy steps to address
the problem:

1. Register Your Copyrighted Work in a Timely Manner. If you have a created


software, registration establishes a public record that the you claims a
copyright interest and enables you to obtain your attorney fees and damages.
2. Place Copyright Notices On Your Publications. Placing a copyright notice
alerts the world that a copyright is claimed in a work and prevents pirates from
claiming to be innocent infringers. This will result in a higher damage award
award if you sue a pirate in court.
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

3. Join Forces With Other Publishers. If pirates are illegally copying your
software you can be sure they are pirating the softwares of others as well.
Joining forces with like-minded publishers will help you to combat piracy
problems because they will share tips on strategies and solutions that works
best.
4. Monitor The Internet. Using an online monitoring service such as
MarkMonitor or Attributor can be useful to collect intelligence about the extent
of your piracy problem.
5. Develop A Working Relationship With Government Agencies And
Intermediaries. Because pirates are continuously creating new ways to avoid
detection, it is important to develop a working relation with the national and
local government responsible for enforcement such as the NBI (National
Bureau of Investigation) and PNP (Philippine National Police).
6. Learn Technological Protections. Technological protections method such as
watermarking can be used to prevent piracy. A digital watermark is a marker
covertly embedded in an audio, video or image data used to identify ownership
of the copyright. Watermarking will give warning to pirates that your software
is marked and are not to be copied without your permission.
7. Create Alternative Access and Price of the Software. Customers may be
pirating your work because they are not accessible to them, or maybe your
product is so expensive. So to prevent piracy, create an alternative access or
lower their price. This will make piracy a less attractive option to them.

6. Online Weapon Trading. This is also known as arms


trafficking or gunrunning which is the act of trafficking of
contraband weapons and ammunition through the
internet involving usually small firearms such as
revolvers and self-loading pistols, rifles and carbines,
submachine guns, assault rifles, and light machine guns, which are designed for personal
use.
a. Online Child Pornography. This
refers to any sexual images,
videos and other representation
involving a minor with
lascivious intent, and sharing it via
social media or text message, for
personal gain. Violation of laws
against child pornography can be
committed by the minor herself, the
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

one who took pictures or videos, the one who received and the one who distributed
them.

Philippines as the No. 1 Global Source of Online Child Pornography


According to Manila Times published last June 11, 2016, the Philippines is the No. 1 global source
of child pornography. This is because, poor families in the Philippines are pushing their children
to perform live sex online for pedophiles around the globe. It has also been noted by UNICEF that
Philippines is also the epicenter of the live-stream sexual abuse trade. Accordingly, children as
young as five (5) or six (6) are forced to perform as buyers in different time zones come online.
This is facilitated by mothers and fathers or close relatives. The pedophiles then transfer money
and then give instructions on what they want to see. In many cases, the child is abused by someone
outside the family, but there have been cases of parents abusing their own children or children
abusing each other. Statistics showed that the Philippines received 7,000 reports of cybercrime a
month, half of which were related to child sex abuse. The reason why live-streaming of child sex
had boomed in the Philippines is because of the (1) high level of English, (2) good Internet access
and (3) well-established money transfer systems that Filipinos working overseas use to send
earnings home.

7. Credit card fraud. This refers to acts of theft and fraud committed using credit or debit
card in order to obtain goods or free or obtain funds from the victim’s account.

Methods of Credit Card Fraud


1. Skimming. Skimming refers to the act
of capturing private information from
one’s credit card during a normal
transaction. This can be done by
photocopying receipts or using a small
electronic device known as skimmer
where if the card is swiped, it store the
victims’ card numbers. Skimming
usually happened in the following:
a. Store outlets using card
swiping terminal where
skimmer has possession of the
victim's payment card out of their
immediate view.
b. Call centers where callers would
usually divulge confidential
information.
c. ATM machines where a device is placed at a card slot that reads the
magnetic strip, or a hidden miniature camera to read the user's PIN or a
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

keypad overlay that records or wirelessly transmits the keylog of the PIN
entered.

How to Preventing Card Fraud

1. Report lost or stolen cards.


2. Review charges regularly and report unauthorized transactions immediately to
your bank.
3. Be cautious when using credit cards for online purchases, especially on non-
trusted websites

2. Phishing. This refers to a variety of


schemes to lure victims into giving their
card information through tricks such as
websites pretending to be of a bank or
payment system or a call center
pretending to be associated with a
banking organization.
3. Online repeat billing. This happens
when a card holder buys something from
a vendor and expects the card to be charged only once, but the vendor charge a
small amount multiple times. Because the periodic charges are small, most card
holders will not notice them. Online bill paying or internet purchases utilizing a
bank account is known as "recurring bank charges".
8. Identity theft. This refers to stealing of information in order to commit fraud usually done
through the following method:
a. Internet chat rooms
b. Spreading Trojan horses that drop key loggers on your computer to transmit any
passwords, usernames and credit card numbers you use on your computer back to
the thieves.
c. Online businesses which store personal information about customers and shoppers
on websites.
d. Email phishing where the email will direct you to visit a website where you are
asked to update personal information, such as passwords and credit card, social
security, and bank account numbers. The website, however, is bogus and set up
only to steal your information.

Two (2) Broad Categories of Identity Theft:


This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

1. Account takeover. An account takeover


occurs when a criminal poses as a genuine
customer, gains control of an account and then
makes unauthorized transactions. The most
common method of account takeover are:
a. gaining access to a list of user names and
passwords. Other methods include
dumpster diving to find personal information in discarded mail, and
outright buying lists of 'Fullz,' a slang term for full packages of identifying
information sold on the black market.
2. Application fraud. Application fraud takes place when a person uses stolen or
fake documents to open an account in another person's name. Stolen documents
can be a utility bills (electric or water bill) and bank statements to build up useful
personal information. With this information, they could open a credit card
account or Ioan account in the victim's name.

Tips to Avoid Identity Theft


Here are a few things that can help you achieve a level of online identity theft
protection:
a. Continually check the accuracy of personal accounts and deal with any
discrepancies immediately
b. Avoid questionable Web sites
c. Practice safe email protocol
d. Do not open messages from unknown senders
e. Immediately delete messages you suspect to be spam
f. Only download software from sites you trust. Carefully evaluate free
software and file-sharing applications before downloading them.
g. Get the latest Windows patches. A Windows patch is software designed to
update, fix or improve a computer program.
h. Use public computers with extreme caution
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

9. Phishing. The term 'phishing' was coined by the well-


known spammer and hacker Khan C Smith in the mid-
90s. Phishing is the attempt to obtain sensitive
information such as usernames, passwords, and credit
card details often for malicious reasons, by disguising
as a trustworthy entity in an electronic
communication. The word phising was derived from
the word fishing because of its similarity of using a
bait in an attempt to catch a victim. Phishing is
typically carried out by email spoofing or instant
messaging, and it often directs users to enter personal
information at a fake website, which are almost
identical to the legitimate one. The following are the different methods employed in
phishing:
a. Clone phishing. This refers to a phishing attack whereby the content and recipient
address from a legitimate and previously delivered email is used to create an almost
identical or cloned email. The attachment or link within the email is replaced with
a malicious version and then sent from an email address spoofed to appear to come
from the original sender. It may claim to be a resend of the original or an updated
version to the original.
b. Covert redirect phishing. Covert redirect is a subtle method to perform phishing
attacks where a links that appears legitimate would redirect a victim to an attacker's
website usually through a malicious log-in popup dialog box. This technique was
discovered by Wang Jing, a Ph.D. Math student of the University in Singapore. For
covert redirect, an attacker uses a real website to corrupt another site through a
malicious login popup dialogue box. This makes covert redirect different from
others. For example, suppose a victim clicks a malicious phishing link beginning
with Facebook. A popup window from Facebook will ask whether the victim would
like to authorize the app. If the victim chooses to authorize the app, a "token" will
be sent to the attacker and the victim's personal sensitive information could be
exposed. This information may include the email address, birth date, contacts, and
work history. Worse still, the attacker may possibly control and operate the
user’s account. Even if the victim does not choose to authorize the app, he or she
will still get redirected to a website controlled by the attacker.
c. Twin Evil Phishing. This is a phishing method where a
phisher creates a fake wireless network that looks similar to
a legitimate public network that may be found in public
places such as airports, hotels or coffee shops. Whenever
someone logs on to the bogus network, fraudsters try to
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

capture their passwords or credit card information. This phishing technique is


considered the hardest to detect.
d. Filter Evasion Phishing. This refers to the use of images instead of text to make
it harder for anti-phishing filters to detect text commonly used in phishing emails.
e. Link Manipulation Phishing. This refers to phishing technique using technical
deception designed to make a link in an email appear to belong to the spoofed
organization. Link manipulation is usually done through the following:
1. Making the displayed text for a link suggest a reliable destination, when in
reality the link actually goes to the phishers' site.
2. Use of misspelled URLs or subdomains. For example, in the URL,
http://www.creditcard.mybank.com/, it appears that the URL will take you
to the mybank section of the creditcard website but actually this URL points
to the "mybank" as the phishing section of the credit card website.
f. Spear Phishing. This is phishing directed at specific individuals or companies by
gathering personal information about their target through time to increase their
probability of success. This is the most successful phishing on the internet today,
accounting for 91% of attacks.
g. Tabnabbing Phishing. This refers to phishing method by taking advantage of
multiple open tabs which silently redirects the user to the affected site. This
technique operates in reverse to most phishing techniques in that it does not directly
take the user to the fraudulent site, but instead loads the fake page in one of the
browser's open tabs.
h. Website forgery Phishing. This refers to a deception technique through a phishing
website where phishing scams use JavaScript commands in order to alter
the address bar of the website either by placing a picture of a legitimate URL over
the address bar, or by closing the original bar and opening up a new one with the
legitimate URL. When the victim visits the phishing website, they direct the user
to sign in at their bank own web page.
i. Whale Phishing. This is a
phishing attack directed
specifically at senior executives
and other high-profile targets
within businesses. Whale phishing
is often done through a written
legal or court subpoena or a
customer complaint threatening to
file a lawsuit, or emergency
executive memorandum sent from
a legitimate business authority. The email is accompanied with a stiff instruction
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

that the manager needs to click a link and install special software to view the
subpoena, complaint or memorandum.
10. Domain hijacking. This is
the act of changing the
registration of a domain
name without the permission
of its original registrant by
acquiring personal
information of the domain
owner and then
impersonating him and
persuading the domain
registrar to modify the
registration information or transfer the domain to another registrar. The hijacker in turn can
use the domain name to (1) facilitate illegal activity such as phishing, where a website is
replaced by an identical website that records private information such as log-in passwords,
(2) distribute malware, (3) derive commercial income from a website hosted at the domain
or (4) conduct business through the domain's e-mail accounts.

Tips on How to Prevent Domain Hijacking

The following are the suggested tips for prevent domain hijacking:
a. Use strong email passwords and enable two-factor authentication if available.
b. Disable POP if your email provider is able to use a different protocol.
c. Tick the setting "always use https" under email options.
d. Frequently check the "unusual activity" flag if provided by your email service.
e. Make sure to renew your domain registration in a timely manner with timely
payments and register them for at least five (5) years.
f. Use a domain-name registrar that offers enhanced transfer protection such as
domain locking.
g. Makes sure your WHOIS information is up-to-date and really points to you and you
only. WHOIS is a query and response protocol for databases that store domain
name, an IP address block, or an autonomous system.
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

h. If you more than 2000 domain names consider buying your own registrar.

11. Cybersquatting. Cybersquatting also


known as domain squatting, is the act of
registering, trafficking in, or using an
Internet domain name in bad faith with the
intent to profit from the goodwill of a
trademark belonging to someone else.
The cybersquatter then offers to sell the
domain to the person or company at an inflated price. The term cybersquatting is derived
from "squatting", which is the act of occupying an abandoned or unoccupied space or
building without permission from the owner.

Example of cybersquatting.
On June 5, 2009, Tony La Russa, the manager of the St. Louis Cardinals, filed a complaint
against Twitter, accusing Twitter of cybersquatting where Twitter created a profile of La
Russa's with a headline that said "Hey there! Tony La Russa is now using Twitter."
According to La Russa, Twitter is in bad faith because it wanted to divert Internet traffic
away from La Russa's website and make a profit from it.
Today social networking websites have attempted to curb cybersquatting. For instance,
Twitter suspends members who attempts to sell or extort payments in exchange of
divulging one’s usernames or impersonates other account. An account may be guilty of
impersonation if it confuses or misleads others. On the same manner, Facebook reclaim
usernames on the website if they infringe on a trademark and require mobile phone
verification to check one’s account.
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

12. Computer Virus Spreading. A


computer virus, much like a flu
virus, is designed to spread from
host to host and has the ability to
replicate itself. Similarly, in the
same way that viruses cannot
reproduce without a host cell,
computer viruses cannot
reproduce and spread without
programming such as a file or
document. In more technical
terms, a computer virus is a type of
malicious code or program written to alter the way a computer operates and that is designed
to spread from one computer to another. A virus operates by inserting or attaching itself to
a legitimate program or document that supports macros in order to execute its code. In the
process a virus has the potential to cause unexpected or damaging effects, such as harming
the system software by corrupting or destroying data.

Tips on How to Prevent Malware from Infecting Your Computer


(Adopted from Brian Benton (April 22, 2014) @ https://redshift.autodesk.com)

Here are 10 tips on how to prevent malware from infecting your computer:
1. Back Up Your Files. The best thing you can do is back up your files in at least three
(3) places: on your computer, external hard drive such as USB or email inbox, and in
a different location.
2. Disable Autorun. Many viruses work by attaching themselves to a drive and
automatically installing themselves on any other media connected to the system such
as network drives, external hard disks, or even thumb drives to a system can result in
the automatic propagation of such threats. Computer users can disable the Windows
autorun feature by following Microsoft's recommendations.
3. Do not Use Open Wi-Fi. When you are in MRT or LRT stations, at the local coffee
shop, library, and especially the airport, do not use free Wi-Fi that requires no
password or encryption. This means that free Wi-Fi is not protected or secured.
4. Install Quality Antivirus. Many computer users believe free antivirus applications
are sufficient to protect a computer from virus or spyware infection. However, such
free anti-malware programs typically do not provide adequate protection from the
ever-growing list of threats.
5. Install real-time anti-spyware protection. Real-time anti-spyware provides active,
protection from adware, Trojan, and other spyware infections.
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

6. Keep Your Anti-Virus


Software Up to Date. Free
anti-virus software is better
than nothing. But as much
as possible buy an updated
anti-virus software.
7. Keep Your Operating
System Current. Whether
you are running Windows,
Mac OS X, Linux, or any
other OS, keep it up to date.
OS developers are always
issuing security patches that
fix and plug security leaks.
8. Keep Your Personal Information Safe. When using social media, lock down all of
your privacy settings, and avoid using your real name or identity on chat rooms.
9. Perform daily scans. Aside from anti-viruses, enabling complete, daily scans of a
system's entire hard drive adds another layer of protection. These daily scans is
important in detecting, isolating, and removing infections. Many of us forget to do
this. One solution is to run the software at night when you are not using your
computer.
10. Scan for viruses before clicking on email links or attachments. It is a standard that
you are not to click on email links or attachments without first scanning it for virus
infection. Whether it came from trusted friends you know, users should never click
on email attachments without at least first scanning them for viruses.
11. Secure Your Network. Many of our computers connect to our files, printers, or the
Internet via a Wi-Fi connection. Make sure it requires a password to access it and that
the password is strong.
12. Think Before You Click. Do not open an email attachment from somebody you do
not know or click on an unknown link.
13. Use a hardware-based firewall. Firewall protects computers from a wide variety of
exploits, malicious network traffic,
viruses, worms, and other vulnerabilities.
14. Use Multiple Strong Passwords. If you
have many email addresses, never use the
same password for all of them because it
takes only seconds to hack all your
account. Use a strong password. A strong
password is a combination of lower case,
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

upper case, numbers, and symbols. Keep it easy to remember but difficult to guess.
13. Intellectual Property Infringement. Infringement refers to the violation of intellectual
property rights, with respect to patents, copyright, and trademarks. Intellectual property
(IP) refers to creations of the intellect for which a monopoly of use is assigned to the owners
of the property, creations or inventions. Intellectual property rights (IPRs) are the rights
granted to the creators of IP, and include trademarks, copyright, patents, industrial design
rights, and trade secrets and other artistic works such as music, literature, inventions,
words, phrases, symbols, and designs.

Tips on How to Protect Your Intellectual Property from Infringement


Digital citizens today can immediately create new intellectual property such as songs,
musical arrangement, videos, e-books, novels in watt pad, digital pictures and images,
digital caricatures, digital comics and many others. But with the advent of high-speed
internet, other people may steal your work and take them as their own. So, you need to
protect it from others benefiting from it without your permission. Here are the tips to protect
your intellectual property from infringement.
1. Register the Appropriate IP Protection. The strongest protection comes from
registering your work. By doing so, you let all people know that it is your work,
discouraging them from using it without permission. Here are the benefits of
registering your IP:
a. Trademark registration gives you the right to use the R symbol, giving legitimacy to
your claim. A symbol on your unregistered trademark does notify the public of your
claim.
b. A patent application gives you the right to use and discourage people from developing
a product they would not be able to use for long.
c. Registering your copyright preserves your right to sue infringers and, if your suit is
successful, collect damages and attorney's fees.
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

2. Pursue Foreign Registration. If you plan to market your invention in other countries,
you need to register patents and trademarks in multiple countries.
3. Do not tell anyone, if possible. If your work is not patentable and you want to protect
it using the trade secrets law, limit the number of people you tell about it. When
possible, have potential partners or investors sign non-disclosure agreements. A non-
disclosure agreement (NDA) is a legal contract between you and the potential partners
or investors not to divulge information to other people who are not part of the
agreement indicating clearly how long it must be kept secret.
4. Monitor Your Marketplace. There are some
people may not be aware that they are already
infringing, so you need to monitor the
marketplace. For example, you can do the
following:
a. Pay attention to new products and companies, and
note the images and words in their marks.
b. Set up Internet search alerts, such as Google alerts, to receive emails when words or
phrases similar to your work are mentioned online.
c. If your trademark is particularly valuable, consider using a trademark search firm to
police your mark. A company like Thomson CompuMark will search domestic and
international trademark and domain registrations.
d. Investigate products that appear similar to yours and their patent filings to determine if
they infringe your patent.
5. Defend Your Rights if Infringed. If you find instances of infringement in the market,
then hire an experienced IP attorney to help you defend your rights. You can do the
following:
a. Send a cease-and-desist letter telling the infringer to stop using your work. You can
send it yourself, but for the most impact, have your lawyer send it.
b. Send a Digital Millennium Copyright Act (DMCA) takedown notice for copyright
infringement on the Internet.
c. Request a court injunction to stop a patent infringer from continuing to make or sell
the product.
d. File a lawsuit if the infringer did not stop of refused to negotiate.

The Ten (10) Most Common Internet Crimes


(Stephen Nale (November 14, 2012) @ http://www.complex.com)
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

Few internet crimes make headlines in media. But we all know that we sometimes did it. We know
the downloading of music, images, and movies without consent is illegal and people all over the
world use the Internet to commit a host of crimes, some of which the public does not even know.
The following are the ten (10) most common Internet crimes:
1. Phishing or Spoofing. This refers to unlawfully access to a computer without authorization
and send multiple e-mails or resend multiple commercial email messages with the intent to
deceive recipients, or falsify header information in multiple email messages.
2. Blackmail or Extortion. This refers to the use of the Internet to threaten to cause damage
with the intent to extort from any person any money or other thing of value by threatening
to expose damaging or embarrassing information in exchange for money.
3. Accessing Stored Communications. This is intentionally accessing, without
authorization, a facility through which an electronic communication service is provided for
the purposes of commercial advantage, malicious destruction, or in furtherance of other
crime.
4. Sports Betting. This is engaging in the business of betting or wagering on any sporting
event or contest over the Internet.
5. Non-Delivery of Merchandise. This is the devising any scheme to defraud money or
property by means of false or fraudulent promises using the Internet such as not receiving
what you won or paid for in an online auction.
6. Electronic Harassment. This is anonymously using the Internet to annoy, abuse, threaten,
or harass the person who receives the communication.
7. Child Pornography. This is using the Internet to
transmit child pornography.
8. Prostitution. This is persuading, inducing,
enticing, or coercing any individual to travel in
interstate commerce to engage in prostitution.
9. Internet Drug Trafficking. This is delivering,
distributing, or dispensing a controlled substance
by means of the Internet.
10. Criminal Copyright Infringement. This is
infringing a copyright for financial gain or
distributing a work for commercial purpose on a computer network.

The Cyberlaw in the Philippines


The Cyberlaw in the Philippines is known as Republic Act No. 10175 or the Cybercrime
Prevention Act of 2012. The following are the punishable act under this law:
1. Offenses against the confidentiality, integrity, and availability of computer data and
systems. This includes:
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

a. Illegal access – The access to the whole or any part of a computer system without
right.
b. Illegal interception – The interception made by technical means without right of
any non-public transmission of computer data to, from, or within a computer system
including electromagnetic emissions from a computer system carrying such
computer data.
c. Data Interference – The intentional or reckless alteration, damaging, deletion or
deterioration of computer data, electronic document, or electronic data message,
without right, including the introduction or transmission of viruses.
d. System Interference – The intentional alteration or reckless hindering or
interference with the functioning of a computer or computer network by inputting,
transmitting, damaging, deleting, deteriorating, altering or suppressing computer
data or program, electronic document, or electronic data messages, without right or
authority, including the introduction or transmission of viruses.
e. Misuse of devices which includes the use, possession or production, sale,
procurement, importation, distribution, or otherwise making available, without
right, of:
a. a device, including a computer program, designed or adapted primarily for the
purpose of committing any of the offenses under this Act; or
b. A computer password, access code, or similar data by which the whole or any
part of a computer system is capable of being accessed with intent that it be
used for the purpose of committing offenses.
f. Cyber-squatting. The acquisition of domain name over the Internet in bad faith to
profit, mislead, destroy reputation, and deprive others from the registering the same,
if such a domain name is:
a. Similar, identical, or confusingly similar to an existing trademark registered
with the appropriate government agency at the time of the domain name
registration;
b. Identical or in any way similar with the name of a person other than the
registrant, in case of a personal name, and
c. Acquired without right or with intellectual property interests in it.
2. Computer-related Offenses. This includes the following:
a. Computer-related Forgery. This refers to the following:
• The input, alteration, or deletion of computer data without right resulting in
inauthentic data with the intent that it be considered or acted upon for legal
purposes as if it were authentic, regardless whether or not the data is directly
readable and intelligible; or
• The act of knowingly using computer data which is the product of computer-
related forgery as defined here, for the purpose of perpetuating a fraudulent
or dishonest design.
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

b. Computer-related Fraud. The unauthorized input, alteration, or deletion of


computer data or program or interference in the functioning of a computer system,
causing damage thereby with fraudulent intent; Provided, That if no damage has
yet been caused, the penalty imposed shall be one (1) degree lower.
c. Computer-related Identity Theft. The intentional acquisition, use, misuse, transfer,
possession, alteration or deletion of identifying information belonging to another,
whether natural or juridical, without right. Provided, That if no damage has yet been
caused, the penalty imposed shall be one (1) degree lower.
3. Content-related Offenses. This includes the following:
a. Cybersex – The willful engagement, maintenance, control, or operation, directly or
indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the
aid of a computer system, for favor or consideration.
b. Child Pornography
c. Unsolicited Commercial Communications – The transmission of commercial
communication with the use of computer system which seek to advertise sell, or
offer for sale products and services are prohibited unless:
d. Libel.
4. Other Offenses
a. Aiding or Abetting in the Commission of Cybercrime – Any person who willfully
abets or aids in the commission of any of the offenses enumerated above shall be
held liable.
b. Attempt in the Commission of Cybercrime – Any person who willfully attempts to
commit any of the offenses enumerated above shall be held liable.

Penalty
Any person found guilty of any of the punishable acts enumerated shall be punished with
imprisonment of arresto mayor (1 month and 1 day to 6 months imprisonment) or a fine of at least
Fifty thousand pesos (P50,000) but not exceeding Two hundred fifty thousand pesos (P250,000)
or both.

LET’S HAVE SOME PRACTICE ACTIVITIES!

Cybercrimes
Learning Activity No.

A. Define the following:

1. Cybercrime
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.

2. Softlifting

3. Cyberextortion

4. Phishing

5. Virus

D. Differentiate the following:


Cyberstalking Internet trolling

Account Takeover Application fraud

Domain Hijacking Domain Squatting

Password Scamming Password Hacking

E. CONCEPT MAPPING. On the space below, draw, create a concept map on cybercrimes
using circle and squares or rectangles. Use back page if necessary.

You might also like