You are on page 1of 22

GROUP 2

The
Disadvantage
s
of ICT
Defining
Cybercrime
Cybercrime are illegal acts done through the use
of the internet.

The U.S. Department of Justice divides cybercrime


into three categories: crimes in which the
computing device is the target, for example, to
gain network access; crimes in which the computer
is used as a weapon, for example, to launch a
denial-of-service (DoS) attack; and crimes in
which the computer is used as an accessory to a
crime, for example, using a computer to store
illegally obtained data.
Top 5 Cybercrimes
complaints in the
Philippines
Source: PNP Anti-Cybercrime Group
The 10
Most
Common
Internet
by: Stephen Nale (2012)

Crimes
Phishing/Spoofin Blackmail/Extortio
g
The act of sending multiple
n
The act of using the internet
emails to multiple users in to threaten or damage
hopes of having a number of someone's reputation to
them clicking on the links or extort money or anything else
malwares attached to the of value.
email.
Accessing Stored Sports Betting
Communications
The act of wagering on any
or hacking; the act of
sports event over the
obtaining unauthorized
internet.
access to data from a
computer network.
Non-Delivery of Electronic
Merchandise Harassment
Act of devising a scheme The act of anonymously using
wherein a culprit posts an item the internet to harass, abuse,
or service for sale on the threaten, or annoy other
internet and once the people.
transactions have been done,
does not really give the item or
Child Pornography Prostitution

The act of using the internet to The act of using the internet
show child pornography. This act to engage in prostitution.
is highly punishable by law.
Drug Trafficking Criminal Copyright
Infringement
The act of selling illegal
substances using the internet. Act of piracy mainly for
financial gain.
Combattin
g
Cybercrim
There are several ways
the authorities can

es
help solve or prevent
cybercrimes.
Network
Security
There are several
security measures a
hacker has to get
through before he or she
can get through the
unauthorized files he or
she is targeting:
Network
Security
• Firewalls
a network security device
that monitors incoming and
outgoing network traffic and
permits or blocks data
packets based on a set of
security rules.
Network
Security
2.Secure Connections
a connection encrypted by
one or more security
protocols to ensure the
security of data flowing
between two or more nodes.
Network
Security
3.Passwords
a memorized secret used to
restrict access to a system,
application, or service to
only those users who have
memorized or stored and/or
are authorized to use it.
Network
Security
4.Anti-malwares
a software tools and
programs designed to
identify and prevent
malicious software, or
malware, from infecting
computer systems or
electronic devices.
Network
Security
5. Data Encryptions
process of converting raw
data into another form, or
code, so that only people
with access to a secret key
(decryption key) or password
can read it.
Investigation
URL tracing and logging are
used by websites to track
your unique IP addresses.
This can be used by
investigators to trace
hackers.
Penalties
more and more laws are
being created and
implemented today.
Penalties include both a
fine and imprisonment.
Do's and
Don'ts of
Internet
Surfing
Source: PNP Anti-Cybercrime
Group
Members:
Rio, Stephen
Romualdo, Rapael
Albos, Merrell
Avellana, Lia
Cam, Kayla

You might also like