Professional Documents
Culture Documents
https://www.bsmcon.edu/sites/default/files/assets/files/students/Essential%20Rules%20of%20Netiquette(2).pdf
Seven Rules of Netiquette
c. Avoid Slang, Acronyms, and Text Talk – Communicating effectively in college and
business environments requires the use of correct terminology, spelling, and
grammar that can easily be understood. For example, use “your” instead of “ur”.
Not correct:
I liek these picture so very nyss. Lol
Correct:
I like these picture so very nice.
https://www.bsmcon.edu/sites/default/files/assets/files/students/Essential%20Rules%20of%20Netiquette(2).pdf
Seven Rules of Netiquette
https://www.bsmcon.edu/sites/default/files/assets/files/students/Essential%20Rules%20of%20Netiquette(2).pdf
Seven Rules of Netiquette
https://www.bsmcon.edu/sites/default/files/assets/files/students/Essential%20Rules%20of%20Netiquette(2).pdf
Seven Rules of Netiquette
f. Exercise Good Judgment When Sharing Information With Others Online – Email
and chat messages that you send or receive are considered private and should not
be forwarded or copied to others without gaining the consent of all involved
participants. In general, messages posted to discussion boards and social media
sites can be read by the public. You may never know who might read or share what
you post. It is a good practice to always ask a post’s author for permission before
sharing a post with other parties.
• For personal communications with friends, family, it is best to use your own
personal account.
https://www.bsmcon.edu/sites/default/files/assets/files/students/Essential%20Rules%20of%20Netiquette(2).pdf
Seven Rules of Netiquette
• To protect your privacy and safety, do not share online any sensitive personal
information such as:
o Your home address or phone number
o Personal conversations
o Social plans, such as vacations
o Financial information
o Usernames, passwords, or hints
o Anything personal that you would not want
shared by others over the Internet
https://www.bsmcon.edu/sites/default/files/assets/files/students/Essential%20Rules%20of%20Netiquette(2).pdf
Seven Rules of Netiquette
• If the material you share with others online came from another source, make
every effort to gain permission from the original author or copyright holder.
Copying someone else's work and passing it off as your own is plagiarism. It
damages your reputation and could subject you to serious academic and legal
consequences.
https://www.bsmcon.edu/sites/default/files/assets/files/students/Essential%20Rules%20of%20Netiquette(2).pdf
Seven Rules of Netiquette
https://www.bsmcon.edu/sites/default/files/assets/files/students/Essential%20Rules%20of%20Netiquette(2).pdf
Netiquettes for Email
https://www.facebook.com/raketdotph/photos/pcb.10159657014459470/10159657013729470/
https://www.facebook.com/raketdotph/photos/pcb.10159657014459470/10159657013729470/
https://www.facebook.com/raketdotph/photos/pcb.10159657014459470/10159657013729470/
https://www.facebook.com/raketdotph/photos/pcb.10159657014459470/10159657013729470/
https://www.facebook.com/raketdotph/photos/pcb.10159657014459470/10159657013729470/
Internet Threat and Cyber Crimes
Internet threats are malicious software programs like adware, trojan horse,
bots, viruses and worms, etc. These type of programs can make use of the
Web for widen, conceal, update and transmit theft data back to criminals or
hackers.
a. A virus is a type of malware that, when executed, self-replicates by modifying other computer
programs and inserting their own code. When this replication succeeds, the affected areas are then said
to be infected.
Virus writers use social engineering and exploit vulnerabilities to infect systems and spread the virus. The
Microsoft Windows and Mac operating systems are the targets of the vast majority of viruses that often
use complex anti-detection strategies to evade antivirus software.
Viruses are created to make profit (e.g. ransomware), send a message, personal amusement,
demonstrate vulnerabilities exist, sabotage and denial of service, or to simply
explore cybersecurity issues, artificial life and evolutionary algorithms.
Computer viruses cause billions of dollars worth of economic damage by causing system failure, wasting
resources, corrupting data, increasing maintenance costs, logging keystrokes and stealing personal
information (e.g. credit card numbers).
https://www.upguard.com/blog/types-of-malware
Example of Virus
https://gizmodo.com/14-infamous-computer-virus-snippets-that-trace-a-histor-601745022
b. A worm is a self-replicating malware program whose primary purpose is to infect other
computers by duplicating itself while remaining active on infected systems.
Often, worms use computer networks to spread, relying on vulnerabilities or security
failures on the target computer to access it. Worms almost always cause at least some harm
to a network, even if only by consuming bandwidth. This is different to viruses which almost
always corrupt or modify files on the victim's computer.
WannaCry is a famous example of a ransomware, cryptoworm that spread without user
action. While many worms are designed to only spread and not change systems they pass
through, even payload-free worms can cause major disruptions.
https://www.upguard.com/blog/types-of-malware
Example of Worm
https://gizmodo.com/14-infamous-computer-virus-snippets-that-trace-a-histor-601745022
c. A trojan horse or trojan is any malware that misleads users of its true intent by
pretending to be a legitimate program. The term is derived from the Ancient Greek story
of the deceptive Trojan Horse that led to the fall of the city of Troy.
Trojans are generally spread with social engineering such as phishing.
For example, a user may be tricked into executing an email attachment disguised to
appear genuine (e.g. an Excel spreadsheet). Once the executable file is opened, the trojan
is installed.
While the payload of a trojan can be anything, most act as a backdoor giving the attacker
unauthorized access to the infected computer. Trojans can give access to personal
information such as internet activity, banking login credentials, passwords or personally
identifiable information (PII). Ransomware attacks are also carried out using trojans.
Unlike computer viruses and worms, trojans do not generally attempt to inject malicious
code into other files or propagate themselves.
https://www.upguard.com/blog/types-of-malware
https://www.facebook.com/anticybercrimegroup/photos/a.880767855341043/4462548467162946/
Virus Worm Trojan Horses
Virus is a software or computer Worms replicate itself to cause slow Trojan Horse rather than replicate
program that connect itself to down the computer system. capture some important information
another software or computer about a computer system or a
program to harm computer system. computer network.
Virus can’t be controlled by Worms can be controlled by Like worms, Trojan horse can also
remote. remote. be controlled by remote.
The main objective of virus to The main objective of worms to eat The main objective of Trojan horse
modify the information. the system resources. to steal the information.
https://www.geeksforgeeks.org/difference-between-virus-worm-and-trojan-horse/
d. A rootkit is a collection of malware designed to give unauthorized access to a computer
or area of its software and often masks its existence or the existence of other software.
Rootkit installation can be automated or the attacker can install it with administrator
access.
Access can be obtained by a result of a direct attack on the system, such as
exploiting vulnerabilities, cracking passwords or phishing.
https://www.upguard.com/blog/types-of-malware
https://www.bloomberg.com/news/articles/2021-06-04/hackers-breached-colonial-pipeline-using-compromised-password
f. Keyloggers, keystroke loggers or system monitoring are a type of malware used to
monitor and record each keystroke typed on a specific computer's keyboard. Keyloggers
are also available for smartphones.
Keyloggers store gathered information and send it to the attacker who can then extract
sensitive information like login credentials and credit card details.
https://www.upguard.com/blog/types-of-malware
g. Adware is designed to put advertisements on your screen, often in a web
browser or popup.
Typically it distinguishes itself as legitimate or piggybacks on another program
to trick you into installing it on your computer, tablet or smartphone.
Adware is one of the most profitable, least harmful forms of malware and is
becoming increasingly popular on mobile devices. Adware generates revenue
by automatically displaying advertisement to the user of the software.
https://www.upguard.com/blog/types-of-malware
h. Bots and Botnet
A bot is a computer that is infected with malware that allows it to be remotely controlled by an
attacker.
The bot (or zombie computer) can then be used to launch more cyber attacks or become part of a
botnet (a collection of bots).
Botnets are a popular method for distributed denial of service (DDoS) attacks, spreading
ransomware, keylogging and spreading other types of malware.
https://map.lookingglasscyber.com/
https://www.upguard.com/blog/types-of-malware
https://www.facebook.com/anticybercrimegroup/photos/a.880767855341043/4546108268806965/
There are six common ways that malware spreads:
1. Vulnerabilities: A security defect in software allows malware to exploit it to gain
unauthorized access to the computer, hardware or network
2. Backdoors: An intended or unintended opening in software, hardware, networks or
system security
3. Drive-by downloads: Unintended download of software with or without knowledge of
the end user
4. Homogeneity: If all systems are running the same operating system and connected to
the same network, the risk of a successful worm spreading to other computers is
increased
5. Privilege escalation: A situation where an attacker gets escalated access to a computer
or network and then uses it to mount an attack
6. Blended threats: Malware packages that combine characteristics from multiple types
of malware making them harder to detect and stop because they can exploit
different vulnerabilities.
https://www.upguard.com/blog/types-of-malware
2. Phishing
https://velecor.com/10-common-internet-security-threats-and-how-to-avoid-them/
2. Phishing
https://velecor.com/10-common-internet-security-threats-and-how-to-avoid-them/
3. distributed denial-of-service (DDoS)
https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/
Cybercrime
https://www.kaspersky.com/resource-center/threats/what-is-cybercrime
https://www.pandasecurity.com/en/mediacenter/panda-security/types-of-cybercrime/
https://www.britannica.com/topic/cybercrime
Cybercrime
Link: https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/
https://www.kaspersky.com/resource-center/threats/what-is-cybercrime
https://www.pandasecurity.com/en/mediacenter/panda-security/types-of-cybercrime/
https://www.britannica.com/topic/cybercrime
There are three major categories of cyber crimes:
1. Crimes Against People
These crimes include cyber harassment and stalking, distribution of child pornography,
credit card fraud, human trafficking, spoofing, identity theft, and online libel or slander.
2. Crimes Against Property
Some online crimes occur against property, such as a computer or server. These crimes
include DDOS attacks, hacking, virus transmission, cyber and typo squatting, computer
vandalism, copyright infringement, and IPR violations.
3. Crimes Against Government
When a cybercrime is committed against the government, it is considered an attack on
that nation's sovereignty. Cybercrimes against the government include hacking,
accessing confidential information, cyber warfare, cyber terrorism, and pirated
software.
https://www.kaspersky.com/resource-center/threats/what-is-cybercrime
https://www.pandasecurity.com/en/mediacenter/panda-security/types-of-cybercrime/
https://www.swierlaw.com/faqs/what-are-the-three-types-of-cyber-crimes-.cfm
TYPES OF CYBER CRIME
1. Hacking
In simple words, hacking is an act committed by an intruder by accessing your
computer system without your permission. Hackers (the people doing the ‘hacking’)
are basically computer programmers, who have an advanced understanding of
computers and commonly misuse this knowledge for devious reasons. They’re usually
technology buffs who have expert-level skills in one particular software program or
language. As for motives, there could be several, but the most common are pretty
simple and can be explained by a human tendancy such as greed, fame, power, etc.
Some people do it purely to show-off their expertise – ranging from relatively harmless
activities such as modifying software (and even hardware) to carry out tasks that are
outside the creator’s intent, others just want to cause destruction.
https://www.digit.in/technology-guides/fasttrack-to-cyber-crime/the-12-types-of-cyber-crime.html
TYPES OF CYBER CRIME
a. SQL Injections: An SQL injection is a technique that allows hackers to play upon the security vulnerabilities of the
software that runs a web site. It can be used to attack any type of unprotected or improperly protected SQL database.
This process involves entering portions of SQL code into a web form entry field – most commonly usernames and
passwords – to give the hacker further access to the site backend, or to a particular
user’s account.
b. Theft of FTP Passwords: This is another very common way to tamper with web sites. FTP password hacking takes
advantage of the fact that many webmasters store their website login information on their poorly protected PCs. The
thief searches the victim’s system for FTP login details, and then relays them to his own remote computer. He then
logs into the web site via the remote computer and modifies the web pages as he or she pleases.
c. Cross-site scripting:
Also known as XSS (formerly CSS, but renamed due to confusion with cascading style sheets), is a very easy way of
circumventing a security system. Cross-site scripting is a hard-to-find loophole in a web site, making it vulnerable to
attack. In a typical XSS attack, the hacker infects a web page with a malicious client-side script or program. When you
visit this web page, the script is automatically downloaded to your browser and executed. Typically, attackers inject
HTML, JavaScript, VBScript, ActiveX or Flash into a vulnerable application to deceive you and gather confidential
information. If you want to protect your PC from malicious hackers, investing in a good firewall should be first and
foremost. Hacking is done through a network, so it’s very important to stay safe while using the internet. You’ll read
more about safety tips in the last chapter of this book.
https://www.digit.in/technology-guides/fasttrack-to-cyber-crime/the-12-types-of-cyber-crime.html
TYPES OF CYBER CRIME
2. Denial-of-Service attack
A Denial-of-Service (DoS) attack is an explicit attempt by attackers to deny service to intended
users of that service. It involves flooding a computer resource with more requests than it can
handle consuming its available bandwidth which results in server overload. This causes the
resource (e.g. a web server) to crash or slow down significantly so that no one can access it.
Using this technique, the attacker can render a web site inoperable by sending massive amounts
of traffic to the targeted site. A site may temporarily malfunction or crash completely, in any
case resulting in inability of the system to communicate adequately. DoS attacks violate the
acceptable use policies of virtually all internet service providers.
Another variation to a denial-of-service attack is known as a “Distributed Denial of Service”
(DDoS) attack wherein a number of geographically widespread perpetrators flood the network
traffic. Denial-of-Service attacks typically target high profile web site servers belonging to banks
and credit card payment gateways. Websites of companies such as Amazon, CNN, Yahoo, Twitter
and eBay.
https://www.digit.in/technology-guides/fasttrack-to-cyber-crime/the-12-types-of-cyber-crime.html
TYPES OF CYBER CRIME
3. Phishing
This a technique of extracting confidential information such as credit card numbers and
username password combos by masquerading as a legitimate enterprise. Vishing (voice
phishing) involves calls to victims using fake identity fooling you into considering the call to be
from a trusted organization. They may claim to be from a bank asking you to dial a number and
enter your account details.
4. Email bombing and spamming
Email bombing is characterised by an abuser sending huge volumes of email to a target address
resulting in victim’s email account or mail servers crashing. The message is meaningless and
excessively long in order to consume network resources. If multiple accounts of a mail server are
targeted, it may have a denial-of-service impact. Such mail arriving frequently in your inbox can
be easily detected by spam filters. Email bombing is commonly carried out using botnets (private
internet connected computers whose security has been compromised by malware and under
the attacker’s control) as a DDoS attack.
https://www.digit.in/technology-guides/fasttrack-to-cyber-crime/the-12-types-of-cyber-crime.html
TYPES OF CYBER CRIME
5. Web jacking
Web jacking derives its name from “hijacking”. Here, the hacker takes control of a web site
fraudulently. He may change the content of the original site or even redirect the user to another
fake similar looking page controlled by him. The owner of the web site has no more control and
the attacker may use the web site for his own selfish interests. Cases have been reported where
the attacker has asked for ransom, and even posted obscene material on the site.
The web jacking method attack may be used to create a clone of the web site, and present the
victim with the new link saying that the site has moved. Unlike usual phishing methods, when
you hover your cursor over the link provided, the URL presented will be the original one, and not
the attacker’s site. But when you click on the new link, it opens and is quickly replaced with the
malicious web server. The name on the address bar will be slightly different from the original
website that can trick the user into thinking it’s a legitimate site. For example, “gmail” may direct
you to “gmai1”. Notice the one in place of ‘L’. It can be easily overlooked.
https://www.digit.in/technology-guides/fasttrack-to-cyber-crime/the-12-types-of-cyber-crime.html
TYPES OF CYBER CRIME
6. Cyber stalking
Cyber stalking is a new form of internet crime in our society when a person is pursued or
followed online. A cyber stalker doesn’t physically follow his victim; he does it virtually by
following his online activity to harvest information about the stalkee and harass him or her and
make threats using verbal intimidation. It’s an invasion of one’s online privacy.
Cyber stalking uses the internet or any other electronic means and is different from offline
stalking, but is usually accompanied by it. Most victims of this crime are women who are stalked
by men and children who are stalked by adult predators and pedophiles. Cyber stalkers thrive on
inexperienced web users who are not well aware of netiquette and the rules of internet safety. A
cyber stalker may be a stranger, but could just as easily be someone you know.
https://www.digit.in/technology-guides/fasttrack-to-cyber-crime/the-12-types-of-cyber-crime.html
TYPES OF CYBER CRIME
https://www.digit.in/technology-guides/fasttrack-to-cyber-crime/the-12-types-of-cyber-crime.html
https://www.facebook.com/anticybercrimegroup/photos/a.880767855341043/4479223915495401/
TYPES OF CYBER CRIME
https://www.digit.in/techn
ology-guides/fasttrack-to-cy
ber-crime/the-12-types-of-c
yber-crime.html
https://www.facebook.com
/anticybercrimegroup/phot
os/a.880767855341043/44
79223915495401/
TYPES OF CYBER CRIME
8. Software Piracy
Thanks to the internet and torrents, you can find almost any movie, software or song from any
origin for free. Internet piracy is an integral part of our lives which knowingly or unknowingly we
all contribute to. This way, the profits of the resource developers are being cut down. It’s not just
about using someone else’s intellectual property illegally but also passing it on to your friends
further reducing the revenue they deserve. Software piracy is the unauthorized use and
distribution of computer software. Software developers work hard to develop these programs,
and piracy curbs their ability to generate enough revenue to sustain application development.
This affects the whole global economy as funds are relayed from other sectors which results in
less investment in marketing and research.
The following constitute software piracy:
https://www.digit.in/technology-guides/fasttrack-to-cyber-crime/the-12-types-of-cyber-crime.html
TYPES OF CYBER CRIME
9. Child Pornography
Child pornography is a form of child sexual exploitation. Federal law defines child
pornography as any visual depiction of sexually explicit conduct involving a minor (persons less
than 18 years old). Images of child pornography are also referred to as child sexual abuse
images.
Example: https://www.pna.gov.ph/articles/1132331
https://www.justice.gov/criminal-ceos/child-pornography
TYPES OF CYBER CRIME
11. Online scams are sophisticated messages, often
using professional looking brands and logos to look
like they come from a business you know. At first
sight this can make it difficult for you to know what
is real and what is fake.
A scam message can be sent by email, SMS, dating
sites, social networking sites, instant messaging or
even through videophone communications such as
Skype or FaceTime.
a. Fake Charities
b. Fake Parcel Delivery Scams
c. Investment Scams
d. Threat-based impersonation scams
e. Unexpected money scams
f. dating and romance scams
https://www.cyber.gov.au/acsc/view-all-content/threats/scams
https://www.justice.gov/criminal-ceos/child-pornography
https://www.facebook.com/anticybercrimegroup/photos/a.880767855341043/4479246282159831/
https://www.facebook.com/anticybercrimegroup/photos/a.884515324966296/4310936785657449
https://www.facebook.com/anticybercrimegroup/photos/pcb.4363312557086538/4363312243753236
https://www.facebook.com/anticybercrimegroup/photos/a.884515324966296/4310936785657449
https://www.facebook.com/anticybercrimegroup/photos/pcb.4363312557086538/4363312243753236
Anti Photo and Video Voyeurism
Any person who possesses a nude photo or video
of another person without his/her consent.
https://library.tiffin.edu/netiquette/safety
https://nationalonlinesafety.com/wakeupwednesday/what-is-online-safety
STAYING SAFE ONLINE
https://library.tiffin.edu/netiquette/safety
STAYING SAFE ONLINE
https://library.tiffin.edu/netiquette/safety
STAYING SAFE ONLINE
https://haveibeenpwned.com/
https://library.tiffin.edu/netiquette/safety
Thank You !!!!