This document provides information about cybercrimes and safety tips for online activities. It defines different types of malware like viruses, worms, and trojans that can infect devices. Examples like ILOVEYOU worm that spread through email attachments are mentioned. Cybercrimes discussed include hacking, identity theft, gambling, auction fraud, cyberbullying, child pornography, and piracy. The document emphasizes not sharing personal information or clicking suspicious links to avoid becoming victims of cybercrimes.
This document provides information about cybercrimes and safety tips for online activities. It defines different types of malware like viruses, worms, and trojans that can infect devices. Examples like ILOVEYOU worm that spread through email attachments are mentioned. Cybercrimes discussed include hacking, identity theft, gambling, auction fraud, cyberbullying, child pornography, and piracy. The document emphasizes not sharing personal information or clicking suspicious links to avoid becoming victims of cybercrimes.
This document provides information about cybercrimes and safety tips for online activities. It defines different types of malware like viruses, worms, and trojans that can infect devices. Examples like ILOVEYOU worm that spread through email attachments are mentioned. Cybercrimes discussed include hacking, identity theft, gambling, auction fraud, cyberbullying, child pornography, and piracy. The document emphasizes not sharing personal information or clicking suspicious links to avoid becoming victims of cybercrimes.
CROSSWORD PUZZLE Picture Analysis Without worries, download anything from untrusted websites.
It is fine to log in to public
networs/Wifi. Reply or click links from suspicious e-mails.
It is safe to share your complete
name on your social media networking site, as well as your birthday to receive greetings and gifts. Talk to strangers whether online or face-to-face.
RECAP Do you a have good memory?
Let’s review the past lesson by
answering the following questions given: Identify the follow ing ICT’s and Soci al Media in the giv en statement -usually acquired this threat through online. It is malicious program that usually transfer from one device to another with the aid of the Internet and local networks, but commonly through data storage such as flash drives or hard drive. Unlike the virus, this malware replicates itself and can transfer by any type of means, but more often through computer network. The ILOVEYOU worm, known as Love Bug, that infected 45 million machines across the globe, including the Pentagon, within 24 hours last May 4, 2000? (Computer Weekly, 2020.) When the victim opens the attachment, an e-mail LESSON RECAP entitled LOVE- LETTER-FOR-YOU, the malware automatically send itself to all the victim’s Microsoft “kindly check the attached Outlook contacts. LOVE LETTER coming from me”. Tracing its name origin, it can be link to the mythology story about how Trojan fell because of Greeks’ wooden horse (Hamilton 1942, 206). Like the Odysseus’ strategy, this malicious program disguised as a useful program, however left your devices unprotected and became vulnerable to other malwares once you accessed or downloaded it. a malicious program that monitors the device, and the actions of the user without its knowledge. Another example, the keylogger steals sensitive information using the recorded user’s keystrokes. this program automatically sends pop-ups advertisements. Mr. Victor Lorenzo, National Bureau of Investigation (NBI) Cybercrime Division Chief, said that cybercrime incidents rose up to 100% during the Covid-19 pandemic, and phishing ranked one (GMA News Online 2020). is an example of cybercrime, an illegal act done using Internet, and there’s more:
it is unauthorized accessing of data from a
computer network. Mostly, hackers attack commercial and government sites to cause an alarm or to threat someone. it is an illegal act of gambling on any sports event that happened over the Internet. – a deceiving act which the culprit posted a product or service on the Internet. Once the victim placed its payment, the culprit does not give the item or service. an anonymous criminal who harass, abuse, threat, or annoy other people. One example of this is cyberbullying or the repeated harassment that usually happens among the youth, and from the past years, becomes the main cause of suicide cases. Based on Republic Act no 9775 or known as Anti-Child Pornography Act of 2009, it is an act of real or simulated explicit sexual activities that involves any child aged 18 and below and it is penalized depending on the offender. If it is the parent or relative of the child, they’ll receive the maximum penalty. – it is an illegal act engage in any sexual activities. it is an unauthorized use or stealing of intellectual property, such as movies and music, for profitable benefit. Sometimes, students violate it through plagiarism. Five(5)