You are on page 1of 27

a

EVOLUTION OF
MEDIA:

Traditional to New Media


CROSSWORD PUZZLE
Picture Analysis
Without worries, download
anything from untrusted
websites.

It is fine to log in to public


networs/Wifi.
Reply or click links from
suspicious e-mails.

It is safe to share your complete


name on your social media
networking site, as well as your
birthday to receive greetings and
gifts.
Talk to strangers whether
online or face-to-face.

RECAP
Do you a have good memory?

Let’s review the past lesson by


answering the following
questions given:
Identify the follow
ing ICT’s and Soci
al Media in the giv
en statement
-usually acquired this
threat through online.
It is malicious program that
usually transfer from one device to
another with the aid of the Internet
and local networks, but commonly
through data storage such as flash
drives or hard drive.
Unlike the virus, this malware replicates
itself and can transfer by any type of means,
but more often through computer network.
The ILOVEYOU worm, known as Love
Bug, that infected 45 million machines
across the globe, including the Pentagon,
within 24 hours last May 4, 2000? (Computer
Weekly, 2020.)
When the victim opens the
attachment, an e-mail LESSON
RECAP entitled LOVE-
LETTER-FOR-YOU, the
malware automatically send itself
to all the victim’s Microsoft
“kindly check the attached Outlook contacts.
LOVE LETTER coming from
me”.
Tracing its name origin, it can be link to the
mythology story about how Trojan fell
because of Greeks’ wooden horse (Hamilton
1942, 206). Like the Odysseus’ strategy, this
malicious program disguised as a useful
program, however left your devices
unprotected and became vulnerable to other
malwares once you accessed or downloaded
it.
a malicious program that monitors
the device, and the actions of the
user without its knowledge. Another
example, the keylogger steals
sensitive information using the
recorded user’s keystrokes.
this program automatically sends
pop-ups advertisements.
Mr. Victor Lorenzo, National Bureau of Investigation (NBI) Cybercrime
Division Chief, said that cybercrime incidents rose up to 100% during the
Covid-19 pandemic, and phishing ranked one (GMA News Online 2020).
is an example of cybercrime, an illegal act
done using Internet, and there’s more:

it is unauthorized accessing of data from a


computer network. Mostly, hackers attack
commercial and government sites to cause
an alarm or to threat someone.
it is an illegal act of gambling on any
sports event that happened over the
Internet.
– a deceiving act which the culprit posted a product or service on
the Internet. Once the victim placed its payment, the culprit does
not give the item or service.
an anonymous criminal who harass, abuse, threat,
or annoy other people. One example of this is
cyberbullying or the repeated harassment that
usually happens among the youth, and from the
past years, becomes the main cause of suicide
cases.
Based on Republic Act no 9775 or known as Anti-Child
Pornography Act of 2009, it is an act of real or
simulated explicit sexual activities that involves any
child aged 18 and below and it is penalized depending
on the offender. If it is the parent or relative of the
child, they’ll receive the maximum penalty.
– it is an illegal act engage in any
sexual activities.
it is an unauthorized use or stealing of
intellectual property, such as movies and
music, for profitable benefit. Sometimes,
students violate it through plagiarism.
Five(5)

the
lesson
-END-

You might also like