Professional Documents
Culture Documents
Chapter 2:
Filipinos & Cyberspace
The Top Ten Cybercrimes Reported to the PNP?
01 02 03 04 05
Online Scams Illegal Access Computer Related ATM/ Credit Threats
Identity Theft Card Fraud
06 07 08 09 10
Data Interference Anti-photo Computer Unjust Vexation Phishing
& Video Voyeurism Related Fraud
The Top Ten Cybercrimes Reported to the PNP?
1. Online Romance 2. Online Shopping
Scams: Scams:
01 Fraudsters create fake online
personas to establish
Fake online stores or
sellers deceive buyers
romantic relationships with by offering products
victims and then exploit that don't exist or
Online Scams, them financially. misrepresenting the
also known as internet quality of the items.
scams. The term generally
refers to someone using
internet services or software
to defraud or take
advantage of victims,
typically for FINANCIAL
GAIN.
The Top Ten Cybercrimes Reported to the PNP?
Example : Hacking:
Threats
The Top Ten Cybercrimes Reported to the PNP?
Malware Attacks: The
deployment of malicious
software (malware), such as
06 viruses, trojans, or
ransomware, that can
interfere with data integrity
and functionality.
Data interference
When committed intentionally, the
damaging, deleting,
deterioration, alteration, or
suppression of computer data
without right; includes inputting of
malicious codes
07
Anti-photo and video voyeurism
Unjust Vexation
if someone is causing annoyance,
harassment, or distress through
Cyberbullying:
digital means,
Online Harassment:
Cyberstalking:
Defamation:
10
Phishing
- Phishing is a type of cyber
attack where attackers use
deceptive emails, messages, or
websites to trick individuals into
revealing sensitive information,
such as usernames, passwords,
credit card numbers, or other
personal details.
Cybercrimes are likely to occur in areas involving:
National security Crimes against people or property
Financial motivations Crimes that violate public morals
Main types of cyber threats that organizations, individuals, &
governments face:
1. Espionage
2. Sabotage
is the crime of spying or
is defined as deliberate and
secretly watching a person, malicious acts that result in
company, government, etc. the disruption of the normal
for the purpose of gathering processes and functions or
secret information or the destruction or damage of
detecting wrongdoing, and equipment or information.
to transfer such information
to another organization or
state.
3. Disruption
of
system functionality
Ransomware Attacks: IoT (Internet of Things)
Malicious software that encrypts Attacks:
a user's data, demanding Compromising the functionality
payment (a ransom) for its of connected devices, such as
release. This can lead to smart appliances, industrial
significant disruptions in machinery, or critical
business operations if critical infrastructure, to disrupt normal
data is affected. operations.
.
Botnets and DDoS Attacks:
Main types cyber threats that organizations, individuals, & governments
face:
The NotPetya cyber attack
Attributed to: Russia
Target: Primarily Ukraine, but
affected companies worldwide
Unauthorized access.
Attackers often aim to gain
access to certain systems or to
modify communications that
control military systems or
other critical technology.
• In May 2000, the world was hit by the “I LOVE YOU” virus, a
piece of malware created by Onel de Guzman, a resident of
Manila, Philippines.
• This virus sent via email with an enticing subject line, infected
over 10 million Windows personal computers, causing
disruption.
• The virus overwrote random files and replicated itself to all the
Windows Address Book used by Microsoft outlook. The damage
was substantial, with estimates ranging from $5.5 billion to as
high as $10 billion.
Reaction of the Lawmakers
• The Philippine Congress passed Republic Act (RA) 8792, often known as Electronic Commerce Act of 2000, to combat
the threat that cybercrime poses. Regulation 8792 (RA 8772) establishes the acceptance and
legal recognition of electronic data transmissions, documents and signatures. The legislative was
approved on June 14th 2000.
The following are the key elements of the act:
1. Ensures that electronic documents are admissible in court proceedings;
2. Limits the types of online crimes that can be punished, as hacking, the spread of viruses, and
infringement of copyright, and imposes fines at least Php100,000 and prison terms of between
six months and 3 years.
3. Encourage e-commerce throughout the nation, especially in business-to-business and business-
to-consumer transactions that improve and facilitate company relationships and allow
consumers to find and buy things online.
4. Aims to limit personal contact between government officials and the general public, hence
reducing graft and corruption in the government
What is the significance of RA 8792?
Cyber defense in the Philippines
• The Department of Science and Technology (DOST) and the Department of Information and Communications
Technology (DICT) have been implementing various science, technology and innovation (STI) initiatives.
• These initiatives include: an AI-powered thermal scanner system, online portals for remote work and COVID-19
information, free internet access at COVID-19 facilities and webinars on cybersecurity awareness.
• The Philippines is also discussing cooperation with Japan on the construction for cyber defense and security.
The Department of National Defense (DND) is responsible for protecting the nation from cyberattacks, particularly those
targeting the military network. It also secures national security and military networks. The DND’s role in the Inter-Agency
task Force for the Management of Emerging Infectious Diseases further strengthens its response to the cyber crisis
surrounding COVID-19.