You are on page 1of 59

VISUAL BASIC

PROGRAMMING ESSENTIALS
UNIT 1: TECHNOLOGY AND
INTERNET GUIDELINES
Unit Objectives
• Determine the significance of
internet
• Name the risks in using the internet
• Identify computer safety, ethics and
ways to safeguard personal
information
• Be aware of the existing Anti-
cybercrime Law in the country.
Unit Topics

Lesson 1: INTERNET USE AND ITS RISKS

Lesson 2: COMPUTER SAFETY AND MORAL


LESSON 1:
INTERNET USE
AND ITS RISKS
Lesson Topics

• The Internet – Overview


• Internet Uses and
Advantages
• Internet Risks
• Known Internet Security
Cases
The Internet – Overview
In its essence,
• The INTERNET is a channel to
provide information and services to
humankind.
• Is a form of network of computer
networks, extended geographically
to allow user to communicate or
collaborate with its remote user.
The Internet – Overview
A COMPUTER NETWORK is a
group of computers connected to
each other intends to communicate
and share files and resources such
as printers and scanners.
The Internet – Overview
• The internet has become a
normal part of our daily lives that
it’s hard to imagine a time when
it wasn’t there.
• The world we live in now is much
different from the world that once
we had.
Internet Uses and
Advantages
Internet advantages are the
benefits or the so-called “ADDED
VALUE” while using the internet.
• Faster Communication: This is
one of the primary purposes of
internet – and that is to provide a
speedy way of communication
between parties involved.
Internet Uses and
Advantages
• Information Resources: The
internet is the biggest and
seamless source of information
other than printed references.
• Entertainment: Entertainment is
another popular reason why people
prefer to use the internet
particularly to youth and
enthusiasts.
Internet Uses and
Advantages
• Social Networking: The advent of
internet has changed the social life
of every individual in the world.
• E-Commerce: It is an electronic
commerce by which a firm or
individual is doing commercial
business over the internet.
Internet Risks
Cybercrimes, as defined, are
“Offences that are committed against
individuals or groups of individuals with
criminal motive to intentionally harm
the reputation of the victim or cause
physical or mental harm to the victim
directly or indirectly, using modern
telecommunication such as Internet
and mobile phones”.
Internet Risks
• Bullying by peers and people they
consider as ‘friends’.
• Posting personal information that
can identify and locate a child
offline.
• Sexual grooming, luring,
exploitation and abuse contact with
strangers.
• Exposure to inaapropriate and/or
content.
Internet Risks
• Encouragement of violent behavior, such
as “happy slapping”.
• Gloriying activities such as drug taking or
excessive drinking.
• Physical harm to young people in making
video content, such as enacting and
imitating stunts and risk taking activities.
• Leaving and running away from home as
a result of contacts made online.
Internet Risk
The top potential internet risks are:
• Sexting: receving sexual
messages or images, meaning talk
about having sex or images of
naked or having sex online.
• Pornography: obviously sexual –
For example, showing people naked
or people having sex over the
internet such on online chat or
board rooms.
Internet Risk
• Bullying: receiving or sending
nasty, offensive or hurtful message
online to others.
• Meeting online contacts offline:
meeting or communicating online
contacts or strangers face-to-face,
encouraging to meet someone
through internet.
Internet Risk
Remediations to avoid or stay away
from these risks are recommended
and these are as follows:
• Parental mediation: Taking
positive steps such as suggesting
how to behave towards others
online and talking about things
that might affect child.
Internet Risk
• Parental and children
awareness: familiarity on the
advantages and impacts of
internet use.
Internet Risk
The general internet risks for
commercial entity:
• E-burglary is one of the popular
security breach in e-commerce.
• E-Strangers is a kind of identity
impersonation to gain significant
company or personal
information.
Internet Risk
• E-Recuitment is the
advertisement of fraudulent job
vacancies online and requesting
someone to submit his/her profile
or CV electronically.
• Trolling is a spoof message
introduced into a list or chat
room for the purpose of evoking
maximum response.
Known Internet Security Cases

These are as follows:


1. A hacking group called MOD
(Masters of Deception), allegedly
stole passwords and technical date
from Pacific Bell, Nynex and other
telephone companies as well as
several credit agencies and two
major universities.
Known Internet Security Cases

2. In 1983, a 19 yrs. Old UCLA student


used his PC to break into a Defense
Department International
Communications System.
3. Between 1995 and 1998, the
Newscorp satellite pay-to-view
encrypted SKY-TV service was
hacked several times during an on-
going technological arms race
between a pan-European hacking
Known Internet Security
Cases
4. On March 26, 1999, the Melissa
worm infected a document on a
victim’s computer, then
automatically sent that document
and copy of the virus via e-mail to
other people.
Known Internet Security
Cases
5. In February 2000, an individual
going by the alias of MafiaBoy
began a series of denial-of-service
attacks against high profile
websites, including Yahoo!,
Amazon.com, Dell, Inc., E*TRADE,
eBay, and CNN, Standford
University and also computers at
the University of California at
Santa Barbara.
Known Internet Security
Cases
6. On and after May 5, 2005, a computer
worm known as “ILOVEYOU”, that was
originated from the Philippines attacked
tens of millions Windows personal
computers over the internet.
7. The Russian Business Network (RBN) was
registered as an legitimate internet site in
2006 but later hosted illegitimate
activities and started hiring its services to
criminals.
Known Internet Security
Cases
8. In August 2010, the international
pedohphile ring Dreamboard
website with had approximately
600 members and may have
distributed up to 123 TB of child
pornography was shutdowned by
the International Investigation
Operation Delego, under the aegis
of the US Department of Homeland
Security.
Known Internet Security
Cases
9. On April 2012, Filipino hactivists
known as “Anonymous
#OccupyPhilippines” attacked the
China University Media Union site
as a retaliation to the attacked of
Chinese hackers to the University
of the Philippine website, replacing
its homepage content with a
digitized image of Guy Fawkes
mask.
TOP 10 COMPUTER
MANIACS
END OF LESSON
DISCUSSION
LESSON 2: COMPUTER
SAFETY AND MORAL
Lesson Topic
• Computer Ethics
• How To Safeguard Personal
Information Online
• The Republic Act 10175: Anti-
Cybercrime Law
Computer Ethics

Computer
ethics, in its
simplest
definition, is a
set of moral
standards that
regulate the use
of a computer.
Computer Ethics
In computer ethics, it is essential to
understand the three (3) basic
aspects of standards.
• Copyright and Intellectual
Property
• Day-to-Day Ethics
• Netiqutte
Computer Ethics
• Copyright and
Intellectual
Property. It is the
protection of
industrial property
from illegal use,
copy, sell, and
other related acts
without proper
consent from the
owner.
Computer Ethics
• Day-to-Day
Ethics. It is the
dos and don’ts. It
is critical that
each of us
understand the
various types of
malicious activity
involving
electronic activity
and its resulting
Computer Ethics
Examples of unethical manners in using
computer are:
• Software piracy
• Generation of computer malicious
programs (worm, virus, etc)
• Plagiarism
• Hacking
• Data forgery and fraud
• Illegal access
Computer Ethics
• Netiquette. This is
the basic laws and
principles that
abound with online
communications
with people
through the use of
electronic devices
such as mobile
phone and
computer.
Computer Ethics
The Computer Code of Ethics
1. Maintain the highest standard of
professional behavior.
2. Avoid situations that create a
conflict of interest.
3. Do not violate the confidentiality of
your employer or those you
service.
Computer Ethics
4. Continue to learn so your
knowledge keeps pace with the
technology.
5. Never misrepresent or withhold
information that is germane to a
problem or situation of public
concern.
6. Use information judiciously and
maintain system integrity at all
times.
Computer Ethics
7. Do not violate the rights or privacy
of others.
8. Take appropriate action when
exposed to unethical or illegal
practices.
9. Do not exploit the shortcomings of
an employer’s computer system for
personal gain.
10.Accomplish each task to the best of
your ability.
How To Safeguard Personal Informatio
Online

The guidelines on how to achieve


safety.
1. Do not reveal personal
information inadvertently.
2. Turn on cookie notices in your
Web browser, and/or use cookie
management software or
infomediaries.
3. Keep a “clean” email address.
How To Safeguard Personal
Information
Online

4. Don’t reveal personal details to


strangers or just-met “friends”.
5. Realize you may be monitored at work,
avoid sending highly personal e-mail to
mailing lists, and keep sensitive files
on your home computers.
6. Beware sites that offer some sort of
reward or prize in exchange for your
contact information or personal details.
How To Safeguard Personal Informatio
Online

7. Do not reply to spammers, for any


reason.
8. Be conscious of Web security.
9. Be conscious of home computer
security.
10.Examine privacy policies and
seals in the Web site you work
with.
How To Safeguard Personal Informatio
Online

11.Remember that YOU decide what


information about yourself to
reveal, when, why, and to whom.
12.Use encryption or credentials for
your files or access.
The Republic Act 10175: Anti-Cybercrime
Law

To curb down the cybercrimes in


the Philippines, the Philippine
Congress has ratified the law
penalizing violators of cybercrimes
and this is the Republic Act
10175 or also known as the
“Cybercrime Prevention Act of
2012”.
The Republic Act 10175: Anti-Cybercrime
Law

The law defines cybercrime


offenses with definitive
punishments. For the purpose of
this book, below are the summary
of cybercrime offenses punishable
under this law.
1. Illegal Access: The access to
the whole or any part of a
computer data or systems.
The Republic Act 10175: Anti-Cybercrime
Law

2. Illegal Interception: The


interception made by technical
means without right of any non-
public transmission of computer
data to, from, or within a computer
system including electromagnetic
emissions from a computer system
carrying such computer data.
The Republic Act 10175: Anti-Cybercrime
Law

3. Data Interference: The


intentional or reckless alteration,
damaging, deletion or
deterioration of computer data,
electronic document, or electronic
data message, without right,
including the introduction or
transmission of viruses.
The Republic Act 10175: Anti-
Cybercrime Law

4. System Interference: The intentional


alteration or reckless hindering or
interference with the functioning of a
computer or computer network by inputting,
transmitting, damaging, deleting,
deteriorating, altering or suppressing
computer data or program, electronic
document, or electronic data message,
without right or authority, including the
introduction or transmission of viruses.
The Republic Act 10175: Anti-Cybercrime
Law

5. Misuse of Devices: The use,


production, sale, procurement,
importation, distribution, or
otherwise making available,
without right (with certain
conditions).
The Republic Act 10175: Anti-Cybercrime
Law
6. Cyber-squatting: The acquisition of
a domain name over the internet in
bad faith to profit, mislead, destroy
reputation, and deprive others from
registering the same (with
conditions).
7. Computer-related Forgery: is the
intention of the violator to input,
alter, or erase any computer data
without permission resulting to
inauthenticity of the data involved.
The Republic Act 10175: Anti-Cybercrime
Law

8. Computer-related Fraud: is also


an intention to input, alter or erase
particularly the data or program to
function in different ways other
than the intended result which
might cause damage to the
company/individual and with the
intent of personal gains.
The Republic Act 10175: Anti-Cybercrime
Law

9. Computer-related Identity
Theft: The intentional acquisition,
use, misuse, transfer, possession,
alteration or deletion of identifying
information belonging to another,
whether natural or juridical,
without right (with condition).
The Republic Act 10175: Anti-Cybercrime
Law

10. Cybersex: The willful


engagement, maintenance,
control, or operation, directly or
indirectly, of any lascivious
exhibition of sexual organs or
sexual activity, with the aid of a
computer system, for favor or
consideration.
The Republic Act 10175: Anti-Cybercrime
Law

11.Child Pornography: The


unlawful or prohibited acts
defined and punishable by
Republic Act No. 9775 or the Anti-
Child Pornography Act of 2009,
committed through a computer
system (with conditions).
The Republic Act 10175: Anti-Cybercrime
Law

12. Unsolicited Commercial


Communications: The
transmission of commercial
electronic communication with
the use of computer system
which seek to advertise, sell, or
offer for sale products and
services are prohibited (with
conditions).
The Republic Act 10175: Anti-Cybercrime
Law

13.Libel: The unlawful or prohibited


acts of libel as defined in Article
355 of the Revised Penal Code, as
amended, committed through a
computer system or any other
similar means which may be
devised in the future.
END OF LESSON
DISCUSSION

You might also like