You are on page 1of 59

the modern menace

Cybercrime
modern menace Information Technology Group

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Cybercrime
What is Cybercrime? Any criminal act dealing with computers and networks traditional crimes conducted through the internet

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Cybercrime
The Constitution. Bill of Rights, Article III Art. 3. Ignorance of Law excuses no one from compliance therewith(Civil Code).

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Cybercrime
Most common types: HACKING SOFTWARE PIRACY EMBEZZLEMENT CYBER STALKING SPAM CHILD ABUSE (Pornography)
Cybercrime - School of Information Technology, University of Baguio

4/14/2012

Hacking
Cybercrime - School of Information Technology, University of Baguio

Hacking
What is Hacking? modification of a program or device to give the user access to features that were otherwise unavailable, such as by circuit bending.
4/14/2012 Cybercrime - School of Information Technology, University of Baguio

Hacking
What is Hacking? illegal intrusion into a computer system and/network to break into other people's computer

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Hacking
Hacker once used to describe a clever programmer highly skilled computer gurus talented computer programmers

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Hacking
First Hacking The first case of hacking occurred in the 1960s when a group of students at the Massachusetts Institute of Technology (MIT) tried to access the school's main computing systems.

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Hacking
Functions view private information data alteration steal files, information or programs destroy exploitation gain unauthorized access
Cybercrime - School of Information Technology, University of Baguio

4/14/2012

Hacking
Typically looking for: keywords passwords credit card information other rare and confidential information

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Hacking
Often target message boards software applications email accounts bank accounts

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Hacking
Types Hacktivist - uses his hacker skills in order to broadcast a political message on the Internet Cyberterrorist Cracker breaks passwords/PIN

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Hacking
Ethical Hacking act of hacking for a reasonable cause licenced hackers; hacking in order to trace a criminal another hacker

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Malicious Codes
Cybercrime - School of Information Technology, University of Baguio

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Malicious Codes
Types
Virus Worm Logic Bomb Trojan Horse

part of another program

an independent program

a program camouflaged that attaches as part of a itself to legitimate Operating program Systems or to other programs.

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Malicious Codes
The Idea of Virus vs. Worm
Virus Computer virus depends on a specific file, data or information before it can function. Spread by sharing, inserting or executing Worm Computer worm is an independent program which can duplicate or spread on its own It can penetrate even if the users do not copy it

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Malicious Codes
Examples of Computer Virus FU virus Clung Virus Autorun Recycler
4/14/2012

Code Red Virus Melissa Virus MyDoom Virus Anna Kournikova Virus

Cybercrime - School of Information Technology, University of Baguio

Malicious Codes
Onel de Guzman
Author and trigger of the I Love You Virus

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Software Piracy
Cybercrime - School of Information Technology, University of Baguio

Software Piracy
Piracy the unauthorized copying /duplication of computer software.

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Software Piracy
Types of Software Piracy: 1. 2. 3. 4. 5. Soft lifting Software counterfeiting OEM unbundling Hard disk loading Renting
Cybercrime - School of Information Technology, University of Baguio

4/14/2012

Software Piracy
How to know if your copy is not GENUINE? The price is too good to be true (low price). The program is on a compilation CD-ROM that is, a CD-ROM containing a large number of programs, from a variety of different software developers. The CD-ROM is of gold color.
4/14/2012 Cybercrime - School of Information Technology, University of Baguio

Software Piracy
How to know if your copy is not GENUINE? The product is being sold in only a shrinkwrapped plastic CD-ROM case. There is no retail packaging. You do not receive a license agreement, registration card or manuals with the program.
4/14/2012 Cybercrime - School of Information Technology, University of Baguio

Software Piracy
Copyright Provisions Under Intellectual Property Rights Law (R.A 8293)

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Software Piracy
Copyright and Related Offenses 1. Any person who shall reproduce and distribute, by means of a computer system, of any works, items or equivalent creations protected by the copyright, where such arts are committed for commercial purposes.

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Software Piracy
Copyright and Related Offenses 2. Any person who shall cause others to believe that what has been created is his work And shall profit from the same.

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Software Piracy
Penalties (first offense) Imprisonment of 1 year to 3 years plus a fine ranging from P50,000 to P150,000.

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Software Piracy
Penalties (2nd offense) Imprisonment of 3 years and 1 day to 6 years Plus a fine ranging from P150,000 to P500,000.

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Software Piracy
Penalties (3rd offense to subsequent offenses) Imprisonment of 6 yrs. and 1day to 9 years plus a fine ranging from P500,000 to P1.5 million.

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Embezzlement
Cybercrime - School of Information Technology, University of Baguio

Embezzlement
Internet Fraud Defrauding people of money or valuables is a common purpose of fraud. an attempt by a person or a group of people to trick or scam someone else using the Internet.
4/14/2012 Cybercrime - School of Information Technology, University of Baguio

Cyber Stalking
Cybercrime - School of Information Technology, University of Baguio

Cyber Stalking
Forms harassment, embarrassment and humiliation of the victim emptying bank accounts or other economic control such as ruining the victim's credit score

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Cyber Stalking
Forms harassing family, friends and employers to isolate the victim scare tactics to instil fear and more.

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Cyber Stalking
Forms is a crime in which the attacker harasses a victim using electronic communication, such as E-mail or Instant Messaging (IM), is the use of the internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization.
4/14/2012 Cybercrime - School of Information Technology, University of Baguio

Cyber Stalking
Objective: A true cyber stalkers intent is to harm their intended victim using the anonymity and untraceable distance of technology.

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Cyber Stalking
Preventative Guideline: There are a number of simple ways to guard against cyber stalking. One of the most useful precautions is to stay anonymous yourself, rather than having an identifiable online presence.

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Cyber Stalking
Stalkers motivation: Sexual Harassment Obsession for love Revenge and Hate Ego and Power Trips Money
Cybercrime - School of Information Technology, University of Baguio

4/14/2012

Spam
Cybercrime - School of Information Technology, University of Baguio

Spam
Spam Or the unsolicited sending of bulk email for commercial purposes is unlawful to varying degrees. Is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services?
4/14/2012 Cybercrime - School of Information Technology, University of Baguio

Spam
Two main types of Spam: Cancellable Usenet spam - is a single message sent to 20 or more Usenet newsgroups. E-mail spam - targets individual users with direct mail messages. Typically cost users money out-of-pocket to receive.
4/14/2012 Cybercrime - School of Information Technology, University of Baguio

Spam
Spam Prevention: Never use the reply or remove option at the bottom of spam messages. Install anti-spam software on your PC or laptop and should filter out any unwanted emails.

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Spam
Spam Prevention: Avoid using catch all or generic email accounts. Hide your email address from your website. This technique will slow down and hopefully prevent email harvesters from gaining your email addresses from your website.
4/14/2012 Cybercrime - School of Information Technology, University of Baguio

Internet Pornography
Cybercrime - School of Information Technology, University of Baguio

Internet Pornography
Pornography that is distributed by means of various sectors of the internet, primarily via websites, peerto-peer sharing Or Usenet newsgroups

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Internet Pornography
TGP (Thumbnail gallery post)list of small pictures called thumbnails linked to galleries Usenet- Commercial software and websites are available that allow browsing the images or videos on newsgroups, sometimes with galleries of thumbnail images. Peer-to-peer- Many commercial sites have recognized this trend and have begun distributing free samples of their content on peer-to-peer networks.
Image files Video files and streaming video Webcams

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Internet Pornography
It consists of photographs, videotapes, magazines, books, and films that depict children in sex acts, all of which are illegal.

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Internet Pornography
REPUBLIC ACT 9208 SECTION 1. Title. This Act shall be known as the Anti-Trafficking in Persons Act of 2003. The Communications Decency Act (CDA) Child Online Protection Act (COPA) Childrens Internet Protection Act (CIPA
4/14/2012 Cybercrime - School of Information Technology, University of Baguio

Internet Pornography
Pertinent Provisions of Anti-Child Abuse Law(R.A. 7610)

Sec. 9 Obscene Publications and Indecent Shows.

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

Child Abuse (Pornography)


Sec. 9 Obscene Publications and Indecent Shows. Any person who shall hire, employ, use, persuade, induce, coerce a child to perform in obscene exhibitions and indecent shows, whether live or in video, or model in obscene publications or pornographic materials or to sell or distribute the said materials shall suffer the penalty of provision major in its medium. If the child use as a performer, subject or seller/distributor is below twelve years of age, the penalty shall be imposed in its maximum period.
4/14/2012 Cybercrime - School of Information Technology, University of Baguio

Philippine Legislations on Computer Crimes


Cybercrime - School of Information Technology, University of Baguio

Philippine Legislations on Computer Crimes

Anti-Hacking Provisions Under E-Commerce Act (R.A. 8792) Intellectual Property Code of the Philippines.
Intellectual Property Rights in the Philippines This permission is given in the form of a license.

Optical Media Act (R.A.9239)

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

LAWS governing Computer Crimes


Related Provisions of the Revised Penal Code: - Art. 353. Libel - Art. 292. Revelation of Secret Access Device Regulation Act (R.A. 8484) Antitrust Law Right of Privacy

4/14/2012

Cybercrime - School of Information Technology, University of Baguio

the modern menace

You might also like