Lesson 4 Cyber Ethics
Lesson 4 Cyber Ethics
Lesson 4 Cyber Ethics
Plagiarism
An act or instance of using or closely imitating the
language and thoughts of another author without
authorization.
COMMON FORMS OF CYBERCRIMES:
Computer Addiction
• Offline: generally used when speaking about excessive
gaming behavior, which can be practiced both offline and
online.
Hacking
• Unauthorized access of or interference with computer
systems, servers, or other information and communication
systems
• Unauthorized access to corrupt, alter, steal, or destroy
electronic data using computers or other information and
communication systems without the computer or system
owner’s knowledge and consent
• The introduction of computer viruses resulting in the
corruption, alteration, theft, or loss of such data
CRIMINAL ACTIVITIES
Hacking
• Illegal Interception
• Data Interference
• System Interference
• Misuse of Devices
• Infection of IT Systems with Malware – if the act is
committed against critical infrastructure of the Philippines
the, penalty is between 12-20 years reclusion temporal
• Six years up to twelve years of imprisonment also known
as prison mayor.
CRIMINAL ACTIVITIES
a. Electronic theft
• Illegal Downloading
• Obtaining files that you do not have the right to use
from the internet.
• Digital Piracy
• Practice of illegally copying and selling digital music,
video, computer software, etc.
• Copyright Infringement
• Penalty of Php 50,000 – 500, 000 and or prison mayor
CRIMINAL ACTIVITIES
a. Cyberbullying
• The use of electronic
communication to bully a
person, typically by sending a
message of an intimidating or
threatening nature.
• The Anti-Bullying Act of 2013
(RA 10627)
CRIMINAL ACTIVITIES
a. Cybersex
• Willful engagement, maintenance, control, or operation,
directly or indirectly of any lascivious exhibition of sexual
organs or sexual activity with the aid of a computer
system for favor or consideration.
• There is a discussion on this matter if it involves
“couples” or “people in relationship” who engage in
cybersex.
• Penalty at least Php 200,000 and or prison mayor
CRIMINAL ACTIVITIES
a. Child Pornography
WiFi eavesdropping is
another method used by
cyber criminals to capture
personal information.
Virtual “listening in” on
information that's shared
over an unsecure (not encrypted) WiFi network.
What it can do:
•Potentially access your computer with the right equipment.
•Steal your personal information including logins and
passwords
Worms
Worms are a common threat to
computers and the Internet as a
whole.
A worm, unlike a virus, goes to work
on its own without attaching itself to
files or programs.
What they can do:
• Spread to everyone in your contact
list.
• Cause a tremendous amount of
damage by shutting down parts of the
Internet, wreaking havoc on an
internal network and costing
companies’ enormous amounts of lost
revenue.