Netiquite & Computer Ethics Module 4
Netiquite & Computer Ethics Module 4
Netiquite & Computer Ethics Module 4
B. PLAGIARISM
AN ACT OR INSTANCE OF USING OR CLOSELY IMITATING THE
LANGUAGE AND THOUGHTS OF ANOTHER AUTHOR WITHOUT
AUTHORIZATION.
C. COMPUTER ADDICTION
• OFFLINE: GENERALLY USED WHEN SPEAKING ABOUT EXCESSIVE GAMING
BEHAVIOR, WHICH CAN BE PRACTICED BOTH OFFLINE AND ONLINE.
• ONLINE: ALSO KNOWN AS “INTERNET ADDICTION”, GETS MORE ATTENTION IN
GENERAL FROM SCIENTIFIC RESEARCH THAN OFFLINE COMPUTER ADDICTION,
MAINLY BECAUSE MOST CASES OF COMPUTER ADDICTION ARE RELATED TO THE
EXCESSIVE USE OF THE INTERNET. *VIRTUAL SELF -THE PERSONA YOU CREATE
ABOUT YOURSELF VIRTUALLY.
CRIMINAL ACTIVITIES
A. HACKING
• UNAUTHORIZED ACCESS OF OR INTERFERENCE WITH COMPUTER SYSTEMS,
SERVERS, OR OTHER INFORMATION AND COMMUNICATION SYSTEMS
• UNAUTHORIZED ACCESS TO CORRUPT, ALTER, STEAL, OR DESTROY ELECTRONIC
DATA USING COMPUTERS OR OTHER INFORMATION AND COMMUNICATION SYSTEMS
WITHOUT THE COMPUTER OR SYSTEM OWNER’S KNOWLEDGE AND CONSENT
• THE INTRODUCTION OF COMPUTER VIRUSES RESULTING IN THE CORRUPTION,
ALTERATION, THEFT, OR LOSS OF SUCH DATA
CYBERCRIMES
B. COMPUTER-RELATED FORGERY, FRAUD AND/OR IDENTITY THEFT
• AN ATTEMPT TO OBTAIN SENSITIVE INFORMATION SUCH AS
USERNAMES, PASSWORDS, AND CREDIT CARD DETAILS AND
(INDIRECTLY MONEY), OFTEN FOR MALICIOUS REASONS.
• PHISHING
• PHARMING
• SPAM
• MAXIMUM OF PHP 200,000 FINE OR PRISON MAYOR
C. ELECTRONIC THEFT
• ILLEGAL DOWNLOADING
• OBTAINING FILES THAT YOU DO NOT HAVE THE RIGHT TO USE
FROM THE INTERNET.
• DIGITAL PIRACY
• PRACTICE OF ILLEGALLY COPYING AND SELLING DIGITAL MUSIC,
VIDEO, COMPUTER SOFTWARE, ETC.
• COPYRIGHT INFRINGEMENT
• PENALTY OF PHP 50,000 – 500, 000 AND OR PRISON MAYOR
D. CYBERBULLYING
• THE USE OF ELECTRONIC COMMUNICATION TO BULLY A
PERSON, TYPICALLY BY SENDING A MESSAGE OF AN
INTIMIDATING OR THREATENING NATURE.
• THE ANTI-BULLYING ACT OF 2013 (RA 10627)
E. CYBERSEX
• WILLFUL ENGAGEMENT, MAINTENANCE, CONTROL, OR
OPERATION, DIRECTLY OR INDIRECTLY OF ANY LASCIVIOUS
EXHIBITION OF SEXUAL ORGANS OR SEXUAL ACTIVITY WITH THE
AID OF A COMPUTER SYSTEM FOR FAVOR OR CONSIDERATION.
• THERE IS A DISCUSSION ON THIS MATTER IF IT INVOLVES
“COUPLES” OR “PEOPLE IN RELATIONSHIP” WHO ENGAGE IN
CYBERSEX.
• PENALTY AT LEAST PHP 200,000 AND OR PRISON MAYOR
CYBERCRIMES
F. CHILD PORNOGRAPHY
• IS A FORM OF CHILD SEXUAL EXPLOITATION.
• UNLAWFUL OR PROHIBITED ACTS DEFINED AND PUNISHABLE
BY REPUBLIC ACT NO. 9775 OR THE ANTICHILD PORNOGRAPHY
ACT OF 2009, COMMITTED THROUGH A COMPUTER SYSTEM.
• PENALTY OF 12-20 YEARS OF IMPRISONMENT OR RECLUSION
TEMPORAL
G. CYBER DEFAMATION
• IS AN UNPRIVILEGED FALSE STATEMENT OF FACT WHICH TENDS
TO HARM THE REPUTATION OF A PERSON OR COMPANY.
• PENALTY OF 6-12 YEARS OF IMPRISONMENT OR PRISON MAYOR.
INTERNET THREATS
● HACKING
HACKING IS A TERM USED TO DESCRIBE ACTIONS TAKEN BY
SOMEONE TO GAIN UNAUTHORIZED ACCESS TO A COMPUTER. THE
AVAILABILITY OF INFORMATION ONLINE ON THE TOOLS,
TECHNIQUES, AND MALWARE MAKES IT EASIER FOR EVEN NON-
TECHNICAL PEOPLE TO UNDERTAKE MALICIOUS ACTIVITIES. THE
PROCESS BY WHICH CYBER CRIMINALS GAIN ACCESS TO YOUR
COMPUTER.
● MALWARE
MALWARE IS ONE OF THE MORE COMMON WAYS TO INFILTRATE OR
DAMAGE YOUR COMPUTER. MALICIOUS SOFTWARE THAT INFECTS
YOUR COMPUTER, SUCH AS COMPUTER VIRUSES, WORMS, TROJAN
HORSES, SPYWARE, AND ADWARE.
● PHARMING
PHARMING IS A COMMON TYPE OF ONLINE FRAUD. A MEANS TO
● PHISHING
PHISHING IS USED MOST OFTEN BY CYBER CRIMINALS BECAUSE IT'S EASY TO
EXECUTE AND CAN PRODUCE THE RESULTS THEY'RE LOOKING FOR WITH VERY
LITTLE EFFORT. FAKE EMAILS, TEXT MESSAGES AND WEBSITES CREATED TO LOOK
LIKE THEY'RE FROM AUTHENTIC COMPANIES. THEY'RE SENT BY CRIMINALS TO STEAL
PERSONAL AND FINANCIAL INFORMATION FROM YOU. THIS IS ALSO KNOWN AS
“SPOOFING”.
● RANSOMWARE
RANSOMWARE IS A TYPE OF MALWARE THAT RESTRICTS ACCESS TO YOUR
COMPUTER OR YOUR FILES AND DISPLAYS A MESSAGE THAT DEMANDS PAYMENT IN
ORDER FOR THE RESTRICTION TO BE REMOVED. THE TWO MOST COMMON MEANS
OF INFECTION APPEAR TO BE PHISHING EMAILS THAT CONTAIN MALICIOUS
ATTACHMENTS AND WEBSITE POP-UP ADVERTISEMENTS.
● SPAM
SPAM IS ONE OF THE MORE COMMON METHODS OF BOTH SENDING INFORMATION
OUT AND COLLECTING IT FROM UNSUSPECTING PEOPLE. THE MASS DISTRIBUTION
OF UNSOLICITED MESSAGES, ADVERTISING OR PORNOGRAPHY TO ADDRESSES
WHICH CAN BE EASILY FOUND ON THE INTERNET THROUGH THINGS LIKE SOCIAL
NETWORKING SITES, COMPANY WEBSITES AND PERSONAL BLOGS.
INTERNET
●
THREATS
SPYWARE (SPYWARE & ADWARE)
SPYWARE AND ADWARE ARE OFTEN USED BY THIRD PARTIES TO
INFILTRATE YOUR COMPUTER.
WHAT IT IS:
SOFTWARE THAT COLLECTS PERSONAL INFORMATION ABOUT
YOU WITHOUT YOU KNOWING. THEY OFTEN COME IN THE
FORM OF A ‘FREE' DOWNLOAD AND ARE INSTALLED
AUTOMATICALLY WITH OR WITHOUT YOUR CONSENT. THESE
ARE DIFFICULT TO REMOVE AND CAN INFECT YOUR
COMPUTER WITH VIRUSES.
● TROJAN HORSES
A TROJAN HORSE MAY NOT BE A TERM YOU'RE FAMILIAR WITH, BUT
THERE'S A GOOD CHANCE YOU OR SOMEONE YOU KNOW HAS
BEEN AFFECTED BY ONE. A MALICIOUS PROGRAM THAT IS
DISGUISED AS, OR EMBEDDED WITHIN, LEGITIMATE SOFTWARE. IT
IS AN EXECUTABLE FILE THAT WILL INSTALL ITSELF AND RUN
INTERNET
● VIRUSES
THREATS
MOST PEOPLE HAVE HEARD OF COMPUTER VIRUSES, BUT
NOT MANY KNOW EXACTLY WHAT THEY ARE OR WHAT THEY
DO. MALICIOUS COMPUTER PROGRAMS THAT ARE OFTEN
SENT AS AN EMAIL ATTACHMENT OR A DOWNLOAD WITH
THE INTENT OF INFECTING YOUR COMPUTER, AS WELL AS
THE COMPUTERS OF EVERYONE IN YOUR CONTACT LIST. JUST
VISITING A SITE CAN START AN AUTOMATIC DOWNLOAD OF A
VIRUS.
● WI-FI EAVESDROPPING
WIFI EAVESDROPPING IS ANOTHER METHOD USED BY CYBER
CRIMINALS TO CAPTURE PERSONAL INFORMATION. VIRTUAL
“LISTENING IN” ON INFORMATION THAT'S SHARED OVER AN
● WORMS
WORMS ARE A COMMON THREAT TO COMPUTERS AND THE
INTERNET AS A WHOLE. A WORM, UNLIKE A VIRUS, GOES TO
WORK ON ITS OWN WITHOUT ATTACHING ITSELF TO FILES OR
PROGRAMS. IT LIVES IN YOUR COMPUTER MEMORY, DOESN'T
DAMAGE OR ALTER THE HARD DRIVE AND PROPAGATES BY
SENDING ITSELF TO OTHER COMPUTERS IN A NETWORK –
WHETHER WITHIN A COMPANY OR THE INTERNET OTSELF.
THANKS!