File Edit View
About Us
Cover
Presentation by Group 1
COMPUTER
Contents
AND
FRAUD
11- STEM 1
Page 01
File Edit View
OBJECTIVES :
a. Understand what is cybercrimes.
b. Know the common computer
fraud and crimes.
c. Identify different types of Cybercrime
and how to prevent it.
Page 02
File Edit View
Introduction:
The advancement of ICT technologies have opened a vast
opportunity for everyone, young and adult to use cheaper
mobile gadgets and portable computers with great features.
This has created what we call the online community.
An online community is a community that is formed on
the internet where a group of people are interacting,
sharing, and working towards a common goal. In an
online community, members interact via social networks.
Page 03
File Edit View
Internet security refers to computer security specifically
related to the internet, often involving browser security but
also network security on a more general level as it applies
to other applications or other operating systems on a
whole. Its objective is to establish rules and measures to
Computer Fraud uses computers, the
use against attacks over internet.
internet, internet devices and internet
services to deceive people, companies, or
government agencies of money, revenue, or
internet access.
Page 04
File Edit View
Definition :
Cybercrime refers to the use of a computer to
commit a crime. As a criminal activity, it began
when hackers started illegally accessing high-
level computer networks.
Page 05
File Edit View
COMMON
TYPES OF
COMPUTER FRAUD
CYBERCRIMES
AND CYBERCRIMES
HOW TO PREVENT
CYBER CRIME LAW
CYBER CRIMES
Page 06
File Edit View
Hacking- refers to the practice of modifying or altering
computer software and hardware to accomplish a goal that is
considered to be outside of the creator's original objective.
Phishing – is the attempt to obtain sensitive information such as usernames,
passwords, and credit card details (and, indirectly, money), often for malicious
reasons, by disguising as a trustworthy entity in an electronic communication
Page 07
File Edit View
Ransomware – a type of malicious software designed to block
access to a computer system until a sum of money is paid.
Credit Card Fraud - credit card fraud is the unauthorized use of a credit
or debit card, or similar payment tool (ACH, EFT, recurring charge, etc.),
to fraudulently obtain money or property.
Page 08
File Edit View
Digital Piracy – refers to the practice of illegally copying and
selling digital music, video, computer software, etc.
Identity Theft - is the deliberate use of someone else's identity, usually as a method to
gain a financial advantage or obtain credit and other benefits in the other person's
name, and perhaps to the other person's disadvantage or loss.
Page 09
File Edit View
COMMON
TYPES OF
COMPUTER FRAUD
CYBERCRIMES
AND CYBERCRIMES
HOW TO PREVENT
CYBER CRIME LAW
CYBER CRIMES
Page 10
File Edit View
Types of
Cybercrimes
Page 11
File Edit View
Distributed Denial of Services (DDoS) – is one in which a multitude of
compromised systems attack a single target, thereby causing denial of service
for users of the targeted system.
Social Engineering – the art of manipulating people so they give
up confidential information.
Trojan Horse – a booby trap in the form of an email attachment. If you download the
attachment, it unleashes a virus on your computer. The virus may wipe files from the
system and suck up personal data for identity thieves.
Page 12
File Edit View
Cyber-Harassment – can be Cyberstalking and Cyberbullying. These are not
about stealing money or identities. They are personal attacks, targeting
someone online just as some bullies and stalkers target victims offline.
Cyberbullying - is the use of technology to torment, threaten, harass or embarrass
another person using the internet or other technologies such as posting embarrassing
pictures on social media or sending hurtful or threatening text messages.
Cyberstalking – a crime using the internet, email, or other types of electronic communications to
stalk, harass, or threaten another person. It often involves harassing emails, instant or text messages,
or social media posts, or creating websites for the sole purpose of tormenting the victim.
Page 13
File Edit View
Cyber Defamation – is an unprivileged false statement of fact which tends to harm the reputation
of a person or company
Two types of Defamation:
Slander – Verbal Libel – Written
Cybersex – is a virtual sex encounter in which two or more people (connected
remotely via internet) send each other sexually explicit contents or sexually
explicit acts
Child Pornography – is a form of child sexual exploitation
Page 14
File Edit View
419 Scam – is named for a section of the Nigerian legal code,
because it often involves emails sent from Nigeria.
Intrusion – a computer system is compromised by breaking the security of such a
system or causing it to enter into an insecure state or other users can gain
unauthorized access to a system. The system data are accessed without permission.
Illegal Downloading – refers to obtaining files that you do
not have the right to use from the Internet.
Page 15
File Edit View
COMMON
TYPES OF
COMPUTER FRAUD
CYBERCRIMES
AND CYBERCRIMES
HOW TO PREVENT
CYBER CRIME LAW
CYBER CRIMES
Page 16
File Edit View
10 Ways to Prevent Cyber Crime
Back up data
Train your staff
Get protection against malware
Be smart with passwords Protect the smartphones
Review your data Get Certified
Beware of Phishers (International standard of
cybersecurity ISO/IEC
Take an insurance
27032:2012)
Always plan for an emergency
Page 17
File Edit View
COMMON
TYPES OF
COMPUTER FRAUD
CYBERCRIMES
AND CYBERCRIMES
HOW TO PREVENT
CYBER CRIME LAW
CYBER CRIMES
Page 18
File Edit View
Republic Act No. 10175 – Cybercrime prevention act of 2012,signed by
former President Mr. Benigno Aquino III on September 12 2012.Aims
to address legal issues concerning online interactions and internet.
Cyberspace – refers to the virtual
Cyber– means relating to, or computer world, and more Cybercrime – refers to the
involving computer or specifically, is an electronic criminal activities carried out
medium used to form a global by means of computers or
computer network.
computer network to facilitate the internet.
online communication.
Page 19
File Edit View
What is the Give at least 2
meaning common Give one type of
of an online computer fraud cybercrime.
community? and crime.
What are the
ways to prevent Who authored RA
cybercrime? Give 10175 and When
at least 2. was it signed?
Questions Page 20
File Edit View
Members :
Thank You
Irison, Ronalyn R.
de Roxas, Jazzmhyn Marie C.
See You Next Time Necosia, Leia Jhazmine G.
Sanchez, Ma. Jinelle P.
Sanoy, Wyona Ryza A.
Page 21