0% found this document useful (0 votes)
81 views21 pages

Cyber Frauds and Crimes

The document discusses computer fraud and cybercrimes. It defines cybercrime as using a computer to commit a crime. Common types of cybercrimes discussed include hacking, phishing, ransomware, credit card fraud, digital piracy, identity theft, distributed denial of service attacks, social engineering, Trojan horses, cyber harassment including cyberbullying and cyberstalking, cyber defamation, cybersex, child pornography, 419 scams, computer intrusion, and illegal downloading. The document also provides tips on how to prevent cybercrimes including backing up data, getting malware protection, using strong passwords, protecting smartphones, reviewing data, being wary of phishers, taking insurance, planning for emergencies, training

Uploaded by

jhonny mercado
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views21 pages

Cyber Frauds and Crimes

The document discusses computer fraud and cybercrimes. It defines cybercrime as using a computer to commit a crime. Common types of cybercrimes discussed include hacking, phishing, ransomware, credit card fraud, digital piracy, identity theft, distributed denial of service attacks, social engineering, Trojan horses, cyber harassment including cyberbullying and cyberstalking, cyber defamation, cybersex, child pornography, 419 scams, computer intrusion, and illegal downloading. The document also provides tips on how to prevent cybercrimes including backing up data, getting malware protection, using strong passwords, protecting smartphones, reviewing data, being wary of phishers, taking insurance, planning for emergencies, training

Uploaded by

jhonny mercado
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

File Edit View

About Us

Cover
Presentation by Group 1

COMPUTER
Contents

AND
FRAUD
11- STEM 1

Page 01
File Edit View

OBJECTIVES :
a. Understand what is cybercrimes.

b. Know the common computer


fraud and crimes.

c. Identify different types of Cybercrime


and how to prevent it.

Page 02
File Edit View

Introduction:
The advancement of ICT technologies have opened a vast
opportunity for everyone, young and adult to use cheaper
mobile gadgets and portable computers with great features.
This has created what we call the online community.

An online community is a community that is formed on

the internet where a group of people are interacting,

sharing, and working towards a common goal. In an

online community, members interact via social networks.

Page 03
File Edit View

Internet security refers to computer security specifically

related to the internet, often involving browser security but

also network security on a more general level as it applies

to other applications or other operating systems on a

whole. Its objective is to establish rules and measures to


Computer Fraud uses computers, the
use against attacks over internet.
internet, internet devices and internet

services to deceive people, companies, or


government agencies of money, revenue, or

internet access.

Page 04

File Edit View

Definition :
Cybercrime refers to the use of a computer to
commit a crime. As a criminal activity, it began
when hackers started illegally accessing high-
level computer networks.

Page 05
File Edit View

COMMON
TYPES OF
COMPUTER FRAUD
CYBERCRIMES
AND CYBERCRIMES

HOW TO PREVENT
CYBER CRIME LAW
CYBER CRIMES

Page 06
File Edit View

Hacking- refers to the practice of modifying or altering


computer software and hardware to accomplish a goal that is
considered to be outside of the creator's original objective.

Phishing – is the attempt to obtain sensitive information such as usernames,


passwords, and credit card details (and, indirectly, money), often for malicious
reasons, by disguising as a trustworthy entity in an electronic communication

Page 07
File Edit View

Ransomware – a type of malicious software designed to block


access to a computer system until a sum of money is paid.

Credit Card Fraud - credit card fraud is the unauthorized use of a credit
or debit card, or similar payment tool (ACH, EFT, recurring charge, etc.),
to fraudulently obtain money or property.

Page 08
File Edit View

Digital Piracy – refers to the practice of illegally copying and


selling digital music, video, computer software, etc.

Identity Theft - is the deliberate use of someone else's identity, usually as a method to
gain a financial advantage or obtain credit and other benefits in the other person's
name, and perhaps to the other person's disadvantage or loss.

Page 09
File Edit View

COMMON
TYPES OF
COMPUTER FRAUD
CYBERCRIMES
AND CYBERCRIMES

HOW TO PREVENT
CYBER CRIME LAW
CYBER CRIMES

Page 10
File Edit View

Types of
Cybercrimes
Page 11
File Edit View

Distributed Denial of Services (DDoS) – is one in which a multitude of


compromised systems attack a single target, thereby causing denial of service
for users of the targeted system.

Social Engineering – the art of manipulating people so they give


up confidential information.

Trojan Horse – a booby trap in the form of an email attachment. If you download the
attachment, it unleashes a virus on your computer. The virus may wipe files from the
system and suck up personal data for identity thieves.

Page 12
File Edit View

Cyber-Harassment – can be Cyberstalking and Cyberbullying. These are not


about stealing money or identities. They are personal attacks, targeting
someone online just as some bullies and stalkers target victims offline.

Cyberbullying - is the use of technology to torment, threaten, harass or embarrass


another person using the internet or other technologies such as posting embarrassing
pictures on social media or sending hurtful or threatening text messages.

Cyberstalking – a crime using the internet, email, or other types of electronic communications to
stalk, harass, or threaten another person. It often involves harassing emails, instant or text messages,
or social media posts, or creating websites for the sole purpose of tormenting the victim.

Page 13
File Edit View

Cyber Defamation – is an unprivileged false statement of fact which tends to harm the reputation
of a person or company

Two types of Defamation:


Slander – Verbal Libel – Written

Cybersex – is a virtual sex encounter in which two or more people (connected


remotely via internet) send each other sexually explicit contents or sexually
explicit acts

Child Pornography – is a form of child sexual exploitation

Page 14
File Edit View

419 Scam – is named for a section of the Nigerian legal code,


because it often involves emails sent from Nigeria.

Intrusion – a computer system is compromised by breaking the security of such a


system or causing it to enter into an insecure state or other users can gain
unauthorized access to a system. The system data are accessed without permission.

Illegal Downloading – refers to obtaining files that you do


not have the right to use from the Internet.

Page 15
File Edit View

COMMON
TYPES OF
COMPUTER FRAUD
CYBERCRIMES
AND CYBERCRIMES

HOW TO PREVENT
CYBER CRIME LAW
CYBER CRIMES

Page 16
File Edit View

10 Ways to Prevent Cyber Crime


Back up data
Train your staff
Get protection against malware
Be smart with passwords Protect the smartphones

Review your data Get Certified


Beware of Phishers (International standard of
cybersecurity ISO/IEC
Take an insurance
27032:2012)
Always plan for an emergency
Page 17
File Edit View

COMMON
TYPES OF
COMPUTER FRAUD
CYBERCRIMES
AND CYBERCRIMES

HOW TO PREVENT
CYBER CRIME LAW
CYBER CRIMES

Page 18
File Edit View

Republic Act No. 10175 – Cybercrime prevention act of 2012,signed by


former President Mr. Benigno Aquino III on September 12 2012.Aims
to address legal issues concerning online interactions and internet.

Cyberspace – refers to the virtual


Cyber– means relating to, or computer world, and more Cybercrime – refers to the

involving computer or specifically, is an electronic criminal activities carried out


medium used to form a global by means of computers or
computer network.
computer network to facilitate the internet.

online communication.

Page 19
File Edit View

What is the Give at least 2


meaning common Give one type of
of an online computer fraud cybercrime.
community? and crime.

What are the


ways to prevent Who authored RA
cybercrime? Give 10175 and When
at least 2. was it signed?

Questions Page 20
File Edit View

Members :

Thank You
Irison, Ronalyn R.

de Roxas, Jazzmhyn Marie C.


See You Next Time Necosia, Leia Jhazmine G.

Sanchez, Ma. Jinelle P.

Sanoy, Wyona Ryza A.

Page 21

You might also like