SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Data
Protection
Security
and
OBJECTIVES
At the end of the lesson, you should be able to :
1. Understand what cybersecurity is;
2. Understand what cybercrime is;
3. Identify the different types of malicious software; and
4. Know how to secure your information and protect yourself.
CYBERSECURITY
Republic Act No. 10175: Cybercrime Prevention
Act of 2012
• Cybersecurity is the collection of tools, policies, actions, practices, and
technologies that can be used to protect the cyber environment.
• Cyber – any computer or computer network, the medium in which
online communication occurs. This law also specifies that a computer is
an electronic, magnetic, electrochemical, or other data processing or
communications device that is capable of performing logical, arithmetic,
routing, or storage functions and which includes storage facility or
communications facility that is directly related to the device.
• Computer System – is any device or group of interconnected or related
devices that performs automated processing of data.
• Information security – or data security is the preservation of
information or computer data’s confidentiality, integrity, and availability.
Republic Act No. 10175: Cybercrime
Prevention Act of 2012 –continuation.
• Cybercrimes can be committed with the use of cell
phones, social media, and other platforms.
• With these definitions, smartphones and other types of
mobile phones are also considered as computers and
computer systems that are also part of the cyber
environment. On the other hand, calculators, while they
are considered as computers in other uses, may not fit in
this definition because they do not carry a storage facility or
communications facility.
Cybercrime or Computer Crime
Cybercrime – is an
offense against the
confidentiality, integrity,
and availability of
information or computer
data.
The following is a
list of
cybercrimes:
L I B E L
This is the act of publishing
false statements with the
use of computers or
computer systems. An
example of this cybercrime
includes defamatory false
statements posted on social
media.
Illegal Access
This is the access to a computer
system without right. For
example, it is considered illegal
access for someone to take your
phone without your permission
and read the contents of your
private messages. Another
example would be someone
accessing your personal computer
without your permission.
Data Interference
This is the intended
alteration, damaging,
deleting, or deteriorating of
computer data, electronic
document, or electronic data
message without authority.
Illegal Interception
This is the obstruction from by technical means
without right of any non-public transmission of
computer data to, from, or within a computer
system including electromagnetic emissions
from a computer system carrying such
computer data. An example of illegal
interception is when your emails, text messages,
or chats are monitored with the use of software
without your knowledge or permission.
This is the purposeful alteration or reckless
hindering or interference with the
functioning of a computer or computer
network. This is done when someone
inputs, transmits, damages, deletes, alters,
deteriorates, or suppresses computer data
or program, electronic document, or
electronic data message without authority
System Interference
This is the act of intentionally
using computer data for the
purpose of creating a
fraudulent or dishonest design.
For example, a person built a
website that pretends to be the
homepage of a bank or another
organization.
Computer-related Forgery
This is the intentional possession, misuse,
use, transfer, deletion, or change of an
identifying information belonging to
another person without authority. An
example is when someone uses your
profile picture to pose as a different
person on social media. It can also be
considered identity theft when another
person uses our name and pictures and
pretend to be you on social media.
Computer-related Identity Theft
Malware
Short for malicious software, is
a program that do unwanted
actions or damage to an operating
system in a seamless manner, with
the intent of harming the
computer or user. It is a product
of cybercrimes, particularly by
data interference and system
interference.
The following are the
different types of
malware
V I R U S
Is a malicious program with the
possibility of self—replication. In a
computer, it seeks other files trying to
infect them and the ultimate goal is to
spread to other computers. Depending
on what malicious code it contains, it
may cause more or less damage to your
computer.
W O R M S
Like viruses, possess the ability of
self-replication; however, they
cannot infect other programs.
Their usual intent is to take
control of your computer and
allow remote control through
backdoor methods.
T R O J A N H O R S E
Is a program that appear to be useful or good to
mislead users of its true intent. It can be presented in
the form of games or files in e-mail attachments. It
infiltrates the computer and deals negative effects,
such as controlling your computer, deleting data,
spreading viruses, sending spam, etc. It does not
replicate and it needs to be executed. Users need to
download or install trojans for them to take effect.
S P Y W A R E
Is a program that secretly collects data
about computer users (passwords, credit
card numbers, etc.); therefore, it spies on
users. The most common spyware
infections usually occur while visiting
suspicious websites.
A D W A R E
Is a program that uses collected
data about a user in order to
display advertisements in a way
regarded as intrusive. It usually
manifests itself in the form of
many pop-up windows that
display ads.
Best Practice against Cybercrime and
Malware
1. Report issues to the web admin. If you find yourself a victim of
cybercrime, immediately report the issue to the web admin, particularly the
site where the cybercrime occurred. If you see anyone committing identity
theft online, especially on social media, report this to the web administrator.
2. Always Log Out. Never leave your account logged in especially when you
are going away. This will prevent security breaches such as illegal access.
3. Use anti-malware defenses. Install antivirus software and setup a firewall.
4. Regularly scan for viruses. A weekly or even daily check-up of
your files and programs will help clean up or delete infected files
from your computer.
5. Avoid visiting suspicious websites. Viruses often come from
these websites. Consider blocking access to these websites.
6. Always scan external storage devices. Before opening the
contents of storage devices in your computer, scan them first for
malware. Never use a storage device that you just picked up from
somewhere.
7. Clear your history. Clear your browsing history, your cookies,
cache, and data after using a computer. Do this when you use a
public computer. This way, you protect your privacy and personal
information from being stolen.
8. Backup your files. Have a hard drive where you can regularly back up
your files. This is a precaution so that if your computer needs to be
rebooted for any reason, your files are secure from loss of data.
8. Strengthen your passwords. When creating passwords, never use a
recognizable word. Always use a combination of letters and special
characters. Your passwords must vary for different accounts. Never use
your birthday or any other personal information as your password. Most
importantly, never reveal your password to anyone.
9. Never download content from unverified sources. Make sure to
download from official distributors, manufacturers or creators. If you use
a smartphone, avoid downloading from third-party sources.
10. Use Two-Step verification. This security feature adds another layer of
protection in your accounts by asking a verification code that will be sent
to your second device or phone after you attempt to login.
Other Guidelines
1. Never read chat messages that are not yours. Unless you were given the permission to
view these messages, it is against the law to access the private messages of another person
without their permission.
2. Always verify the source of information. Be very critical or doubtful of any
information or news that you se on the internet. Only rely on reputable and veritable
sources and not on blog sites pretending to be news sites.
3. Never spread false information. Do not share information that did not pass a thorough
critical analysis. If you are baited by sensational headline, take time to read the whole
content of the news, only then should you make an objective, informed opinion about it.
4. Never malign the dignity or reputation of anyone. Treat everyone with respect. Never
pick a fight in cyberspace, especially on social media.
END

Weitere ähnliche Inhalte

Was ist angesagt?

Involving computers (Laws and bills)
Involving computers (Laws and bills)Involving computers (Laws and bills)
Involving computers (Laws and bills)
Sharwin Calimlim
 
Entertainment & ICT
Entertainment & ICTEntertainment & ICT
Entertainment & ICT
Sufia Irshad
 
Q3 G11 Empowerment Technologies Module 1.pdf
Q3 G11 Empowerment Technologies Module 1.pdfQ3 G11 Empowerment Technologies Module 1.pdf
Q3 G11 Empowerment Technologies Module 1.pdf
BryanSmile
 

Was ist angesagt? (20)

TLE 10 (ICT): LAN Cabling
TLE 10 (ICT): LAN CablingTLE 10 (ICT): LAN Cabling
TLE 10 (ICT): LAN Cabling
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Involving computers (Laws and bills)
Involving computers (Laws and bills)Involving computers (Laws and bills)
Involving computers (Laws and bills)
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Entertainment & ICT
Entertainment & ICTEntertainment & ICT
Entertainment & ICT
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptx
 
Summary Bill or RIGHTS Article 3 Section 1-22
Summary Bill or RIGHTS Article 3 Section 1-22Summary Bill or RIGHTS Article 3 Section 1-22
Summary Bill or RIGHTS Article 3 Section 1-22
 
GEC 1 Understanding the Self (Module 5: The Sexual Self)
GEC 1 Understanding the Self (Module 5: The Sexual Self)GEC 1 Understanding the Self (Module 5: The Sexual Self)
GEC 1 Understanding the Self (Module 5: The Sexual Self)
 
Computer Systems Servicing COC1-COC2
Computer Systems Servicing COC1-COC2Computer Systems Servicing COC1-COC2
Computer Systems Servicing COC1-COC2
 
Ict 9 module 4, lesson 2.1 safety precautions
Ict 9 module 4, lesson 2.1 safety precautionsIct 9 module 4, lesson 2.1 safety precautions
Ict 9 module 4, lesson 2.1 safety precautions
 
Political Self
Political SelfPolitical Self
Political Self
 
Q3 G11 Empowerment Technologies Module 1.pdf
Q3 G11 Empowerment Technologies Module 1.pdfQ3 G11 Empowerment Technologies Module 1.pdf
Q3 G11 Empowerment Technologies Module 1.pdf
 
Information and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment TechnologiesInformation and Communication Technology (ICT) - Empowerment Technologies
Information and Communication Technology (ICT) - Empowerment Technologies
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 

Ähnlich wie Lesson iii-security-and-data-protection

etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
jonadhe mondeja
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
MILANOP1
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 

Ähnlich wie Lesson iii-security-and-data-protection (20)

COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer virus
Computer virusComputer virus
Computer virus
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Internet security
Internet security Internet security
Internet security
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

Lesson iii-security-and-data-protection

  • 2. OBJECTIVES At the end of the lesson, you should be able to : 1. Understand what cybersecurity is; 2. Understand what cybercrime is; 3. Identify the different types of malicious software; and 4. Know how to secure your information and protect yourself.
  • 4. Republic Act No. 10175: Cybercrime Prevention Act of 2012 • Cybersecurity is the collection of tools, policies, actions, practices, and technologies that can be used to protect the cyber environment. • Cyber – any computer or computer network, the medium in which online communication occurs. This law also specifies that a computer is an electronic, magnetic, electrochemical, or other data processing or communications device that is capable of performing logical, arithmetic, routing, or storage functions and which includes storage facility or communications facility that is directly related to the device. • Computer System – is any device or group of interconnected or related devices that performs automated processing of data. • Information security – or data security is the preservation of information or computer data’s confidentiality, integrity, and availability.
  • 5. Republic Act No. 10175: Cybercrime Prevention Act of 2012 –continuation. • Cybercrimes can be committed with the use of cell phones, social media, and other platforms. • With these definitions, smartphones and other types of mobile phones are also considered as computers and computer systems that are also part of the cyber environment. On the other hand, calculators, while they are considered as computers in other uses, may not fit in this definition because they do not carry a storage facility or communications facility.
  • 6. Cybercrime or Computer Crime Cybercrime – is an offense against the confidentiality, integrity, and availability of information or computer data.
  • 7. The following is a list of cybercrimes:
  • 8. L I B E L This is the act of publishing false statements with the use of computers or computer systems. An example of this cybercrime includes defamatory false statements posted on social media.
  • 9. Illegal Access This is the access to a computer system without right. For example, it is considered illegal access for someone to take your phone without your permission and read the contents of your private messages. Another example would be someone accessing your personal computer without your permission.
  • 10. Data Interference This is the intended alteration, damaging, deleting, or deteriorating of computer data, electronic document, or electronic data message without authority.
  • 11. Illegal Interception This is the obstruction from by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data. An example of illegal interception is when your emails, text messages, or chats are monitored with the use of software without your knowledge or permission.
  • 12. This is the purposeful alteration or reckless hindering or interference with the functioning of a computer or computer network. This is done when someone inputs, transmits, damages, deletes, alters, deteriorates, or suppresses computer data or program, electronic document, or electronic data message without authority System Interference
  • 13. This is the act of intentionally using computer data for the purpose of creating a fraudulent or dishonest design. For example, a person built a website that pretends to be the homepage of a bank or another organization. Computer-related Forgery
  • 14. This is the intentional possession, misuse, use, transfer, deletion, or change of an identifying information belonging to another person without authority. An example is when someone uses your profile picture to pose as a different person on social media. It can also be considered identity theft when another person uses our name and pictures and pretend to be you on social media. Computer-related Identity Theft
  • 15. Malware Short for malicious software, is a program that do unwanted actions or damage to an operating system in a seamless manner, with the intent of harming the computer or user. It is a product of cybercrimes, particularly by data interference and system interference.
  • 16. The following are the different types of malware
  • 17. V I R U S Is a malicious program with the possibility of self—replication. In a computer, it seeks other files trying to infect them and the ultimate goal is to spread to other computers. Depending on what malicious code it contains, it may cause more or less damage to your computer.
  • 18. W O R M S Like viruses, possess the ability of self-replication; however, they cannot infect other programs. Their usual intent is to take control of your computer and allow remote control through backdoor methods.
  • 19. T R O J A N H O R S E Is a program that appear to be useful or good to mislead users of its true intent. It can be presented in the form of games or files in e-mail attachments. It infiltrates the computer and deals negative effects, such as controlling your computer, deleting data, spreading viruses, sending spam, etc. It does not replicate and it needs to be executed. Users need to download or install trojans for them to take effect.
  • 20. S P Y W A R E Is a program that secretly collects data about computer users (passwords, credit card numbers, etc.); therefore, it spies on users. The most common spyware infections usually occur while visiting suspicious websites.
  • 21. A D W A R E Is a program that uses collected data about a user in order to display advertisements in a way regarded as intrusive. It usually manifests itself in the form of many pop-up windows that display ads.
  • 22. Best Practice against Cybercrime and Malware 1. Report issues to the web admin. If you find yourself a victim of cybercrime, immediately report the issue to the web admin, particularly the site where the cybercrime occurred. If you see anyone committing identity theft online, especially on social media, report this to the web administrator. 2. Always Log Out. Never leave your account logged in especially when you are going away. This will prevent security breaches such as illegal access. 3. Use anti-malware defenses. Install antivirus software and setup a firewall.
  • 23. 4. Regularly scan for viruses. A weekly or even daily check-up of your files and programs will help clean up or delete infected files from your computer. 5. Avoid visiting suspicious websites. Viruses often come from these websites. Consider blocking access to these websites. 6. Always scan external storage devices. Before opening the contents of storage devices in your computer, scan them first for malware. Never use a storage device that you just picked up from somewhere. 7. Clear your history. Clear your browsing history, your cookies, cache, and data after using a computer. Do this when you use a public computer. This way, you protect your privacy and personal information from being stolen.
  • 24. 8. Backup your files. Have a hard drive where you can regularly back up your files. This is a precaution so that if your computer needs to be rebooted for any reason, your files are secure from loss of data. 8. Strengthen your passwords. When creating passwords, never use a recognizable word. Always use a combination of letters and special characters. Your passwords must vary for different accounts. Never use your birthday or any other personal information as your password. Most importantly, never reveal your password to anyone. 9. Never download content from unverified sources. Make sure to download from official distributors, manufacturers or creators. If you use a smartphone, avoid downloading from third-party sources. 10. Use Two-Step verification. This security feature adds another layer of protection in your accounts by asking a verification code that will be sent to your second device or phone after you attempt to login.
  • 25. Other Guidelines 1. Never read chat messages that are not yours. Unless you were given the permission to view these messages, it is against the law to access the private messages of another person without their permission. 2. Always verify the source of information. Be very critical or doubtful of any information or news that you se on the internet. Only rely on reputable and veritable sources and not on blog sites pretending to be news sites. 3. Never spread false information. Do not share information that did not pass a thorough critical analysis. If you are baited by sensational headline, take time to read the whole content of the news, only then should you make an objective, informed opinion about it. 4. Never malign the dignity or reputation of anyone. Treat everyone with respect. Never pick a fight in cyberspace, especially on social media.
  • 26. END