Hello!
I’m Joseph, Paul, Jerot, JM & Lennard!
We are here because we will report the topic about Online Safety & Security
2
Introduction
Each individual when
accessing the World Wide
Web is concerned with the
safety of his or her terminal
or computer and the
information that will be
transmitted or received.
Every organisation relies on
the internet to some degree or
another for communications,
transactions, payments and data
access. Unfortunately, however,
the internet has also become a
channel of choice for criminals
to commit financial and other
crimes. Your organisation must
take precautions to protect
itself.
3
“▫ Refers to the transmission of
unsolicited messages from
various origins using electronic
messaging systems such as e-
mail and chat messengers
▫ A tool for advertisement
▫ Unsolicited bulk e-mail (UBE)
5
“▫ Defined as a software or a
program used by an attacker to
obtain personal information
▫ Commonly target user passwords
to hack and take control of a user
account
8
“▫ Short term for malicious software
▫ A computer software sent by
attackers to inflict chaos on a
computer’s operation and
processes
10
What is Bullying?
Defined as “severe or repeated
use by one or more students of a
written, verbal or electronic
expression, or a physical gesture, or
any combination thereof, directed to
another student that has the effect of
actually causing or placing the latter
in reasonable fear of physical or
emotional harm or damage to his
property.”
11
Republic
Act 10627
or
Anti-
Bullying
Act of
2013
How to avoid these
threats?
There are provisions & laws that our country
implements to avoid these threats.
12
The Philippine government ensures the welfare
of its people in their ICT experience by enacting
various laws and regulations. There are incidents
of theft, scam, phishing and other activities that
victimize Filipino people.
13
This law includes protection of individuals from
bullying through electronic means. Bullying
invades an individual’s privacy by using photos
and other information meant to disgrace that
individual.
14
Acquisition of passwords and other vital
information from an individual •
Computer forgery • Libel
16
Cybercime offenses
include, but are not limited
to: • Integrity and
availability of data • Illegal
access of computers
through remote means
without permission •
Interception of one’s
information from a private
conversation or
correspondence •