SlideShare ist ein Scribd-Unternehmen logo
1 von 23
RUBI R. ORBETA, BUCAF
ATD
• The Cybercrime Prevention Act of 2012,
officially recorded as Republic Act No. 10175,
is a law in the Philippines approved on
September 12, 2012. It aims to address legal
issues concerning online interactions and the
Internet in the Philippines.
The Internet is an amazing tool for
communication, allowing users to connect
instantly over great distances. Unfortunately, the
reach and anonymity the network provides is also
a great tool for criminals, who have taken
advantage of the global network to ply their trade.
There are many different types of cyber crime, and
understanding the most common crimes and
frauds can help you avoid becoming a victim.
• To protect yourself from cybercrime, you
need to familiarize yourself with all the
different kinds. There’s just no going around
it. After all, you can’t defend yourself against
something you don’t know, right? Here are of
six major types of cybercrime that you should
know about.
1. Hacking
By definition, hacking is the unauthorized
accessing of a single device (such as a laptop
or a smartphone) or a computer network, and
those who engage in the activity are called
hackers.
Keep in mind, though, that in the strictest
sense of the word, hacking is not illegal in and
of itself, and is therefore not a crime. It is simply
a skill, and it is what people can do with this
skill that may be illegal.
2. Cyber stalking
Cyber stalking is the use of the internet
and various online platforms within as well
as other electronic devices to stalk, harass,
or blackmail any person or group. In some
cases, cyber stalking can escalate to
physical violence, rape, and even murder.
3. Online identity theft
This is when a person is able to steal your
personal information (Social Security number, credit card
information, bank account numbers) through online
means. It can be achieved in a variety of ways such as
email phishing, malware injection, and brute force
hacking.
In terms of financial loss as well as the serious
hassle it causes, identity theft is one of the most
destructive forms of cybercrime. In one fell swoop, a
cybercriminal can take over your finances and take your
money.
4. Online child abuse
This is, without a doubt, the most heinous
type of cybercrime. There are many activities
that constitute online child abuse including the
downloading, selling, and distribution of child
pornography through websites and forums and
the solicitation of children for sex via
chatrooms.
Along with cyberstalking, online child
abuse (and child abuse in general) is a federal
crime under the U.S. Code.
5. Ransomware attack
A ransomware attack is when a cybercriminal
injects a specific kind of malware (called
ransomware) into your device. Ransomware gets its
name because it is designed to block access to your
data until a certain amount is paid, thereby holding it
for ransom. In most cases, ransoms are demanded
to be paid in bitcoins or other cryptocurrencies.
Ransomware attacks also cause significant
financial damage. In 2017, it was reported that the
global cost of ransomware exceeded $5 billion
dollars.
6. Internet fraud (online scams)
The purpose of an online scam is for you the
victim, into willingly giving up money under false
pretenses. One typical scenario is called the “charity
fraud”. Here, a criminal appeals to your sense of
righteousness by posing as a representative of a
charitable organization dedicated to a meaningful
cause like cancer or AIDS research. After spinning
you around, the perpetrator will then ask for a hefty
donation, which can be a either a one-time payment
or a series of payments.
1. Tighten your current security system. Your system and
all the software your organization uses offer guidelines
for maximizing security controls that you should follow.
Some are as simple as turning off unnecessary services or
using the lowest privileges settings.
2. Use patches. All it takes is a tiny hole in your system for
hackers to poke their way in. It’s critical to run regular
scans of your security system and all software to keep
them updated with patches.
3. Protect outbound data. Just as you protect your
system from incoming malware and bots with a firewall,
you need to make sure certain data never leaves your
system. It’s important to focus on egress filtering, to
prevent rogue employees or employees making honest
mistakes from releasing sensitive data or malicious
software from your network.
4. Raise awareness. It’s important for everyone in
the organization to be savvy and alert about
security issues. This means watching for phishing
scams sent through email and messaging apps that
appear bonafide but are actually attempts to
retrieve credentials or sensitive data or release
malware into the system.
5. Be smart about passwords. Most organizations
have password policies that address reuse and
strength of user passwords. But one area that often
is overlooked is the local administrator’s PC
password is the same as the password used on
servers. It wouldn’t take a hacker long to infiltrate
the entire system and create internal and external
havoc with that information.
6. Don’t ignore physical security. Just as you wouldn’t
leave your car keys in the ignition of your car for thieves,
you shouldn’t leave ID badges, credit cards, personnel
and financial files, and cell phones/tablets lying around.
Staff should be trained to keep these items on their
person or locked away when not in use.
7. Encrypt data. All PCs and personal information stored
in databases and on servers should be encrypted. This is
the best way to protect against hackers gaining access to
sensitive data.
8. Purchase a Cyber Insurance policy. If you do
experience a cyber breach, a solid Cyber insurance policy
will cover your losses and costs to repair the damage.
The Major Types of Cybercrime
The Major Types of Cybercrime
The Major Types of Cybercrime

Weitere ähnliche Inhalte

Was ist angesagt?

Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
Jonan Momo
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 

Was ist angesagt? (20)

Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Ppt
PptPpt
Ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
cyber crime
cyber crimecyber crime
cyber crime
 
Types of cyber crime
Types of cyber crimeTypes of cyber crime
Types of cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

Ähnlich wie The Major Types of Cybercrime

Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 

Ähnlich wie The Major Types of Cybercrime (20)

Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
techalpha07
techalpha07techalpha07
techalpha07
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Internet security
Internet securityInternet security
Internet security
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Kürzlich hochgeladen (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

The Major Types of Cybercrime

  • 1. RUBI R. ORBETA, BUCAF ATD
  • 2. • The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No. 10175, is a law in the Philippines approved on September 12, 2012. It aims to address legal issues concerning online interactions and the Internet in the Philippines.
  • 3. The Internet is an amazing tool for communication, allowing users to connect instantly over great distances. Unfortunately, the reach and anonymity the network provides is also a great tool for criminals, who have taken advantage of the global network to ply their trade. There are many different types of cyber crime, and understanding the most common crimes and frauds can help you avoid becoming a victim.
  • 4. • To protect yourself from cybercrime, you need to familiarize yourself with all the different kinds. There’s just no going around it. After all, you can’t defend yourself against something you don’t know, right? Here are of six major types of cybercrime that you should know about.
  • 5. 1. Hacking By definition, hacking is the unauthorized accessing of a single device (such as a laptop or a smartphone) or a computer network, and those who engage in the activity are called hackers. Keep in mind, though, that in the strictest sense of the word, hacking is not illegal in and of itself, and is therefore not a crime. It is simply a skill, and it is what people can do with this skill that may be illegal.
  • 6.
  • 7. 2. Cyber stalking Cyber stalking is the use of the internet and various online platforms within as well as other electronic devices to stalk, harass, or blackmail any person or group. In some cases, cyber stalking can escalate to physical violence, rape, and even murder.
  • 8.
  • 9. 3. Online identity theft This is when a person is able to steal your personal information (Social Security number, credit card information, bank account numbers) through online means. It can be achieved in a variety of ways such as email phishing, malware injection, and brute force hacking. In terms of financial loss as well as the serious hassle it causes, identity theft is one of the most destructive forms of cybercrime. In one fell swoop, a cybercriminal can take over your finances and take your money.
  • 10.
  • 11. 4. Online child abuse This is, without a doubt, the most heinous type of cybercrime. There are many activities that constitute online child abuse including the downloading, selling, and distribution of child pornography through websites and forums and the solicitation of children for sex via chatrooms. Along with cyberstalking, online child abuse (and child abuse in general) is a federal crime under the U.S. Code.
  • 12.
  • 13. 5. Ransomware attack A ransomware attack is when a cybercriminal injects a specific kind of malware (called ransomware) into your device. Ransomware gets its name because it is designed to block access to your data until a certain amount is paid, thereby holding it for ransom. In most cases, ransoms are demanded to be paid in bitcoins or other cryptocurrencies. Ransomware attacks also cause significant financial damage. In 2017, it was reported that the global cost of ransomware exceeded $5 billion dollars.
  • 14.
  • 15. 6. Internet fraud (online scams) The purpose of an online scam is for you the victim, into willingly giving up money under false pretenses. One typical scenario is called the “charity fraud”. Here, a criminal appeals to your sense of righteousness by posing as a representative of a charitable organization dedicated to a meaningful cause like cancer or AIDS research. After spinning you around, the perpetrator will then ask for a hefty donation, which can be a either a one-time payment or a series of payments.
  • 16.
  • 17.
  • 18. 1. Tighten your current security system. Your system and all the software your organization uses offer guidelines for maximizing security controls that you should follow. Some are as simple as turning off unnecessary services or using the lowest privileges settings. 2. Use patches. All it takes is a tiny hole in your system for hackers to poke their way in. It’s critical to run regular scans of your security system and all software to keep them updated with patches. 3. Protect outbound data. Just as you protect your system from incoming malware and bots with a firewall, you need to make sure certain data never leaves your system. It’s important to focus on egress filtering, to prevent rogue employees or employees making honest mistakes from releasing sensitive data or malicious software from your network.
  • 19. 4. Raise awareness. It’s important for everyone in the organization to be savvy and alert about security issues. This means watching for phishing scams sent through email and messaging apps that appear bonafide but are actually attempts to retrieve credentials or sensitive data or release malware into the system. 5. Be smart about passwords. Most organizations have password policies that address reuse and strength of user passwords. But one area that often is overlooked is the local administrator’s PC password is the same as the password used on servers. It wouldn’t take a hacker long to infiltrate the entire system and create internal and external havoc with that information.
  • 20. 6. Don’t ignore physical security. Just as you wouldn’t leave your car keys in the ignition of your car for thieves, you shouldn’t leave ID badges, credit cards, personnel and financial files, and cell phones/tablets lying around. Staff should be trained to keep these items on their person or locked away when not in use. 7. Encrypt data. All PCs and personal information stored in databases and on servers should be encrypted. This is the best way to protect against hackers gaining access to sensitive data. 8. Purchase a Cyber Insurance policy. If you do experience a cyber breach, a solid Cyber insurance policy will cover your losses and costs to repair the damage.

Hinweis der Redaktion

  1. The cost of cyber insurance depends upon several risk factors but for most small businesses annual premiums will range from $1,000 to $7,500.