SlideShare une entreprise Scribd logo
1  sur  26
Data
Protection
Security
and
OBJECTIVES
At the end of the lesson, you should be able to :
1. Understand what cybersecurity is;
2. Understand what cybercrime is;
3. Identify the different types of malicious software; and
4. Know how to secure your information and protect yourself.
CYBERSECURITY
Republic Act No. 10175: Cybercrime Prevention
Act of 2012
• Cybersecurity is the collection of tools, policies, actions, practices, and
technologies that can be used to protect the cyber environment.
• Cyber – any computer or computer network, the medium in which
online communication occurs. This law also specifies that a computer is
an electronic, magnetic, electrochemical, or other data processing or
communications device that is capable of performing logical, arithmetic,
routing, or storage functions and which includes storage facility or
communications facility that is directly related to the device.
• Computer System – is any device or group of interconnected or related
devices that performs automated processing of data.
• Information security – or data security is the preservation of
information or computer data’s confidentiality, integrity, and availability.
Republic Act No. 10175: Cybercrime
Prevention Act of 2012 –continuation.
• Cybercrimes can be committed with the use of cell
phones, social media, and other platforms.
• With these definitions, smartphones and other types of
mobile phones are also considered as computers and
computer systems that are also part of the cyber
environment. On the other hand, calculators, while they
are considered as computers in other uses, may not fit in
this definition because they do not carry a storage facility or
communications facility.
Cybercrime or Computer Crime
Cybercrime – is an
offense against the
confidentiality, integrity,
and availability of
information or computer
data.
The following is a
list of
cybercrimes:
L I B E L
This is the act of publishing
false statements with the
use of computers or
computer systems. An
example of this cybercrime
includes defamatory false
statements posted on social
media.
Illegal Access
This is the access to a computer
system without right. For
example, it is considered illegal
access for someone to take your
phone without your permission
and read the contents of your
private messages. Another
example would be someone
accessing your personal computer
without your permission.
Data Interference
This is the intended
alteration, damaging,
deleting, or deteriorating of
computer data, electronic
document, or electronic data
message without authority.
Illegal Interception
This is the obstruction from by technical means
without right of any non-public transmission of
computer data to, from, or within a computer
system including electromagnetic emissions
from a computer system carrying such
computer data. An example of illegal
interception is when your emails, text messages,
or chats are monitored with the use of software
without your knowledge or permission.
This is the purposeful alteration or reckless
hindering or interference with the
functioning of a computer or computer
network. This is done when someone
inputs, transmits, damages, deletes, alters,
deteriorates, or suppresses computer data
or program, electronic document, or
electronic data message without authority
System Interference
This is the act of intentionally
using computer data for the
purpose of creating a
fraudulent or dishonest design.
For example, a person built a
website that pretends to be the
homepage of a bank or another
organization.
Computer-related Forgery
This is the intentional possession, misuse,
use, transfer, deletion, or change of an
identifying information belonging to
another person without authority. An
example is when someone uses your
profile picture to pose as a different
person on social media. It can also be
considered identity theft when another
person uses our name and pictures and
pretend to be you on social media.
Computer-related Identity Theft
Malware
Short for malicious software, is
a program that do unwanted
actions or damage to an operating
system in a seamless manner, with
the intent of harming the
computer or user. It is a product
of cybercrimes, particularly by
data interference and system
interference.
The following are the
different types of
malware
V I R U S
Is a malicious program with the
possibility of self—replication. In a
computer, it seeks other files trying to
infect them and the ultimate goal is to
spread to other computers. Depending
on what malicious code it contains, it
may cause more or less damage to your
computer.
W O R M S
Like viruses, possess the ability of
self-replication; however, they
cannot infect other programs.
Their usual intent is to take
control of your computer and
allow remote control through
backdoor methods.
T R O J A N H O R S E
Is a program that appear to be useful or good to
mislead users of its true intent. It can be presented in
the form of games or files in e-mail attachments. It
infiltrates the computer and deals negative effects,
such as controlling your computer, deleting data,
spreading viruses, sending spam, etc. It does not
replicate and it needs to be executed. Users need to
download or install trojans for them to take effect.
S P Y W A R E
Is a program that secretly collects data
about computer users (passwords, credit
card numbers, etc.); therefore, it spies on
users. The most common spyware
infections usually occur while visiting
suspicious websites.
A D W A R E
Is a program that uses collected
data about a user in order to
display advertisements in a way
regarded as intrusive. It usually
manifests itself in the form of
many pop-up windows that
display ads.
Best Practice against Cybercrime and
Malware
1. Report issues to the web admin. If you find yourself a victim of
cybercrime, immediately report the issue to the web admin, particularly the
site where the cybercrime occurred. If you see anyone committing identity
theft online, especially on social media, report this to the web administrator.
2. Always Log Out. Never leave your account logged in especially when you
are going away. This will prevent security breaches such as illegal access.
3. Use anti-malware defenses. Install antivirus software and setup a firewall.
4. Regularly scan for viruses. A weekly or even daily check-up of
your files and programs will help clean up or delete infected files
from your computer.
5. Avoid visiting suspicious websites. Viruses often come from
these websites. Consider blocking access to these websites.
6. Always scan external storage devices. Before opening the
contents of storage devices in your computer, scan them first for
malware. Never use a storage device that you just picked up from
somewhere.
7. Clear your history. Clear your browsing history, your cookies,
cache, and data after using a computer. Do this when you use a
public computer. This way, you protect your privacy and personal
information from being stolen.
8. Backup your files. Have a hard drive where you can regularly back up
your files. This is a precaution so that if your computer needs to be
rebooted for any reason, your files are secure from loss of data.
8. Strengthen your passwords. When creating passwords, never use a
recognizable word. Always use a combination of letters and special
characters. Your passwords must vary for different accounts. Never use
your birthday or any other personal information as your password. Most
importantly, never reveal your password to anyone.
9. Never download content from unverified sources. Make sure to
download from official distributors, manufacturers or creators. If you use
a smartphone, avoid downloading from third-party sources.
10. Use Two-Step verification. This security feature adds another layer of
protection in your accounts by asking a verification code that will be sent
to your second device or phone after you attempt to login.
Other Guidelines
1. Never read chat messages that are not yours. Unless you were given the permission to
view these messages, it is against the law to access the private messages of another person
without their permission.
2. Always verify the source of information. Be very critical or doubtful of any
information or news that you se on the internet. Only rely on reputable and veritable
sources and not on blog sites pretending to be news sites.
3. Never spread false information. Do not share information that did not pass a thorough
critical analysis. If you are baited by sensational headline, take time to read the whole
content of the news, only then should you make an objective, informed opinion about it.
4. Never malign the dignity or reputation of anyone. Treat everyone with respect. Never
pick a fight in cyberspace, especially on social media.
END

Contenu connexe

Tendances

Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
ian_oguis
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
Ujjwal Tripathi
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
Jonan Momo
 
Ra 9262 (VAWC)
Ra 9262 (VAWC)Ra 9262 (VAWC)
Ra 9262 (VAWC)
F Mad
 
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
Sharon Geroquia
 

Tendances (20)

Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
CYBERCRIME.pptx
CYBERCRIME.pptxCYBERCRIME.pptx
CYBERCRIME.pptx
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
Criminal procedure simplified
Criminal procedure simplifiedCriminal procedure simplified
Criminal procedure simplified
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Crimes against civil status
Crimes against civil statusCrimes against civil status
Crimes against civil status
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Ra 9262 (VAWC)
Ra 9262 (VAWC)Ra 9262 (VAWC)
Ra 9262 (VAWC)
 
Anti-Violence Against Women and Children
Anti-Violence Against Women and ChildrenAnti-Violence Against Women and Children
Anti-Violence Against Women and Children
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Privilege Speech: Child Cyber Pornography
Privilege Speech: Child Cyber PornographyPrivilege Speech: Child Cyber Pornography
Privilege Speech: Child Cyber Pornography
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Correctional Administration
Correctional AdministrationCorrectional Administration
Correctional Administration
 
Republic Act 9262
Republic Act 9262Republic Act 9262
Republic Act 9262
 
Internet threats
Internet threatsInternet threats
Internet threats
 

Similaire à Lesson iii-security-and-data-protection

etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
jonadhe mondeja
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
MILANOP1
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 

Similaire à Lesson iii-security-and-data-protection (20)

COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer virus
Computer virusComputer virus
Computer virus
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Internet security
Internet security Internet security
Internet security
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 

Dernier

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 

Dernier (20)

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

Lesson iii-security-and-data-protection

  • 2. OBJECTIVES At the end of the lesson, you should be able to : 1. Understand what cybersecurity is; 2. Understand what cybercrime is; 3. Identify the different types of malicious software; and 4. Know how to secure your information and protect yourself.
  • 4. Republic Act No. 10175: Cybercrime Prevention Act of 2012 • Cybersecurity is the collection of tools, policies, actions, practices, and technologies that can be used to protect the cyber environment. • Cyber – any computer or computer network, the medium in which online communication occurs. This law also specifies that a computer is an electronic, magnetic, electrochemical, or other data processing or communications device that is capable of performing logical, arithmetic, routing, or storage functions and which includes storage facility or communications facility that is directly related to the device. • Computer System – is any device or group of interconnected or related devices that performs automated processing of data. • Information security – or data security is the preservation of information or computer data’s confidentiality, integrity, and availability.
  • 5. Republic Act No. 10175: Cybercrime Prevention Act of 2012 –continuation. • Cybercrimes can be committed with the use of cell phones, social media, and other platforms. • With these definitions, smartphones and other types of mobile phones are also considered as computers and computer systems that are also part of the cyber environment. On the other hand, calculators, while they are considered as computers in other uses, may not fit in this definition because they do not carry a storage facility or communications facility.
  • 6. Cybercrime or Computer Crime Cybercrime – is an offense against the confidentiality, integrity, and availability of information or computer data.
  • 7. The following is a list of cybercrimes:
  • 8. L I B E L This is the act of publishing false statements with the use of computers or computer systems. An example of this cybercrime includes defamatory false statements posted on social media.
  • 9. Illegal Access This is the access to a computer system without right. For example, it is considered illegal access for someone to take your phone without your permission and read the contents of your private messages. Another example would be someone accessing your personal computer without your permission.
  • 10. Data Interference This is the intended alteration, damaging, deleting, or deteriorating of computer data, electronic document, or electronic data message without authority.
  • 11. Illegal Interception This is the obstruction from by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data. An example of illegal interception is when your emails, text messages, or chats are monitored with the use of software without your knowledge or permission.
  • 12. This is the purposeful alteration or reckless hindering or interference with the functioning of a computer or computer network. This is done when someone inputs, transmits, damages, deletes, alters, deteriorates, or suppresses computer data or program, electronic document, or electronic data message without authority System Interference
  • 13. This is the act of intentionally using computer data for the purpose of creating a fraudulent or dishonest design. For example, a person built a website that pretends to be the homepage of a bank or another organization. Computer-related Forgery
  • 14. This is the intentional possession, misuse, use, transfer, deletion, or change of an identifying information belonging to another person without authority. An example is when someone uses your profile picture to pose as a different person on social media. It can also be considered identity theft when another person uses our name and pictures and pretend to be you on social media. Computer-related Identity Theft
  • 15. Malware Short for malicious software, is a program that do unwanted actions or damage to an operating system in a seamless manner, with the intent of harming the computer or user. It is a product of cybercrimes, particularly by data interference and system interference.
  • 16. The following are the different types of malware
  • 17. V I R U S Is a malicious program with the possibility of self—replication. In a computer, it seeks other files trying to infect them and the ultimate goal is to spread to other computers. Depending on what malicious code it contains, it may cause more or less damage to your computer.
  • 18. W O R M S Like viruses, possess the ability of self-replication; however, they cannot infect other programs. Their usual intent is to take control of your computer and allow remote control through backdoor methods.
  • 19. T R O J A N H O R S E Is a program that appear to be useful or good to mislead users of its true intent. It can be presented in the form of games or files in e-mail attachments. It infiltrates the computer and deals negative effects, such as controlling your computer, deleting data, spreading viruses, sending spam, etc. It does not replicate and it needs to be executed. Users need to download or install trojans for them to take effect.
  • 20. S P Y W A R E Is a program that secretly collects data about computer users (passwords, credit card numbers, etc.); therefore, it spies on users. The most common spyware infections usually occur while visiting suspicious websites.
  • 21. A D W A R E Is a program that uses collected data about a user in order to display advertisements in a way regarded as intrusive. It usually manifests itself in the form of many pop-up windows that display ads.
  • 22. Best Practice against Cybercrime and Malware 1. Report issues to the web admin. If you find yourself a victim of cybercrime, immediately report the issue to the web admin, particularly the site where the cybercrime occurred. If you see anyone committing identity theft online, especially on social media, report this to the web administrator. 2. Always Log Out. Never leave your account logged in especially when you are going away. This will prevent security breaches such as illegal access. 3. Use anti-malware defenses. Install antivirus software and setup a firewall.
  • 23. 4. Regularly scan for viruses. A weekly or even daily check-up of your files and programs will help clean up or delete infected files from your computer. 5. Avoid visiting suspicious websites. Viruses often come from these websites. Consider blocking access to these websites. 6. Always scan external storage devices. Before opening the contents of storage devices in your computer, scan them first for malware. Never use a storage device that you just picked up from somewhere. 7. Clear your history. Clear your browsing history, your cookies, cache, and data after using a computer. Do this when you use a public computer. This way, you protect your privacy and personal information from being stolen.
  • 24. 8. Backup your files. Have a hard drive where you can regularly back up your files. This is a precaution so that if your computer needs to be rebooted for any reason, your files are secure from loss of data. 8. Strengthen your passwords. When creating passwords, never use a recognizable word. Always use a combination of letters and special characters. Your passwords must vary for different accounts. Never use your birthday or any other personal information as your password. Most importantly, never reveal your password to anyone. 9. Never download content from unverified sources. Make sure to download from official distributors, manufacturers or creators. If you use a smartphone, avoid downloading from third-party sources. 10. Use Two-Step verification. This security feature adds another layer of protection in your accounts by asking a verification code that will be sent to your second device or phone after you attempt to login.
  • 25. Other Guidelines 1. Never read chat messages that are not yours. Unless you were given the permission to view these messages, it is against the law to access the private messages of another person without their permission. 2. Always verify the source of information. Be very critical or doubtful of any information or news that you se on the internet. Only rely on reputable and veritable sources and not on blog sites pretending to be news sites. 3. Never spread false information. Do not share information that did not pass a thorough critical analysis. If you are baited by sensational headline, take time to read the whole content of the news, only then should you make an objective, informed opinion about it. 4. Never malign the dignity or reputation of anyone. Treat everyone with respect. Never pick a fight in cyberspace, especially on social media.
  • 26. END