This document provides information on data protection, cybersecurity, cybercrime, and how to protect yourself online. It defines cybersecurity, cybercrime, and related terms. It identifies different types of cybercrimes such as libel, illegal access, data interference, and identity theft. It also defines different types of malware like viruses, worms, trojan horses, spyware, and adware. Finally, it lists best practices for protecting against cybercrime and malware, which include using antivirus software, strong passwords, backing up files, and avoiding suspicious websites.
2. OBJECTIVES
At the end of the lesson, you should be able to :
1. Understand what cybersecurity is;
2. Understand what cybercrime is;
3. Identify the different types of malicious software; and
4. Know how to secure your information and protect yourself.
4. Republic Act No. 10175: Cybercrime Prevention
Act of 2012
• Cybersecurity is the collection of tools, policies, actions, practices, and
technologies that can be used to protect the cyber environment.
• Cyber – any computer or computer network, the medium in which
online communication occurs. This law also specifies that a computer is
an electronic, magnetic, electrochemical, or other data processing or
communications device that is capable of performing logical, arithmetic,
routing, or storage functions and which includes storage facility or
communications facility that is directly related to the device.
• Computer System – is any device or group of interconnected or related
devices that performs automated processing of data.
• Information security – or data security is the preservation of
information or computer data’s confidentiality, integrity, and availability.
5. Republic Act No. 10175: Cybercrime
Prevention Act of 2012 –continuation.
• Cybercrimes can be committed with the use of cell
phones, social media, and other platforms.
• With these definitions, smartphones and other types of
mobile phones are also considered as computers and
computer systems that are also part of the cyber
environment. On the other hand, calculators, while they
are considered as computers in other uses, may not fit in
this definition because they do not carry a storage facility or
communications facility.
6. Cybercrime or Computer Crime
Cybercrime – is an
offense against the
confidentiality, integrity,
and availability of
information or computer
data.
8. L I B E L
This is the act of publishing
false statements with the
use of computers or
computer systems. An
example of this cybercrime
includes defamatory false
statements posted on social
media.
9. Illegal Access
This is the access to a computer
system without right. For
example, it is considered illegal
access for someone to take your
phone without your permission
and read the contents of your
private messages. Another
example would be someone
accessing your personal computer
without your permission.
10. Data Interference
This is the intended
alteration, damaging,
deleting, or deteriorating of
computer data, electronic
document, or electronic data
message without authority.
11. Illegal Interception
This is the obstruction from by technical means
without right of any non-public transmission of
computer data to, from, or within a computer
system including electromagnetic emissions
from a computer system carrying such
computer data. An example of illegal
interception is when your emails, text messages,
or chats are monitored with the use of software
without your knowledge or permission.
12. This is the purposeful alteration or reckless
hindering or interference with the
functioning of a computer or computer
network. This is done when someone
inputs, transmits, damages, deletes, alters,
deteriorates, or suppresses computer data
or program, electronic document, or
electronic data message without authority
System Interference
13. This is the act of intentionally
using computer data for the
purpose of creating a
fraudulent or dishonest design.
For example, a person built a
website that pretends to be the
homepage of a bank or another
organization.
Computer-related Forgery
14. This is the intentional possession, misuse,
use, transfer, deletion, or change of an
identifying information belonging to
another person without authority. An
example is when someone uses your
profile picture to pose as a different
person on social media. It can also be
considered identity theft when another
person uses our name and pictures and
pretend to be you on social media.
Computer-related Identity Theft
15. Malware
Short for malicious software, is
a program that do unwanted
actions or damage to an operating
system in a seamless manner, with
the intent of harming the
computer or user. It is a product
of cybercrimes, particularly by
data interference and system
interference.
17. V I R U S
Is a malicious program with the
possibility of self—replication. In a
computer, it seeks other files trying to
infect them and the ultimate goal is to
spread to other computers. Depending
on what malicious code it contains, it
may cause more or less damage to your
computer.
18. W O R M S
Like viruses, possess the ability of
self-replication; however, they
cannot infect other programs.
Their usual intent is to take
control of your computer and
allow remote control through
backdoor methods.
19. T R O J A N H O R S E
Is a program that appear to be useful or good to
mislead users of its true intent. It can be presented in
the form of games or files in e-mail attachments. It
infiltrates the computer and deals negative effects,
such as controlling your computer, deleting data,
spreading viruses, sending spam, etc. It does not
replicate and it needs to be executed. Users need to
download or install trojans for them to take effect.
20. S P Y W A R E
Is a program that secretly collects data
about computer users (passwords, credit
card numbers, etc.); therefore, it spies on
users. The most common spyware
infections usually occur while visiting
suspicious websites.
21. A D W A R E
Is a program that uses collected
data about a user in order to
display advertisements in a way
regarded as intrusive. It usually
manifests itself in the form of
many pop-up windows that
display ads.
22. Best Practice against Cybercrime and
Malware
1. Report issues to the web admin. If you find yourself a victim of
cybercrime, immediately report the issue to the web admin, particularly the
site where the cybercrime occurred. If you see anyone committing identity
theft online, especially on social media, report this to the web administrator.
2. Always Log Out. Never leave your account logged in especially when you
are going away. This will prevent security breaches such as illegal access.
3. Use anti-malware defenses. Install antivirus software and setup a firewall.
23. 4. Regularly scan for viruses. A weekly or even daily check-up of
your files and programs will help clean up or delete infected files
from your computer.
5. Avoid visiting suspicious websites. Viruses often come from
these websites. Consider blocking access to these websites.
6. Always scan external storage devices. Before opening the
contents of storage devices in your computer, scan them first for
malware. Never use a storage device that you just picked up from
somewhere.
7. Clear your history. Clear your browsing history, your cookies,
cache, and data after using a computer. Do this when you use a
public computer. This way, you protect your privacy and personal
information from being stolen.
24. 8. Backup your files. Have a hard drive where you can regularly back up
your files. This is a precaution so that if your computer needs to be
rebooted for any reason, your files are secure from loss of data.
8. Strengthen your passwords. When creating passwords, never use a
recognizable word. Always use a combination of letters and special
characters. Your passwords must vary for different accounts. Never use
your birthday or any other personal information as your password. Most
importantly, never reveal your password to anyone.
9. Never download content from unverified sources. Make sure to
download from official distributors, manufacturers or creators. If you use
a smartphone, avoid downloading from third-party sources.
10. Use Two-Step verification. This security feature adds another layer of
protection in your accounts by asking a verification code that will be sent
to your second device or phone after you attempt to login.
25. Other Guidelines
1. Never read chat messages that are not yours. Unless you were given the permission to
view these messages, it is against the law to access the private messages of another person
without their permission.
2. Always verify the source of information. Be very critical or doubtful of any
information or news that you se on the internet. Only rely on reputable and veritable
sources and not on blog sites pretending to be news sites.
3. Never spread false information. Do not share information that did not pass a thorough
critical analysis. If you are baited by sensational headline, take time to read the whole
content of the news, only then should you make an objective, informed opinion about it.
4. Never malign the dignity or reputation of anyone. Treat everyone with respect. Never
pick a fight in cyberspace, especially on social media.