The document discusses the disadvantages of information and communication technology (ICT), specifically cybercrimes. It lists 10 common cybercrimes such as phishing, blackmail, hacking, sports betting fraud, and child pornography. It then provides examples of how some of these crimes are committed, such as using ride-hailing apps to transport drugs. The document concludes by outlining three ways to combat cybercrimes: implementing network security measures, investigating cybercrimes through IP address tracking, and establishing legal penalties for perpetrators.
The document discusses the disadvantages of information and communication technology (ICT), specifically cybercrimes. It lists 10 common cybercrimes such as phishing, blackmail, hacking, sports betting fraud, and child pornography. It then provides examples of how some of these crimes are committed, such as using ride-hailing apps to transport drugs. The document concludes by outlining three ways to combat cybercrimes: implementing network security measures, investigating cybercrimes through IP address tracking, and establishing legal penalties for perpetrators.
The document discusses the disadvantages of information and communication technology (ICT), specifically cybercrimes. It lists 10 common cybercrimes such as phishing, blackmail, hacking, sports betting fraud, and child pornography. It then provides examples of how some of these crimes are committed, such as using ride-hailing apps to transport drugs. The document concludes by outlining three ways to combat cybercrimes: implementing network security measures, investigating cybercrimes through IP address tracking, and establishing legal penalties for perpetrators.
The document discusses the disadvantages of information and communication technology (ICT), specifically cybercrimes. It lists 10 common cybercrimes such as phishing, blackmail, hacking, sports betting fraud, and child pornography. It then provides examples of how some of these crimes are committed, such as using ride-hailing apps to transport drugs. The document concludes by outlining three ways to combat cybercrimes: implementing network security measures, investigating cybercrimes through IP address tracking, and establishing legal penalties for perpetrators.
• Combatting cybercrimes At the end of this lesson, the students should be able to:
1. understand the several problems ICT has created in
their generation; and
2. Demonstrate ways on how to combat cybercrimes
through jingle, role play, etc. Cybercrimes
Cybercrimes are illegal acts
done through the use of the Internet. In 2012, Stephen Nale (Complex.com) posted a list of ten most common Internet cybercrimes as follows:
1. Phishing/Spoofing – the act of sending multiple
emails to multiple users in hopes of having a number of them clicking on the links or malwares attached to the email.
If the message has a ".exe," ".scr,"
"zip" or ".bat" file attached, consider that a red flag and don't open it or follow any instructions. • 2. Blackmail/Extortion – the act of using the Internet to threaten or damage someone’s reputation to extort money or anything else of value. This can be avoided if you are aware of what you should post on the Internet. • 3. Accessing Stored Communications – or hacking; the act of obtaining unauthorized access to data from a computer network. • In late 2015, a group of Anonymous Philippines hacked the Twitter account of actress Maine Mendoza, who plays the famous character Yaya Dub of the popular AlDub tandem and posted links and messages on the account. • 4. Sports Betting – the act of wagering on any sports event over the Internet. In some countries, gambling (including sports betting) is illegal even if you are doing it over the Internet. • 5. Non-Delivery of Merchandise – the act of devising a scheme wherein a culprit posts an item or service for sale over the Internet and once the transactions have been done, does not really give the item or service. • 6. Electronic Harassment – the act of anonymously using the Internet to harass, abuse, threaten, or annoy other people. • 7.Child Pornography – the act of using the Internet to show child pornography. This act is highly punishable by law. • 8. Drug Trafficking – the act of selling illegal substances using the Internet. • Philippine Drug Enforcement Agency (PDEA) director Czerina Aquino said tech-savvy drug rings have learned to use the services of ride-hailing apps to transport drugs to their clients.
• “Based on reports, ‘yung mga customers ni Atillano nago-
order sa kanya through on-line. And upon online payments, through bank-to-bank or credit card transactions, nagde-deliver sya ng illegal drugs using Grab or Uber. Basically it’s an on-line transaction,” said Aquino. • 9. Criminal Copyright Infringement – the act of piracy mainly for financial gain. In late 2014, the number one pirate website, ThePirateBay, was raided for the second time due to years of pirating movies, music, games, books, and other software. These kinds of websites earn money through advertising. 10. Prostitution Persuading, inducing, enticing, or coercing any individual to travel in interstate commerce to engage in prostitution.The internet has become one of the preferred methods of communication for prostitution, as clients and prostitutes are less vulnerable to arrest or assault and for its convenience Combatting Cybercrimes
1. Network Security. Before a hacker can get through the
unauthorized files he or she is targeting, the hacker has to get through several security measures like firewalls, secure connections, passwords, anti-malwares, and data encryptions. The Disadvantages of ICT 177 2. Investigation. URL tracing and logging are used by websites to track your unique IP addresses. This can be used by investigators to trace hackers. In piracy, trackers are used to identify IP addresses currently sharing a pirated file. 3. Penalties. More and more laws are being created and implemented today. Penalties include both a fine and imprisonment.