What is internet? The internet is a worldwide collection of computer networks, cooperating with each other to exchange data using a common software standard.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Cyber crime impact on Businesses Bogdan Manolea RITI dot-Gov.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
Discovering Computers 2010
Cybercrime Law The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No , is a law in the Philippines approved on 12 September.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
E – COMMERCE - BY: MARK ANTHONY P. CEZAR Introduction.
Internet safety By Lydia Snowden.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Viruses.
Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy Chapter Five This multimedia product and its contents.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
Also called net is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals.
A Boon or a Curse. What is the ‘Internet’?  It is a network of networks that consists of millions of private, public, academic, business, and government.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
CYBER CRIME.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
LESSON 2: Internet, Computer Ethics and Security
What is Internet? - Is a worldwide collection of computers networks, cooperating with each other to exchange data using a common software standard, on.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Peter Coroneos Chief Executive Internet Industry Association (IIA) AVAR Conference Sydney November 7, 2003.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
What is Spam? d min.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Internet safety By Suman Nazir
Computer crimes.
Privacy, Security and Ethics
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Is a worldwide collection of computer networks, cooperating with each other to exchange data. The Internet provides the following main facilities: 1. .
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Vocabulary Internet Flash cards Computer Science – Espinosa.
Lecture 3 1Norazirah Ayob, FEB. Ch  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
ST. JOHN WHAT IS INTERNET?? The internet is a worldwide collection of computer network The internet provides following main facilities: 1 2 chat.
IT Security  .
A Project on CYBER SECURITY
Seminar On Cyber Crime Submitted To: Submitted By:
Privacy, Security, and Ethics
Presentation transcript:

What is internet? The internet is a worldwide collection of computer networks, cooperating with each other to exchange data using a common software standard on which end-user services, such as World Wide Web sites or data archives, are located,enabling data and other information to be exchanged also called the Net. The internet provides following main facilities: Chat 3. Searching jobs 4. Advertising for business 5. E-commerce 6. Searching information

A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide some kind of useful information. All the data found on a website is bounded together by code, which can range from simple markup like HTML to less Simple scripting languages like PHP, Perl or Asp.

Portal Website News Website Informational Website Business/Marketing Website: Business website can be divided into: a. Small Business b. Large Business Educational Website Entertainment Website Advocacy Website Blog Website Wiki Website Content Aggregator Website Social Network Website Search Engine, Directories, Yellow Pages and Portals Website

Netiquette or Net Etiquette, refers to etiquette on the Internet. It is all about proper ways in which to use a network and to determine whether information is reliable, while emphasizing four important points: 1. Real People Exist Behind The Computers. 2. Protect Your Privacy. 3. Avoid Spamming.

Software Piracy Computer Viruses/Worms Plagiarism Hacking File Privacy Intellectual Property Rights Copyright Information Privacy

To curb down the cybercrimes in the Philippines, the Philippine Congress has ratified the law penalizing violators of cybercrimes and this is the Republic Act or also known as the “Cybercrime Prevention Act of 2012”. The purpose of this act is to define cybercrime, provide for the prevention, investigation, suppression and penalties therefore and for other purposes.

MANILA, Philippines — Almost 9 out of 10 Filipino Internet users have been victimized by cybercrime or a malicious activity on the Internet at one time or another, the Department of Justice (DOJ) primer on facts and trends about cybercrimes committed in the country, said on Tuesday. The primer on Philippine cybercrime has been prepared by the DOJ as part of its advocacy program to prevent abuses in cyberspace as the legality of the new law against cybercrime is being deliberated in the Supreme Court. In October 2012, the implementation of the new Cyber-crime Prevention Act of 2012 was suspended by the high tribunal for four months until Feb.6 following 15 petitions seeking for the law to be declared unconstitutional wholly or partially. The high court is set to hear on Jan.15 oral arguments on the law that became controversial because of its provisions that included the criminalization of online libel. n the three-page primer presented in a question and answer format, the DOJ said that cybercrime has become “one of the fastest growing crimes globally.” In the Philippines, the primer quoted a 2010 report of the security software firm Symantec that as many as 87 percent of Filipino internet users (nearly nine out of 10) were identified as victims of crimes and malicious activities committed online. These included being victimized in activities such as malware (virus and Trojan) invasion; online or phishing scams; sexual predation; and services in social networking site like Facebook and Twitter. From 2003 to 2012, the Anti-Transnational Crime Division (ATCD) of the Criminal Investigation and Detection Group (CIDG) of the Philippine National Police (PNP) looked into 2,778 referred cases of computer crimes from government agencies and private individuals nationwide. The primer defined cybercrime as a crime committed “with or through the use of information and communication technologies such as radio, television, cellullar phone, computer and network, and other communication device or application.”

Quoting the 2001 Budapest Convention on Cybercrime, the primer said there were four types of cybercrime — offenses against the confidentiality, integrity and availability of computer data systems; computer-related offenses; content-related offenses and offenses related to infringements of copyright and related rights. The primer also noted that the first cybercrime case in the country was the controversial case involving Onel de Guzman who in 2000 released the “I Love You” virus. “The case filed against De Guzman was dismissed at the first stage because there was no law punishing the deed as of that time in May 2000 in the Philippines,” it said. The primer also said that two cybercriminals had been convicted for hacking under Republic Act no or the Electronic Commerce Act or the E-Commerce Act. The first conviction involved a person caught hacking the government portal gov.ph and other government websites while the other involved a person who used the Business Process Outsourcing (BPO) call center provider Sitel Philippines Corporation to illegally secure credit card information from the company’s sister firm, Sitel USA. Since the new law against cybercrime has been suspended, the government is dealing with cybercrime-related cases using existing laws such as the E-Commerce Act, RA 9995 or the Anti-Photo and Voyeurism Act of 2009, RA 9725 or the Anti-Child Pornography Act of 2009, RA 9208 or the Anti-Trafficking in Persons Act of 2003, RA 8484 or the Access Device Regulation Act of 1998 and RA 4200 or the Anti-Wire Tapping Law.

Use Strong Passwords Secure Your Computer Activate your firewall Use anti-virus Block spyware attacks Be Social-Media Savvy Secure your Mobile Devices Install the latest operating system updates Protect Your Data Secure your wireless network Protect your e- identity Avoid being scammed Call the right person for help