The Disadvantages Of ICT PDF

Summary

This document discusses the disadvantages of ICT, focusing on cybercrimes. It identifies various illegal online activities like phishing, blackmail, and unauthorized access to data. It also briefly outlines methods for combating cybercrimes and investigating online vulnerabilities, along with potential punishments for cybercriminals.

Full Transcript

The Disadvantages of ICT Cybercrimes Cybercrimes are illegal acts done through the use of the internet. In 2012, Stepehen Nale posted a list of ten most common internet cybercrimes a follows: 1. Phishing/ Spoofing The act of sending multiple emails to multiple users hope of...

The Disadvantages of ICT Cybercrimes Cybercrimes are illegal acts done through the use of the internet. In 2012, Stepehen Nale posted a list of ten most common internet cybercrimes a follows: 1. Phishing/ Spoofing The act of sending multiple emails to multiple users hope of having a number of them clicking on the links or malwares attached to the email. 2. BLACKMAIL/ EXTORTION The act of using the internet to threaten or damage someone’s reputation to extort money or anything else of value. 3. ACCESING STORED COMMUNICATION The act of obtaining unauthorized access to data from a computer network. 4. SPORTS BETTING The act of wagering on any sports event over the internet. Illegal acts which is done online 7. CHILD PORNOGRAPHY The act of using the internet to show child pornography. This act is highly punishable by law. 5. NON-DELIVERY MERCHANDISE The act of devising a scheme wherein a culprit posts an item or service for sale on the internet and once the transactions have been done, does not really give the item or service. 6. ELECTRONIC HARASSMENT The act of anonymously using the Internet to harass, abuse, threaten, or annoy other people. 8. PROSTITUTION The act of using the internet to engage in prostitution. 9. DRUG TRAFFICKING The act of selling illegal substances using the internet. 10.Criminal Copyright Infringement The act of piracy mainly for financial gain. COMBATTING CYBERCRIMES NETWORK SECURITY Before a hacker can get through the unauthorized files he or she is targeting, the hacker has to get though several security measures like firewalls, secure connections, passwords, anti-malwares, and data encryptions. INVESTIGATION URL tracing and logging are used by websites to track your unique IP addresses. This can be used by investigators to trace hackers. PENALTIES More and more laws are being created and implemented today. Penalties include both a fine and imprisonment. YOUR TURN TO SHINE 1.What are other cybercrimes that were not discussed in this lesson that you think students of your generation should be aware of? Why? 2. Are the laws on copyright being implemented in the Philippins? Defend your answer. 3. As a future professional in your respective field, what are the things that you think ICT can do to help you in your field?

Use Quizgecko on...
Browser
Browser