It is about the different threats that can be obtained through accessing the internet, the different government provisions and how to stay safe online.
2. Each individual when accessing the
World Wide Web is concerned with the
safety of his or her terminal or computer and
the information that will be transmitted or
received.
3. Spam
• Refers to the transmission
of unsolicited messages
from various origins
using electronic
messaging systems such
as e-mail and chat
messengers
• A tool for advertisement
• Unsolicited bulk e-mail
(UBE)
4.
5. Phishing
• Defined as a software or
a program used by an
attacker to obtain
personal information
• Commonly target user
passwords to hack and
take control of a user
account
6.
7. Malware
• Short term for malicious
software
• A computer software
sent by attackers to
inflict chaos on a
computer’s operation
and processes
8. How to avoid these threats?
A very effective way of avoiding these threats is
verifying the authenticity and credibility of the Web source.
The methods are similar to the methods of verifying the
authenticity of information from the World Wide Web.
10. The Philippine government ensures the
welfare of its people in their ICT experience by
enacting various laws and regulations. There are
incidents of theft, scam, phishing and other
activities that victimize Filipino people.
12. What is Bullying?
• Defined as “severe or repeated use by one or more
students of a written, verbal or electronic expression, or a
physical gesture, or any combination thereof, directed to
another student that has the effect of actually causing or
placing the latter in reasonable fear of physical or
emotional harm or damage to his property.”
13. This law includes protection of individuals
from bullying through electronic means.
Bullying invades an individual’s privacy by
using photos and other information meant to
disgrace that individual.
15. This law protects an individual from
various unwanted online and cyber acts that
may harm or evade one’s privacy and
integrity.
16. Cybercime offenses include, but are not
limited to:
• Integrity and availability of data
• Illegal access of computers through remote means
without permission
• Interception of one’s information from a private
conversation or correspondence
• Acquisition of passwords and other vital information
from an individual
• Computer forgery
• Libel