SlideShare a Scribd company logo
LESSON 10
Group 10 St. Thomas Aquinas
Group Members:
Lester Aporado
Ejay Mark Ambeguia
Krizalyn De Vera
ONLINE CRIMES AND
HAZARDS
Hacking is unauthorized use of someone else's computer or online account.
E-mail hacking is one of the most common types of online hacking because it is where most
information on a user's online accounts can be found. Once a hacker is able to enter your e-mail
account, he or she would be
ableto view your personal information and access your other online accounts, giving him the power
to do unauthorized transactions or activities through your account.There are many ways for
hacking to happen. For one, if anyone has access to a computer you are using, it's easy to install a
keystroke logger (keylogger) software, a program which allows the hacker to know everything
you type, such as passwords. Hackers can also use trial and error in the input of passwords, relying
on Personal information they know about you such as birthdays or names of loved ones. Viruses
can also be used to get into your computer to harvest information. Furthermore, there are many
professional hackers online whom people pay to hack any account.
HACKING
As mentioned earlier, hacking can also occur through computer viruses. A computer virus
is a computer program that spreads from one computer to another computer and
interferes with computer operation. If your computer is infected with a virus, it can
corrupt or delete any data you have stored or even delete everything on your hard disk.
Viruses are commonly spread through attachments in e-mail messages, links in instant
messages, or through files and programs you download online.
Three of the most common types of computer virus are trojans, worms, and e-mail
viruses. A trojan is a computer program that appears to be an interesting or familiar
application, file, or e-mail attachment, but is only masquerading as such or hiding malware
that causes damage when you click and run it. Trojans can do a number of nasty things on
your computer, the least of which tracks your browsing habits, but in severe cases may
even cause your computer from functioning properly.
VIRUSES
The sneaky nature of trojans allows them to enter the victim's computer undetected, but
once in, they can be a nuisance, frequently making their presence known.
A worm is a small piece of software that uses computer networks and security flaws to
replicate itself. More complex than trojans (although they can be brought in by one),
worms usually attack multi-user systems and can spread over a network of computers
through e-mail circulation.
An e-mail virus spreads as an attachment to e-mail messages and replicates itself by
automatically mailing itself to dozens of people in the victim's e-mail address book. Some
e-mail viruses don't even require you to double-click as they automatically launch when
you preview an e-mail message.
VIRUSES
A spam is the electronic equivalent of junk mail. Spamming is flooding message
accounts over the Internet with copies of the same message, mostly to advertise,
campaign something, and distribute jokes or words of wisdom to a lot of people at
the same time. Spam costs very little to send, hence "spammers" use this method to
advertise their products, services, or schemes to as many people as possible. Below
are some of the most common types of spam and their definitions.
SPAMMING
TYPES OF SPAMMING
When Spammed
You may not be able to totally avoid receiving spam messages, but you can take the necessary precautions so as not to be a victim of spam abuse.
Here are some pointers.
1. Be selective when responding to messages.
If you receive any unwelcome advertising in an e-mail, private message, or any other function, don't send a reply in any form, such as by clicking
on any link. Doing so would inform the spammer that you exist. If you receive a message that is obviously spam, delete it immediately without
opening. Spam messages often use nonsensical or meaningless subject heads with liberal use of characters or all caps.
2. Be careful of signing up or posting to various websites.
When registering on a website or online group, don't use your personal or business e-mail address. Create another e-mail address specifically for
this purpose. It's also advisable to disguise your e-mail address when posting it to websites. Instead of using plain text such as
girl.free@yahoo.com, strip out periods and "@" symbols and use GIRL FREE AT YAHOO DOT COM to prevent spam crawlers from identifying your e-
mail address. Furthermore, avoid using your e-mail address as your screen name in chat rooms or online forums.
3. Create e-mail filters.
There are various ways to filter your e-mail and separate the genuine e-mails from those that are junk. No filter is 100% effective but a good
filter can lessen the amount of spam you receive significantly. Most of the common e-mail services such as Yahoo! and Gmail offer a standard
filtering service. If you want extra protection, you can install additional filtering software such as Mailwasher (www.mailwasher.net) or subscribe
to the paid filter of your service provider.
4. Make sure not to aid in perpetuating forwarded messages.
Forwarded e-mails often list the e-mail addresses of everyone who has forwarded the message as well as the e-mail addresses of the recipients,
making it easy for spammers to find long lists of e-mail addresses to target. To avoid forwarding, use the copy-paste option to transfer the
content you wish to send in a fresh e-mail.
There are many variations of frauds and scams on the Internet created by fake
sellers who use computer services to promote bogus services, products, and
investment opportunities, among others. The common goal is to fool you into giving
away money and/or bank information. But you have to find a balance between
caution and adopting a go-for-it attitude. The overly cautious trait of people can
actually prevent them from finding new legitimate opportunities. Not everything
suspicious you encounter on the Internet is a scam. Some are actually worthwhile
checking out.
FRAUDS AND SCAMS
What follows is a list of guidelines to give you a nose for online frauds or scams:
1. If something is too good to be true, then most likely it is.
If a certain site says you can get an unbelievably large amount of money quickly with the least effort or investment,
then it is likely bogus as no such kind of business opportunity exists in the real world. Indeed, such offers will generate
big money quickly, but only for the scammer and not for you! Legitimate offers are usually those that come from
companies that have been in the business for a long time, promise reasonable returns, have other financial interests, and
have earned credibility with members through the years.
2. Be wary of products that are offered too cheap.
If a certain product is offered too cheap than usual, don't rush into buying as there may be a catch, particularly if the
product is a physical object and not just a digital file that can be downloaded.
FRAUDS AND SCAMS
3. Be cautious of buyers or sellers who have insufficient contact information provided on their sites.
Legitimate and certified businesses are registered and often provide complete contact information such as phone
numbers, office location, and e-mail addresses.
They also have well-written copy in English. Petty scammers often work alone (or with a handful of cronies), are often
careless (in spite of their technical know-how), write poorly, and design pages hastily with little regard for taste or the
target customers.
4. Research will go a long way.
Just because a seller has logos of affiliations or certifications from "credible organizations" doesn't mean you can
already trust it outright. These so-called credentials are not assurances you will not be duped. Check to see if those
organizations indeed exist. Check for any feedback on the company and try calling or e-mailing support.
FRAUDS AND SCAMS
COMMON TYPES PF ONLINE FRAUDS AND SCAMS
Cyber stalking is the use of the Internet by an individual or a group of individuals to harass another
individual, group of individuals, or organization. Cyber stalking can involve threats, identity theft, false
accusations, solicitation of minors for sexual purposes, and gathering of information for harassment
purposes. Cyber stalkers often meet or target their victims through search engines, online forums,
bulletin boards, chat rooms, and social networks. They attempt to track or follow the victim's Internet
activity. They can also post derogatory statements about their stalking target on websites to harass
the victim. Victims of cyber stalking may not even know they are being stalked. Cyber stalking can
disrupt the lives of victims and cause a lot of fear and a feeling of being threatened.
CYBER STALKING
THANK YOU

More Related Content

PPTX
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
PPTX
Spamming for ecommerce student of college
PPTX
Spam & Phishing
PDF
Computer 10: Lesson 10 - Online Crimes and Hazards
PPSX
IDENTIFYING CYBER THREATS NEAR YOU
PPT
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
DOCX
Final paper
PPTX
Unit 3 - Cyber Crime.pptx
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
Spamming for ecommerce student of college
Spam & Phishing
Computer 10: Lesson 10 - Online Crimes and Hazards
IDENTIFYING CYBER THREATS NEAR YOU
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
Final paper
Unit 3 - Cyber Crime.pptx

Similar to LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS (20)

PPT
Internet Safety: I
ODP
The Net is Dangerous
PPTX
Web spam
PPT
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
PDF
IWC - Phishing and Internet Scams
DOCX
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
DOCX
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
PPT
Cel1
PPT
PPTX
Internet issues
PPT
Email basics
PPT
The Basics Of Internet Safety
PDF
Cy Q Good One
PPT
Protecting Yourself Online
PDF
Internet Safety for 1950s Adults and Beginners
PDF
How to Protect Your PC from Malware, Ransomware, Virus
PDF
Online Security
PPTX
Email Security Awareness
DOCX
Spam!
PPTX
Online-Safety-Security-and-etiquette.pptx
Internet Safety: I
The Net is Dangerous
Web spam
E-Mail Crimes - Gurugram Cyber Crime Cell July 2017
IWC - Phishing and Internet Scams
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Cel1
Internet issues
Email basics
The Basics Of Internet Safety
Cy Q Good One
Protecting Yourself Online
Internet Safety for 1950s Adults and Beginners
How to Protect Your PC from Malware, Ransomware, Virus
Online Security
Email Security Awareness
Spam!
Online-Safety-Security-and-etiquette.pptx
Ad

Recently uploaded (20)

PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
Testing WebRTC applications at scale.pdf
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Funds Management Learning Material for Beg
Introuction about ICD -10 and ICD-11 PPT.pptx
522797556-Unit-2-Temperature-measurement-1-1.pptx
The New Creative Director: How AI Tools for Social Media Content Creation Are...
introduction about ICD -10 & ICD-11 ppt.pptx
Cloud-Scale Log Monitoring _ Datadog.pdf
Decoding a Decade: 10 Years of Applied CTI Discipline
Module 1 - Cyber Law and Ethics 101.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
international classification of diseases ICD-10 review PPT.pptx
Testing WebRTC applications at scale.pdf
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PptxGenJS_Demo_Chart_20250317130215833.pptx
WebRTC in SignalWire - troubleshooting media negotiation
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Introuction about WHO-FIC in ICD-10.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Funds Management Learning Material for Beg
Ad

LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS

  • 1. LESSON 10 Group 10 St. Thomas Aquinas Group Members: Lester Aporado Ejay Mark Ambeguia Krizalyn De Vera
  • 3. Hacking is unauthorized use of someone else's computer or online account. E-mail hacking is one of the most common types of online hacking because it is where most information on a user's online accounts can be found. Once a hacker is able to enter your e-mail account, he or she would be ableto view your personal information and access your other online accounts, giving him the power to do unauthorized transactions or activities through your account.There are many ways for hacking to happen. For one, if anyone has access to a computer you are using, it's easy to install a keystroke logger (keylogger) software, a program which allows the hacker to know everything you type, such as passwords. Hackers can also use trial and error in the input of passwords, relying on Personal information they know about you such as birthdays or names of loved ones. Viruses can also be used to get into your computer to harvest information. Furthermore, there are many professional hackers online whom people pay to hack any account. HACKING
  • 4. As mentioned earlier, hacking can also occur through computer viruses. A computer virus is a computer program that spreads from one computer to another computer and interferes with computer operation. If your computer is infected with a virus, it can corrupt or delete any data you have stored or even delete everything on your hard disk. Viruses are commonly spread through attachments in e-mail messages, links in instant messages, or through files and programs you download online. Three of the most common types of computer virus are trojans, worms, and e-mail viruses. A trojan is a computer program that appears to be an interesting or familiar application, file, or e-mail attachment, but is only masquerading as such or hiding malware that causes damage when you click and run it. Trojans can do a number of nasty things on your computer, the least of which tracks your browsing habits, but in severe cases may even cause your computer from functioning properly. VIRUSES
  • 5. The sneaky nature of trojans allows them to enter the victim's computer undetected, but once in, they can be a nuisance, frequently making their presence known. A worm is a small piece of software that uses computer networks and security flaws to replicate itself. More complex than trojans (although they can be brought in by one), worms usually attack multi-user systems and can spread over a network of computers through e-mail circulation. An e-mail virus spreads as an attachment to e-mail messages and replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require you to double-click as they automatically launch when you preview an e-mail message. VIRUSES
  • 6. A spam is the electronic equivalent of junk mail. Spamming is flooding message accounts over the Internet with copies of the same message, mostly to advertise, campaign something, and distribute jokes or words of wisdom to a lot of people at the same time. Spam costs very little to send, hence "spammers" use this method to advertise their products, services, or schemes to as many people as possible. Below are some of the most common types of spam and their definitions. SPAMMING
  • 8. When Spammed You may not be able to totally avoid receiving spam messages, but you can take the necessary precautions so as not to be a victim of spam abuse. Here are some pointers. 1. Be selective when responding to messages. If you receive any unwelcome advertising in an e-mail, private message, or any other function, don't send a reply in any form, such as by clicking on any link. Doing so would inform the spammer that you exist. If you receive a message that is obviously spam, delete it immediately without opening. Spam messages often use nonsensical or meaningless subject heads with liberal use of characters or all caps. 2. Be careful of signing up or posting to various websites. When registering on a website or online group, don't use your personal or business e-mail address. Create another e-mail address specifically for this purpose. It's also advisable to disguise your e-mail address when posting it to websites. Instead of using plain text such as girl.free@yahoo.com, strip out periods and "@" symbols and use GIRL FREE AT YAHOO DOT COM to prevent spam crawlers from identifying your e- mail address. Furthermore, avoid using your e-mail address as your screen name in chat rooms or online forums. 3. Create e-mail filters. There are various ways to filter your e-mail and separate the genuine e-mails from those that are junk. No filter is 100% effective but a good filter can lessen the amount of spam you receive significantly. Most of the common e-mail services such as Yahoo! and Gmail offer a standard filtering service. If you want extra protection, you can install additional filtering software such as Mailwasher (www.mailwasher.net) or subscribe to the paid filter of your service provider. 4. Make sure not to aid in perpetuating forwarded messages. Forwarded e-mails often list the e-mail addresses of everyone who has forwarded the message as well as the e-mail addresses of the recipients, making it easy for spammers to find long lists of e-mail addresses to target. To avoid forwarding, use the copy-paste option to transfer the content you wish to send in a fresh e-mail.
  • 9. There are many variations of frauds and scams on the Internet created by fake sellers who use computer services to promote bogus services, products, and investment opportunities, among others. The common goal is to fool you into giving away money and/or bank information. But you have to find a balance between caution and adopting a go-for-it attitude. The overly cautious trait of people can actually prevent them from finding new legitimate opportunities. Not everything suspicious you encounter on the Internet is a scam. Some are actually worthwhile checking out. FRAUDS AND SCAMS
  • 10. What follows is a list of guidelines to give you a nose for online frauds or scams: 1. If something is too good to be true, then most likely it is. If a certain site says you can get an unbelievably large amount of money quickly with the least effort or investment, then it is likely bogus as no such kind of business opportunity exists in the real world. Indeed, such offers will generate big money quickly, but only for the scammer and not for you! Legitimate offers are usually those that come from companies that have been in the business for a long time, promise reasonable returns, have other financial interests, and have earned credibility with members through the years. 2. Be wary of products that are offered too cheap. If a certain product is offered too cheap than usual, don't rush into buying as there may be a catch, particularly if the product is a physical object and not just a digital file that can be downloaded. FRAUDS AND SCAMS
  • 11. 3. Be cautious of buyers or sellers who have insufficient contact information provided on their sites. Legitimate and certified businesses are registered and often provide complete contact information such as phone numbers, office location, and e-mail addresses. They also have well-written copy in English. Petty scammers often work alone (or with a handful of cronies), are often careless (in spite of their technical know-how), write poorly, and design pages hastily with little regard for taste or the target customers. 4. Research will go a long way. Just because a seller has logos of affiliations or certifications from "credible organizations" doesn't mean you can already trust it outright. These so-called credentials are not assurances you will not be duped. Check to see if those organizations indeed exist. Check for any feedback on the company and try calling or e-mailing support. FRAUDS AND SCAMS
  • 12. COMMON TYPES PF ONLINE FRAUDS AND SCAMS
  • 13. Cyber stalking is the use of the Internet by an individual or a group of individuals to harass another individual, group of individuals, or organization. Cyber stalking can involve threats, identity theft, false accusations, solicitation of minors for sexual purposes, and gathering of information for harassment purposes. Cyber stalkers often meet or target their victims through search engines, online forums, bulletin boards, chat rooms, and social networks. They attempt to track or follow the victim's Internet activity. They can also post derogatory statements about their stalking target on websites to harass the victim. Victims of cyber stalking may not even know they are being stalked. Cyber stalking can disrupt the lives of victims and cause a lot of fear and a feeling of being threatened. CYBER STALKING