SlideShare a Scribd company logo
Data
Protection
Security
and
OBJECTIVES
At the end of the lesson, you should be able to :
1. Understand what cybersecurity is;
2. Understand what cybercrime is;
3. Identify the different types of malicious software; and
4. Know how to secure your information and protect yourself.
CYBERSECURITY
Republic Act No. 10175: Cybercrime Prevention
Act of 2012
• Cybersecurity is the collection of tools, policies, actions, practices, and
technologies that can be used to protect the cyber environment.
• Cyber – any computer or computer network, the medium in which
online communication occurs. This law also specifies that a computer is
an electronic, magnetic, electrochemical, or other data processing or
communications device that is capable of performing logical, arithmetic,
routing, or storage functions and which includes storage facility or
communications facility that is directly related to the device.
• Computer System – is any device or group of interconnected or related
devices that performs automated processing of data.
• Information security – or data security is the preservation of
information or computer data’s confidentiality, integrity, and availability.
Republic Act No. 10175: Cybercrime
Prevention Act of 2012 –continuation.
• Cybercrimes can be committed with the use of cell
phones, social media, and other platforms.
• With these definitions, smartphones and other types of
mobile phones are also considered as computers and
computer systems that are also part of the cyber
environment. On the other hand, calculators, while they
are considered as computers in other uses, may not fit in
this definition because they do not carry a storage facility or
communications facility.
Cybercrime or Computer Crime
Cybercrime – is an
offense against the
confidentiality, integrity,
and availability of
information or computer
data.
The following is a
list of
cybercrimes:
L I B E L
This is the act of publishing
false statements with the
use of computers or
computer systems. An
example of this cybercrime
includes defamatory false
statements posted on social
media.
Illegal Access
This is the access to a computer
system without right. For
example, it is considered illegal
access for someone to take your
phone without your permission
and read the contents of your
private messages. Another
example would be someone
accessing your personal computer
without your permission.
Data Interference
This is the intended
alteration, damaging,
deleting, or deteriorating of
computer data, electronic
document, or electronic data
message without authority.
Illegal Interception
This is the obstruction from by technical means
without right of any non-public transmission of
computer data to, from, or within a computer
system including electromagnetic emissions
from a computer system carrying such
computer data. An example of illegal
interception is when your emails, text messages,
or chats are monitored with the use of software
without your knowledge or permission.
This is the purposeful alteration or reckless
hindering or interference with the
functioning of a computer or computer
network. This is done when someone
inputs, transmits, damages, deletes, alters,
deteriorates, or suppresses computer data
or program, electronic document, or
electronic data message without authority
System Interference
This is the act of intentionally
using computer data for the
purpose of creating a
fraudulent or dishonest design.
For example, a person built a
website that pretends to be the
homepage of a bank or another
organization.
Computer-related Forgery
This is the intentional possession, misuse,
use, transfer, deletion, or change of an
identifying information belonging to
another person without authority. An
example is when someone uses your
profile picture to pose as a different
person on social media. It can also be
considered identity theft when another
person uses our name and pictures and
pretend to be you on social media.
Computer-related Identity Theft
Malware
Short for malicious software, is
a program that do unwanted
actions or damage to an operating
system in a seamless manner, with
the intent of harming the
computer or user. It is a product
of cybercrimes, particularly by
data interference and system
interference.
The following are the
different types of
malware
V I R U S
Is a malicious program with the
possibility of self—replication. In a
computer, it seeks other files trying to
infect them and the ultimate goal is to
spread to other computers. Depending
on what malicious code it contains, it
may cause more or less damage to your
computer.
W O R M S
Like viruses, possess the ability of
self-replication; however, they
cannot infect other programs.
Their usual intent is to take
control of your computer and
allow remote control through
backdoor methods.
T R O J A N H O R S E
Is a program that appear to be useful or good to
mislead users of its true intent. It can be presented in
the form of games or files in e-mail attachments. It
infiltrates the computer and deals negative effects,
such as controlling your computer, deleting data,
spreading viruses, sending spam, etc. It does not
replicate and it needs to be executed. Users need to
download or install trojans for them to take effect.
S P Y W A R E
Is a program that secretly collects data
about computer users (passwords, credit
card numbers, etc.); therefore, it spies on
users. The most common spyware
infections usually occur while visiting
suspicious websites.
A D W A R E
Is a program that uses collected
data about a user in order to
display advertisements in a way
regarded as intrusive. It usually
manifests itself in the form of
many pop-up windows that
display ads.
Best Practice against Cybercrime and
Malware
1. Report issues to the web admin. If you find yourself a victim of
cybercrime, immediately report the issue to the web admin, particularly the
site where the cybercrime occurred. If you see anyone committing identity
theft online, especially on social media, report this to the web administrator.
2. Always Log Out. Never leave your account logged in especially when you
are going away. This will prevent security breaches such as illegal access.
3. Use anti-malware defenses. Install antivirus software and setup a firewall.
4. Regularly scan for viruses. A weekly or even daily check-up of
your files and programs will help clean up or delete infected files
from your computer.
5. Avoid visiting suspicious websites. Viruses often come from
these websites. Consider blocking access to these websites.
6. Always scan external storage devices. Before opening the
contents of storage devices in your computer, scan them first for
malware. Never use a storage device that you just picked up from
somewhere.
7. Clear your history. Clear your browsing history, your cookies,
cache, and data after using a computer. Do this when you use a
public computer. This way, you protect your privacy and personal
information from being stolen.
8. Backup your files. Have a hard drive where you can regularly back up
your files. This is a precaution so that if your computer needs to be
rebooted for any reason, your files are secure from loss of data.
8. Strengthen your passwords. When creating passwords, never use a
recognizable word. Always use a combination of letters and special
characters. Your passwords must vary for different accounts. Never use
your birthday or any other personal information as your password. Most
importantly, never reveal your password to anyone.
9. Never download content from unverified sources. Make sure to
download from official distributors, manufacturers or creators. If you use
a smartphone, avoid downloading from third-party sources.
10. Use Two-Step verification. This security feature adds another layer of
protection in your accounts by asking a verification code that will be sent
to your second device or phone after you attempt to login.
Other Guidelines
1. Never read chat messages that are not yours. Unless you were given the permission to
view these messages, it is against the law to access the private messages of another person
without their permission.
2. Always verify the source of information. Be very critical or doubtful of any
information or news that you se on the internet. Only rely on reputable and veritable
sources and not on blog sites pretending to be news sites.
3. Never spread false information. Do not share information that did not pass a thorough
critical analysis. If you are baited by sensational headline, take time to read the whole
content of the news, only then should you make an objective, informed opinion about it.
4. Never malign the dignity or reputation of anyone. Treat everyone with respect. Never
pick a fight in cyberspace, especially on social media.
END

More Related Content

PPTX
Cybercrime
PPTX
TRAFFIC MANAGEMENT AND 1.pptx
PDF
CAT: Master List of Commands
PPTX
Privacy in simple
PPTX
Cybercrime law
PPTX
Living in the IT Era - Lesson 8.pptx
PPTX
OSAEC - pptx
PPT
Anti child pornography
Cybercrime
TRAFFIC MANAGEMENT AND 1.pptx
CAT: Master List of Commands
Privacy in simple
Cybercrime law
Living in the IT Era - Lesson 8.pptx
OSAEC - pptx
Anti child pornography

What's hot (20)

PPT
ANTI BULLYING PRESENTATION.ppt
PPTX
Crimes nstp
PDF
Ethical and Social Issues in ICT
PPTX
Republic Act 10175 - Cyber Crime Prevention Act of 2012
PPTX
Social and professional issuesin it
PDF
Online system, function and platforms.pdf
PPTX
REPUBLIC ACT NO 6975 REPORTING. pptx
PPTX
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
PPTX
Current and Future Trends of Media and Information - Part 1.pptx
PDF
The E-Commerce Act - Republic Act 8792
DOCX
MIL Exam.docx
PPT
2. digital age
PPTX
Grades 7 to 8 Anti- OSAEC and CSAEM session.pptx
PPTX
Criminal procedure(new)
PPTX
ppt on child pornography and cyber crime
PPTX
Media and Information Literacy
PPTX
Digital access
DOCX
Form 137
PPTX
Opportunities, Challenges and Power of Media Information
PPTX
MIL-Q1M8.pptx
ANTI BULLYING PRESENTATION.ppt
Crimes nstp
Ethical and Social Issues in ICT
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Social and professional issuesin it
Online system, function and platforms.pdf
REPUBLIC ACT NO 6975 REPORTING. pptx
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Current and Future Trends of Media and Information - Part 1.pptx
The E-Commerce Act - Republic Act 8792
MIL Exam.docx
2. digital age
Grades 7 to 8 Anti- OSAEC and CSAEM session.pptx
Criminal procedure(new)
ppt on child pornography and cyber crime
Media and Information Literacy
Digital access
Form 137
Opportunities, Challenges and Power of Media Information
MIL-Q1M8.pptx
Ad

Similar to Lesson iii-security-and-data-protection (20)

PPTX
COMPUTER ETHICS.pptx
PPTX
Computer security
PPT
Ch # 10 computer security risks and safe guards
DOCX
Cyber crime
PPTX
CYBER CRIME AWARENESS (Thematic Presentation)
PPTX
BCE L-3omputer security Basics.pptx
PPT
Cyber Crime
DOCX
Computer virus
PPTX
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
DOCX
THESIS-2(2)
PPTX
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
PPTX
Presentation on cyber security
PDF
cyber safety.pdf
PDF
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
PPTX
Kinds of cybercrime (Social Networking for Social integration .pptx
PPSX
Cyber security awareness presentation
PDF
cybersecurityawareness-presentation-170627121043.pdf
PPTX
Internet security
PPTX
Computer Security risks Shelly
PPT
Shailendra Pandey.ppt
COMPUTER ETHICS.pptx
Computer security
Ch # 10 computer security risks and safe guards
Cyber crime
CYBER CRIME AWARENESS (Thematic Presentation)
BCE L-3omputer security Basics.pptx
Cyber Crime
Computer virus
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
THESIS-2(2)
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
Presentation on cyber security
cyber safety.pdf
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
Kinds of cybercrime (Social Networking for Social integration .pptx
Cyber security awareness presentation
cybersecurityawareness-presentation-170627121043.pdf
Internet security
Computer Security risks Shelly
Shailendra Pandey.ppt
Ad

Recently uploaded (20)

PDF
Anesthesia in Laparoscopic Surgery in India
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Trump Administration's workforce development strategy
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Pharma ospi slides which help in ospi learning
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
master seminar digital applications in india
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Anesthesia in Laparoscopic Surgery in India
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Trump Administration's workforce development strategy
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Pharma ospi slides which help in ospi learning
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
GDM (1) (1).pptx small presentation for students
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
O7-L3 Supply Chain Operations - ICLT Program
Chinmaya Tiranga quiz Grand Finale.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Pharmacology of Heart Failure /Pharmacotherapy of CHF
master seminar digital applications in india
Microbial disease of the cardiovascular and lymphatic systems
FourierSeries-QuestionsWithAnswers(Part-A).pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Orientation - ARALprogram of Deped to the Parents.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape

Lesson iii-security-and-data-protection

  • 2. OBJECTIVES At the end of the lesson, you should be able to : 1. Understand what cybersecurity is; 2. Understand what cybercrime is; 3. Identify the different types of malicious software; and 4. Know how to secure your information and protect yourself.
  • 4. Republic Act No. 10175: Cybercrime Prevention Act of 2012 • Cybersecurity is the collection of tools, policies, actions, practices, and technologies that can be used to protect the cyber environment. • Cyber – any computer or computer network, the medium in which online communication occurs. This law also specifies that a computer is an electronic, magnetic, electrochemical, or other data processing or communications device that is capable of performing logical, arithmetic, routing, or storage functions and which includes storage facility or communications facility that is directly related to the device. • Computer System – is any device or group of interconnected or related devices that performs automated processing of data. • Information security – or data security is the preservation of information or computer data’s confidentiality, integrity, and availability.
  • 5. Republic Act No. 10175: Cybercrime Prevention Act of 2012 –continuation. • Cybercrimes can be committed with the use of cell phones, social media, and other platforms. • With these definitions, smartphones and other types of mobile phones are also considered as computers and computer systems that are also part of the cyber environment. On the other hand, calculators, while they are considered as computers in other uses, may not fit in this definition because they do not carry a storage facility or communications facility.
  • 6. Cybercrime or Computer Crime Cybercrime – is an offense against the confidentiality, integrity, and availability of information or computer data.
  • 7. The following is a list of cybercrimes:
  • 8. L I B E L This is the act of publishing false statements with the use of computers or computer systems. An example of this cybercrime includes defamatory false statements posted on social media.
  • 9. Illegal Access This is the access to a computer system without right. For example, it is considered illegal access for someone to take your phone without your permission and read the contents of your private messages. Another example would be someone accessing your personal computer without your permission.
  • 10. Data Interference This is the intended alteration, damaging, deleting, or deteriorating of computer data, electronic document, or electronic data message without authority.
  • 11. Illegal Interception This is the obstruction from by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data. An example of illegal interception is when your emails, text messages, or chats are monitored with the use of software without your knowledge or permission.
  • 12. This is the purposeful alteration or reckless hindering or interference with the functioning of a computer or computer network. This is done when someone inputs, transmits, damages, deletes, alters, deteriorates, or suppresses computer data or program, electronic document, or electronic data message without authority System Interference
  • 13. This is the act of intentionally using computer data for the purpose of creating a fraudulent or dishonest design. For example, a person built a website that pretends to be the homepage of a bank or another organization. Computer-related Forgery
  • 14. This is the intentional possession, misuse, use, transfer, deletion, or change of an identifying information belonging to another person without authority. An example is when someone uses your profile picture to pose as a different person on social media. It can also be considered identity theft when another person uses our name and pictures and pretend to be you on social media. Computer-related Identity Theft
  • 15. Malware Short for malicious software, is a program that do unwanted actions or damage to an operating system in a seamless manner, with the intent of harming the computer or user. It is a product of cybercrimes, particularly by data interference and system interference.
  • 16. The following are the different types of malware
  • 17. V I R U S Is a malicious program with the possibility of self—replication. In a computer, it seeks other files trying to infect them and the ultimate goal is to spread to other computers. Depending on what malicious code it contains, it may cause more or less damage to your computer.
  • 18. W O R M S Like viruses, possess the ability of self-replication; however, they cannot infect other programs. Their usual intent is to take control of your computer and allow remote control through backdoor methods.
  • 19. T R O J A N H O R S E Is a program that appear to be useful or good to mislead users of its true intent. It can be presented in the form of games or files in e-mail attachments. It infiltrates the computer and deals negative effects, such as controlling your computer, deleting data, spreading viruses, sending spam, etc. It does not replicate and it needs to be executed. Users need to download or install trojans for them to take effect.
  • 20. S P Y W A R E Is a program that secretly collects data about computer users (passwords, credit card numbers, etc.); therefore, it spies on users. The most common spyware infections usually occur while visiting suspicious websites.
  • 21. A D W A R E Is a program that uses collected data about a user in order to display advertisements in a way regarded as intrusive. It usually manifests itself in the form of many pop-up windows that display ads.
  • 22. Best Practice against Cybercrime and Malware 1. Report issues to the web admin. If you find yourself a victim of cybercrime, immediately report the issue to the web admin, particularly the site where the cybercrime occurred. If you see anyone committing identity theft online, especially on social media, report this to the web administrator. 2. Always Log Out. Never leave your account logged in especially when you are going away. This will prevent security breaches such as illegal access. 3. Use anti-malware defenses. Install antivirus software and setup a firewall.
  • 23. 4. Regularly scan for viruses. A weekly or even daily check-up of your files and programs will help clean up or delete infected files from your computer. 5. Avoid visiting suspicious websites. Viruses often come from these websites. Consider blocking access to these websites. 6. Always scan external storage devices. Before opening the contents of storage devices in your computer, scan them first for malware. Never use a storage device that you just picked up from somewhere. 7. Clear your history. Clear your browsing history, your cookies, cache, and data after using a computer. Do this when you use a public computer. This way, you protect your privacy and personal information from being stolen.
  • 24. 8. Backup your files. Have a hard drive where you can regularly back up your files. This is a precaution so that if your computer needs to be rebooted for any reason, your files are secure from loss of data. 8. Strengthen your passwords. When creating passwords, never use a recognizable word. Always use a combination of letters and special characters. Your passwords must vary for different accounts. Never use your birthday or any other personal information as your password. Most importantly, never reveal your password to anyone. 9. Never download content from unverified sources. Make sure to download from official distributors, manufacturers or creators. If you use a smartphone, avoid downloading from third-party sources. 10. Use Two-Step verification. This security feature adds another layer of protection in your accounts by asking a verification code that will be sent to your second device or phone after you attempt to login.
  • 25. Other Guidelines 1. Never read chat messages that are not yours. Unless you were given the permission to view these messages, it is against the law to access the private messages of another person without their permission. 2. Always verify the source of information. Be very critical or doubtful of any information or news that you se on the internet. Only rely on reputable and veritable sources and not on blog sites pretending to be news sites. 3. Never spread false information. Do not share information that did not pass a thorough critical analysis. If you are baited by sensational headline, take time to read the whole content of the news, only then should you make an objective, informed opinion about it. 4. Never malign the dignity or reputation of anyone. Treat everyone with respect. Never pick a fight in cyberspace, especially on social media.
  • 26. END