Beruflich Dokumente
Kultur Dokumente
TECHNOLOGIES
Stephen Hawking
14
EMPOWERMENT
TECHNOLOGIES
Cyber stalking
Harassment on the internet can be just as frightening as other forms of stalking.
Women and girls are usually the victims of this kind of behavior.
They might be harassed by an ex-boyfriend or girlfriend who is upset about the
end of their relationship, for example.
It can also begin when a purely online friendship turns sour.
It can even begin entirely at random, by one online stranger towards another.
15
EMPOWERMENT
TECHNOLOGIES
email address
phone number
postal address
any banking information
photos of yourself
The consequences of fraud can be huge, so you should be aware of the very serious
risks. If someone steals you or your parent's identity they can:
steal a lot of money
commit crimes that could put you or your parents in danger
commit crimes that you or your parents could get into trouble for
Sexting
Sexting usually refers to sending and receiving rude messages or videos of:
naked pictures
'underwear shots'
any sexual texts, images or videos
These images or videos can be sent from a boyfriend or girlfriend or a friend or someone
you've met online. You also may have sent a sexual photo, video or text to someone else.
Sexting can happen because:
your friends are boasting about sending or having photos on their mobile phone.
you want to fit in with in with friends
youre worried about being seen as 'frigid' or 'shy'
youre pressured to prove your sexuality
youre harassed, threatened or blackmailed into sending pictures
someone keeps asking for things and you feel that it's easier just to give in
youre made to feel guilty if you dont do what they ask
you think you owe your boyfriend or girlfriend or
you feel its ok because youre in love with the person and trust them
you feel proud of your body and want to share it with other people
16
EMPOWERMENT
TECHNOLOGIES
17
EMPOWERMENT
TECHNOLOGIES
18
EMPOWERMENT
TECHNOLOGIES
19
EMPOWERMENT
TECHNOLOGIES
20
EMPOWERMENT
TECHNOLOGIES
21
EMPOWERMENT
TECHNOLOGIES
When a Trojan is activated on your computer, the results can vary. Some Trojans are
designed to be more annoying than malicious (like changing your desktop, adding silly
active desktop icons) or they can cause serious damage by deleting files and destroying
information on your system. Trojans are also known to create a backdoor on your
computer that gives malicious users access to your system, possibly allowing confidential
or personal information to be compromised. Unlike viruses and worms, Trojans do not
reproduce by infecting other files nor do they self-replicate.
What Is a Blended Threat?
A blended threat is a more sophisticated attack that bundles some of the worst aspects
of viruses, worms, Trojan horses and malicious code into one single threat. Blended
22
EMPOWERMENT
TECHNOLOGIES
Fast Facts
Sophisticated, bundles aspects of viruses, worms and Trojan horses, most require no human action.
23
EMPOWERMENT
TECHNOLOGIES
Fast Facts
Did You Know... CodeRed, a blended threat, launched DoS attacks, defaced Web servers, and its variant,
CodeRed II, left Trojan horses behind for later execution. CodeRed was processed in memory not on
a hard disk allowing it to slip past some anti-virus products. Computer Economics has estimated the
worldwide cost of CodeRed at $2.62 billion dollars. [Source: Symantec Web site]
24
EMPOWERMENT
TECHNOLOGIES
Spyware
Key loggers
Computer viruses or worms.
Financial malware - which is designed to scan a computer system for information
related to financial transactions, are more common than other types. One example
is Cridex, a sophisticated strain of banking malware.
25
EMPOWERMENT
TECHNOLOGIES
26
EMPOWERMENT
TECHNOLOGIES
Valdemar W Setzer
A brief History
Foundation of Computer Ethics
MIT professor Norbert Wiener during the World War Two (2), an anti-aircraft cannon
tracking system involving a feedback (nervous) system. In his 1948 book on
Cybernetics he wrote:
It has long been clear to me that the modern ultra-rapid computing machine was
in principle an ideal central nervous system to an apparatus for automatic control; and
that its input and output need not be in the form of numbers or diagrams but might very
well be, respectively, the readings of artificial sense organs, such as photoelectric cells
or thermometers, and the performance of motors or solenoids we are already in a
position to construct artificial machines of almost any degree of elaborateness of
performance. Long before Nagasaki and the public awareness of the atomic bomb, it
had occurred to me that we were here in the presence of another social potentiality of
unheard-of importance for good and for evil.
60s & 70s: Computer crime, ACM code of ethics, Weizenbaums ELIZA
New branch of applied ethics: Walter Maner teaching a medical ethics
course in 1976 came up with the term computer ethics
Wiener-Maner-Gorniak hypothesis:
Computer ethics will become a new universal, global ethics, and so will become the
ordinary ethics.
Johnsons hypothesis:
Computer ethics are new species of generic moral problems, and will continue to
presuppose existing ethical theories.
ETHICS IN GENERAL
A guideline is needed to stop the current technology products from being exploited for
example replicating original CDs and selling them as pirated software, this unethical
behavior can be controlled by the code of conducts.
27
EMPOWERMENT
TECHNOLOGIES
28
EMPOWERMENT
TECHNOLOGIES
Moral Standards
Free to Follow
No Punishments
Universal
Immoral
Law
Control
Judicial Standards
Must Follow
29
EMPOWERMENT
TECHNOLOGIES
Crime
30
EMPOWERMENT
TECHNOLOGIES
31
EMPOWERMENT
TECHNOLOGIES
Pavan Duggal
Cyber law is the area of law that deals with the Internet's relationship to technological
and electronic elements, including
Computers,
Software,
Hardware and
Information systems (IS).
Information access,
Privacy,
Communications,
Intellectual property (IP)
And freedom of speech
Internet
Websites
Email
Computers
Cell phones
Software
And hardware, such as data storage devices.
The increase in Internet traffic has led to a higher proportion of legal issues worldwide.
Because cyber laws vary by jurisdiction and country, enforcement is challenging, and
restitution ranges from fines to imprisonment.
32
EMPOWERMENT
TECHNOLOGIES
33
EMPOWERMENT
TECHNOLOGIES
1. The law Penalizes (section 8) sixteen types of cybercrime (Section 4). They
are:
Types of Cybercrime
Penalty
Illegal access
Unauthorized access (without right) to a
computer system or application
Illegal interception
Unauthorized interception of any nonpublic transmission of computer data to,
from, or within a computer system.
Data Interference
Unauthorized alteration, damaging,
34
EMPOWERMENT
TECHNOLOGIES
35
EMPOWERMENT
TECHNOLOGIES
Computer-related Fraud
Unauthorized input, alteration, or deletion
of computer data or program or
interference in the functioning of a
computer system, causing damage
36
EMPOWERMENT
TECHNOLOGIES
Child Pornography
Unlawful or prohibited acts defined and
punishable by Republic Act No. 9775 or
the Anti-Child Pornography Act of
2009, committed through a computer
system.
Unsolicited Commercial
Communications (SPAMMING)
THIS PROVISION WAS STRUCK
DOWN BY THE SUPREME COURT AS
UNCONSTITUTIONAL.
Libel
Unlawful or prohibited acts of libel as
defined in Article 355 of the Revised
Penal Code, as amended committed
through a computer system or any other
37
EMPOWERMENT
TECHNOLOGIES
38
EMPOWERMENT
TECHNOLOGIES
39
EMPOWERMENT
TECHNOLOGIES
This gives the Philippines the ability to participate in treaties and of mutual
cooperation with countries that have counterpart legislation effectively
especially on cybercrime cases that have team members or victims residing
in the Philippines.
The law gave police authorities the mandate it needs to initiate investigation to
process the various complaints / report it gets from citizens. There are
instances of online attacks, done anonymously, where victims approach police
authorities for help. They often find themselves lost in getting investigation
assistance as police authorities cant effectively initiate an investigation (only
do special request) as their legal authority to request for logs or data does
not exist at all unless a case is already filed. (which in case of anonymously
done will be hard to initiate)
The PNP and NBI shall be responsible for the enforcement of this law. This
includes:
(a) The PNP and NBI are mandated to organize a cybercrime unit or center
manned by special investigators to exclusively handle cases involving
violations of this Act. (Section 10).
(b) The PNP and NBI are required to submit timely and regular reports
including pre-operation, post operation, and investigation results and such
other documents as may be required to the Department of Justice for review
and monitoring. (Section 11)
(c) THE SUPREME COURT STRUCK DOWN SECTION 12 THAT IS
SUPPOSED TO authorize law enforcement authorities, without court
warrant, to collect or record by technical or electronic means traffic data
in real time associated with specified communications transmitted by means of
a computer system. (Section 12) Getting a COURT WARRANT is a must.
(d) May order a one-time extension of another six (6) months on computer
data requested for preservation. Provided, that once computer data preserved,
transmitted or stored by service provider is used as evidence in a case, the
mere furnishing to such service provider of the transmittal document to the
40
EMPOWERMENT
TECHNOLOGIES
41
EMPOWERMENT
TECHNOLOGIES
42
EMPOWERMENT
TECHNOLOGIES
43