Lesson 3: Internet Dangers: Fraud
Lesson 3: Internet Dangers: Fraud
Lesson 3: Internet Dangers: Fraud
Cybercrime is any criminal activity that takes place in cyberspace. One of the earliest and
the most common types of cybercrime activity is hacking. It roughly started in the 1960s. It
involves stealing identities and important information, violating privacy, and committing
fraud, among others.
According to the Identity Theft Resource Center, over 170 million personal records were
exposed through 780 data security breaches in 2015. The global cost of cybercrime is
expected to hit $6 trillion by 2021. 30 to 40% of businesses are affected by cybercrime. From
2017 to 2021, businesses are expected to spend more than $1 trillion for cybersecurity.
Every country in the world has their varied laws and rules against cybercrime activities. In the
Philippines, it is stipulated in the Republic Act No. 10175 or the Cybercrime Prevention
Act of 2012. A substantive cybercrime laws that prohibit cybersquatting, cybersex, child
pornography, identity theft, illegal access to data, and libel, among others is included in the
bill. In the next section, we will determine the most common types of cybercrime activities.
Fraud
Fraud is a general term used to describe a cybercrime that intends to deceive a person in
order to gain important data or information. Fraud can be done by altering, destroying,
stealing, or suppressing any information to secure unlawful or unfair gain.
Hacking
Hacking involves the partial or complete acquisition of certain functions within a system,
network, or website. It also aims to access to important data and information, breaching
privacy. Most “hackers” attack corporate and government accounts. There are different
types of hacking methods and procedures.
Identity Theft
Identity theft is a specific form of fraud in which cybercriminals steal personal data,
including passwords, data about the bank account, credit cards, debit cards, social security,
and other sensitive information. Through identity theft, criminals can steal money.
Scamming
Scam happens in a variety of forms. In cyberspace, scamming can be done by offering
computer repair, network troubleshooting, and IT support services, forcing users to shell out
hundreds of money for cyber problems that do not even exist. Any illegal plans to make
money falls to scamming.
Computer Viruses
Most criminals take advantage of viruses to gain unauthorized access to systems and steal
important data. Mostly, highly-skilled programs send viruses, malware, and Trojan, among
others to infect and destroy computers, networks, and systems. Viruses can spread through
removable devices and the internet.
Ransomware
Ransomware is one of the most destructive malware-based attacks. It enters your computer
network and encrypts files and information through public-key encryption. In 2016, over 638
million computer networks are affected by ransomware. In 2017, over $5 billion is lost due
to global ransomware.
DDoS Attack
DDoS or the Distributed Denial of Service attack is one of the most popular methods of
hacking. It temporarily or completely interrupts servers and networks that are successfully
running. When the system is offline, they compromise certain functions to make the website
unavailable for users. The main goal is for users to pay attention to the DDoS attack, giving
hackers the chance to hack the system.
Botnets
Botnets are controlled by remote attackers called “bot herders” in order to attack
computers by sending spams or malware. They usually attack businesses and governments
as botnets specifically attack the information technology infrastructure. There are botnet
removal tools available on the web to detect and block botnets from entering your system.
Spamming
Spamming uses electronic messaging systems, most commonly emails in sending
messages that host malware, fake links of websites, and other malicious programs. Email
spamming is very popular. Unsolicited bulk messages from unfamiliar organizations,
companies, and groups are sent to large numbers of users. It offers deals, promos, and
other attractive components to deceive users.
Phishing
Phishers act like a legitimate company or organization. They use “email spoofing” to extract
confidential information such as credit card numbers, social security number, passwords,
etc. They send out thousands of phishing emails carrying links to fake websites. Users will
believe these are legitimate, thus entering their personal information.
Social Engineering
Social engineering is a method in which cybercriminals make a direct contact with you
through phone calls, emails, or even in person. Basically, they will also act like a legitimate
company as well. They will befriend you to earn your trust until you will provide your
important information and personal data.
Malvertising
Malvertising is the method of filling websites with advertisements carrying malicious codes.
Users will click these advertisements, thinking they are legitimate. Once they click these ads,
they will be redirected to fake websites or a file carrying viruses and malware will
automatically be downloaded.
Cyberstalking
Cyberstalking involves following a person online anonymously. The stalker will virtually
follow the victim, including his or her activities. Most of the victims of cyberstalking are
women and children being followed by men and pedophiles.
Software Piracy
The internet is filled with torrents and other programs that illegally duplicate original
content, including songs, books, movies, albums, and software. This is a crime as it translates
to copyright infringement. Due to software piracy, companies and developers encounter
huge cut down in their income because their products are illegally reproduced.
Child Pornography
Porn content is very accessible now because of the internet. Most countries have laws that
penalize child pornography. Basically, this cybercrime involves the exploitation of children
in the porn industry. Child pornography is a $3-billion-a-year industry. Unfortunately, over
10,000 internet locations provide access to child porn.
Cyberbullying
Cyberbullying is one of the most rampant crimes committed in the virtual world. It is a
form of bullying carried over to the internet. On the other hand, global leaders are aware of
this crime and pass laws and acts that prohibit the proliferation of cyberbullying.
Cybersquatting
Cybersquatting is registering, selling or using a domain name with the intent of profiting
from the goodwill of someone else's trademark. It generally refers to the practice of buying
up domain names that use the names of existing businesses with the intent to sell the
names for a profit to those businesses.
Every user should prevent various types of computer threats and risks from attacking their
computers. Follow these 16 effective tips to keep you and your computer safe and secure:
Always Scan
You cannot prevent other devices from connecting to your computer – flash drives, external
storage devices, and smartphones. Make it a habit that you thoroughly scan these external
devices before accessing them to avoid entry of viruses.
Protect Your Email
One of the favorite entries of viruses and other forms of security threats is your email. Make
sure that you enable spam filters or you add anti-spam or virus extensions that regularly
scans your email for some threats.
Be Selective of Sites
In connection to the previous tip, make sure that you use your judgment and be selective of
the websites that you open. Open websites that are familiar and are trusted. Avoid opening
porn sites, gambling sites, promo sites, etc. as they are the favorite hosts of viruses.
Keyword blocking can be ineffective in schools because even if the website only uses one of
the words from the list once, the whole site is completely blocked, assuming the entire site
is about that specific keyword. This blocking method does not focus on the context of the
word nor the context relevant on the site. For example: chicken breast, Anne_Sex_ton.
Because these words have a certain combination with an inappropriate keyword, the whole
site would be blocked.
Site blocking can be effective because it can limit specific site to students. On the other
hand, because the internet changes every day, the program and list of websites needs to be
updated often. Site blocking software only blocks "known" websites and some of the
programs only block domain level sites. Many filtering programs in school settings use site
blocking for sites like Facebook, MySpace, or even YouTube. "Go lists" are commonly used
with site blocking software which allows users to view specific pages. A teacher can give
students the opportunity to view only specific websites with the "go list" strategy, therefore
monitoring which selected websites students can use. Many people think this method limits
students to in-depth research and discovery using the internet.
Domains such as Usenet and FTP are blocked because of their high concentration of sites
unwanted in school. This method is used to block and kind of chat room or instant
messaging service popular to students. For example: AOL Instant Messenger, SKYPE, etc.
User blocking: when each user is given a username and/or password, then the
access to sites is determined by the users criteria.
User blocking is a widely used method in schools because of its tailored teacher versus
student filter. Everyone in the school can use the same computers, but school administration
can decide and apply different access levels based on the specific user. There is normally a
less restricted access level for the teachers compared to the student users.
Disconnect
If you do not need an internet connection, make it a habit to disconnect. This is a preventive
measure that will help you avoid security threats from entering your computer through the
internet.
Apart from these preventive measures, ask a PC technician or IT expert to check your
computer if there are signs of viruses, malware, etc. inside the system.
Lesson 3: Internet Dangers
Guide Questions
1. What is cybercrime?
2. What are the common types of cybercrime acts?
3. How can you keep you and your computer safe and secure?
Create a vlog showing internet dangers and how to avoid these dangers. (Individual)
Cybercrime is any criminal activity that takes place in the cyberspace. One of the
earliest and the most common types of cybercrime activity is hacking.
In the Philippines, laws, and rules against cybercrime are stipulated in the Republic
Act No. 10175 or the Cybercrime Prevention Act of 2012.
Over 30% of the world’s computers are under threat of these cybercrimes.
The most common types of cybercrime acts are fraud, hacking, identity theft,
scamming, computer viruses attack, ransomware, DDoS attack, Botnets, Spamming,
Phishing, Social Engineering, Malvertising, Cyberstalking, Software piracy, child
pornography, cyberbullying, and cybersquatting.
Installing anti-virus software; updating our computer’s OS and software; checking
our computer’s firewall; backing-up our data; scanning; being wise when clicking
links, visiting internet sites, and opening emails; managing passwords; filtering
downloads; using add site blockers and avoiding public wifi are some of the ways
that we can do to keep ourselves and our computer safe and secure.
Considering the dangers of the internet, as a future teacher are you ok with the idea of
integrating the use of technology and the internet in your lessons? Explain your answer.
16 Effective Tips to Keep Your Computer Safe and Secure | VoIP Shield. (n.d.). Retrieved
August 30, 2020, from https://www.voipshield.com/16-effective-tips-to-keep-your-
computer-safe-and-secure/
Cybersquatting: What It Is and What Can Be Done About It | Nolo. (n.d.). Retrieved August
30, 2020, from https://www.nolo.com/legal-encyclopedia/cybersquatting-what-what-can-
be-29778.html
Filtering & Blocking Software - Education Technology Center - UIowa Wiki. (n.d.). Retrieved
August 30, 2020, from https://wiki.uiowa.edu/pages/viewpage.action?pageId=41879146
Republic Act No. 10175 | Official Gazette of the Republic of the Philippines. (n.d.). Retrieved
August 30, 2020, from https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-
10175/
The 16 Most Common Types of Cybercrime Acts | VoIP Shield. (n.d.). Retrieved August 30,
2020, from https://www.voipshield.com/the-16-most-common-types-of-cybercrime-acts/