Narrative Report 9
Narrative Report 9
Narrative Report 9
To the seminar, I’ve been learn conducted on November 27, 2021, by Guest Speaker:
PSMS Mariann L Fuentes. The first thing I remember is What is Cybercrime? A
computer or a network of computers is used as a tool in the commission of cybercrime.
The targets: *Another computer or network of computer *Information *Another person,
natural or juridical. Cybercrime becomes widely today because technology is more
commonly used by people around the globe.
Republic Act no. 10175 Cybercrime Prevention Act of 2012, an act defining cybercrime,
provides for the prevention, investigation, suppression, and the imposition of penalties
therefore and for other purposes. Types of cybercrime, against the computer – the
computer and/or contained data is the objective, based on the speaker PSMS Mariann
L Fuentes explain what is against the computer when your computer data is destroyed
or hacked or the system of the computer got viruses it is against to the computer. Using
the computer – the computer and/or contained data is the method. Within the computer
– the data (content) is the object.
PSMS Mariann L Fuentes tackled types of Cybercrime within the computer, Child abuse
materials, Pornography, Cyberbullying, Child Grooming, and Hate crime and also the
Cybercrime Offenses, Illegal Access, Illegal Interception, Data interference, System
interference, Cybersquatting, Misuse of device, Computer-related Forgery, Computer-
related Fraud, Cybersex, Child Pornography (in relation to RA 9775), Unsolicited
Commercial Communications and Libel (RPC Art.355) the given example of PSMS
Mariann L Fuentes to the Child Pornography the parents use their child to exploit to gain
money and to the cyberbullying explaining there’s someone complaining to their station
in cyberbullying and ask what his age the complainant is not qualified for cyberbullying,
cyber libel is the one capable in his issue.
She also tackled the R.A 9775 Anti-Child Pornography Act of 2009. Definition of terms
“Children” refers to person below seventeen (17) years of age or those over but are
unable to fully take care of themselves or protect themselves from abuse, neglect,
cruelty, exploitation or discrimination because of a physical or mental disability or
condition. PSMS Mariann L Fuentes said to this definition of terms of R.A 9775 to the
age exceeded to 17 years old have covered this law if the person is having mental
disability or condition. Most of the cases involving real children and these children are
re-victimized every time the image of their abuse is viewed, she explained about the
real children is the victim materials of this crime and also re-victimized once the image
of the child is uploaded in the internet. The speaker said there’ a lot of various crime in
the Internet such as the Child Pornography, Online abuse, Cyber Bullying, Cyber
Addiction, Child Trafficking, Cybersex.
She tackled the R.A 9995 Anti-Photo and Video Voyeurism Act of 2009, means the act
of taking photo or video coverage of a person or group or persons performing sexual act
or similar activity. Capturing an image of the private area of a person/s without latter’s
consent. The act of selling, copying, reproducing, broadcasting, showing or exhibiting
the photo or video.
The speaker talked about Romance scam, Bad guy/gal uses online dating or social
networking sites and posts attractive picture. Communicates and gains victim’s
confidence. Then asks for money, travel expenses to meet in person, medical
expenses. Information about the victim’s significant details such as bank account and
credit cards to commit fraud.
She also tackled R.A 9208 Anti-trafficking in Person, “An act to institute policies to
eliminate Trafficking in Person especially in women and children, established the
necessary institutional mechanisms for the protection and support of trafficked persons,
providing penalties for its violations, and for other purposes” she explain about
trafficking in person and give some example in real life experience she said about the
traffickers used people in province and offer a job in manila and the people who accept
they don’t know what is work waiting for them but they didn’t know they are using for
sex slaves or cybersex. How technology is used in trafficking: technology used to exploit
victims, pornographic images posted on website, child pornography. Live streaming.
Recruitment via online communication with potential victims, social networking sites and
dating sites, newsgroup: sites for exchange information, mobile system. Use of
technology for exploitative purposes has attributed to: more generalized access to
internet, increased number of internet user each year, increased affordability of
technology and services, anonymity of users.
She also tackled Modeling Scams and give some example base on their complainant;
modeling scam is a swindle in the modeling industry or a fraud against models or
aspiring models. PSMS Mariann L Fuentes explained what is this and how they work
the scam, the teen age victimized this scam and the stranger offer him for a modeling
and the victim accept this offer but the scammer uses this opportunity and the scammer
ask to send her body naked and the scammer if the victim not to send his face and her
body he will spread on the internet his naked body and the victim report this crime and
luckily the police successfully entrap this person.
PSMS Mariann L Fuentes tackled Cyber Safety in the internet social platform such as
Facebook. Nobody wants to be a victim of a phishing scheme. However, there is a
reason why such frauds will continue to exist: they are profitable enough for
cybercriminals to benefit handsomely. Phishing schemes have been almost since the
dawn of the Internet, and they aren't going away anytime soon. Fortunately, there are
steps you may take to avoid becoming a victim.
Keep Informed About Phishing Techniques, keep your eyes peeled for news about new
phishing scams.
Think Before You Click, when you're on a trusted website, it's fine to click on links.
However, clicking on links in random emails and instant messages isn't such a good
idea. Before clicking on any links that you're not sure about, hover over them. Are they
leading in the right direction? A phishing email may appear to be from a reputable
organization, and when you follow the link to the website, it may appear to be identical
to the actual one. You may be asked to fill out information in the email, but your name
may not be included. The majority of phishing emails will begin with "Dear Customer,"
so be wary if you receive one. When in doubt, rather than clicking a potentially
dangerous link, go straight to the source.
Check Your Online Accounts Regularly, someone could be having a field day with your
internet account if you don't log in for a time. Check in with each of your online accounts
on a frequent basis, even if you don't officially need to. Make it a habit to change your
passwords on a regular basis. You should physically check your statements on a
frequent basis to avoid bank phishing and credit card phishing frauds. Obtain monthly
financial account statements and thoroughly review each entry to verify no fraudulent
transactions have occurred without your knowledge.
Never Give Out Personal Information, Personal or financial information should never be
shared over the internet. This regulation dates back to the early days of America Online,
when users were continually warned about phishing scams due to their success. When
in doubt, go to the company's official website, find their phone number, and give them a
call. The majority of phishing emails will send you to a page where you must enter
money or personal information. A user of the Internet should never enter confidential
information using the links supplied in emails. Never send anyone important information
via email. Make it a practice to check the website's address. Always begin with a secure
website “https”. The eighth tips of advice provided is really beneficial to us as young
people. The advice on how to prevent this type of security breach are given in the video.
The first recommendation is to back up all data, systems, and configurations because
this allows the firm to recover faster in the event of an unanticipated event. The first
recommendation is to back up all data, systems, and configurations because this allows
for early restoration, which can aid in the recovery of the business in the event of an
unanticipated occurrence. Consider the following scenario: you own a small business,
but your data is not backed up. In an unexpected situation, a hacker broke into your
company's system, wiping out all of your data. The second tips of advice is to enact
concrete security and maintain it on a regular basis. Choose a firewall with capabilities
that protect you from hostile hackers, malware, and viruses. This will allow for quicker
detection and response to threats. A firewall is a network security device that monitors
incoming and outgoing network traffic and permits or rejects data packets based on a
set of security rules. The third recommendation is to never give out personal information
to strangers since they can use it, such as your name, to perpetrate fraud against
others. The fourth tips Check your security settings to avoid cybercrime, and check your
network settings to see if anyone is connected to your computer. The fifth step is to
protect your information when visiting illegal websites, as unethical hackers can simply
bypass your information by employing phishing websites, such as when a website you
visit sends you a form asking for your personal information. The sixth recommendation
is to utilize virtual private networks (VPNs), which allow you to disguise your IP address
and online activities by masking your IP address. VPNs, on the other hand, encrypt your
internet traffic and hide your online identity. The encryption is carried out in real time.
The seventh advice is to restrict access to your most sensitive material and encrypt your
folder as much as possible so that no one may see your sensitive documents. The
eighth step is to provide employee security awareness training to prevent employees
from just clicking on a received email that could harm the organization. I'll share what I
learnt in this video with my family so they can avoid becoming victims of cybercrime as
well.