Monday, July 25, 2016

The Disadvantages of ICT


Cybercrimes are illegal acts done through the use of the internet. People all over the world use the Internet to commit a host of crimes, some of which the public doesn't even know are capable of being done electronically.

1. Phishing and Spoofing

Spoofing attack is when a malicious party impersonates another device or user on a network in order to launch attacks against network hosts, steal data, spread malware or bypass access controls. There are several different types of spoofing attacks that malicious parties can use to accomplish this.

Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.


Difference Between Phishing and Spoofing
    
        The misconception that phishing and spoofing are synonymous, based on nothing more than aesthetic similarities, pervades the Internet. Phishing and spoofing are clearly different beneath the surface. One downloads malware to your computer or network, and the other tricks you into giving up sensitive financial information to a cyber crook. Phishing is a method of retrieval, while spoofing is a means of delivery.



2. Blackmail/Extortion                                              

Extortion (also called blackmail, shakedown, out wresting, and exaction) is a criminal offence of unlawfully obtaining money, property, or services from a person, entity, or institution, through coercion. Refraining from doing harm is sometimes euphemistically called protection. Using the Internet to threaten to cause damage with the intent to extort from any person any money or other thing of value.

3. Accessing Stored Communications 

 
Accessing Stored Communications or hacking; Intentionally accessing, without authorization, a facility through which an electronic communication service is provided. The act of obtaining unauthorized access to data from computer network. This is typically done to commercial and government sites to threaten its owner. In late 2015, a group of Anonymous Philippines  hacked the Twitter account of actress Maine Mendoza, who plays the famous character Yaya Dub of the popular AlDub tandem and posted links and messages on the account.


4. Sports Betting

Sports Beating is engaging in the business of betting or wagering on any sporting event or contest over the Internet. In some countries, gambling (including sports betting) is illegal even if you are doing it over the Internet.

5. Non-Delivery of Merchandise

Devising any scheme to defraud, or for obtaining money or property by means of false or fraudulent pretenses, or promises, and using the Internet for the purpose of executing the scheme. The non-delivery scam occurs when the scammer places an item up for sale when there is actually no item at all. The item is subsequently never delivered to the buyer after they purchase the item.


6. Electronic/ Cyber Harassment

Cyber harassment refers to online harassment. Cyber harassment or bullying is the use of email, instant messaging, and derogatory websites to bully or otherwise harass an individual or group through personal attacks. Cyber harassment can be in the form of flames, comments made in chat rooms, sending of offensive or cruel e-mail, or even harassing others by posting on blogs or social networking sites. Cyber harassment is often difficult to track as the person responsible for the acts of cyber harassment remains anonymous while threatening others online. This usually applies to school-age children.

7. Child Pornography

Using the Internet to transmit child pornography. Child pornography is distributed nowadays mainly through the Internet. Child pornography are produced not only on a professional scale by commercial providers, but also privately using victims from the producer’s own environment, from the exploitation of children by clients of child prostitutes. Child pornography is sold over commercial websites and also exchanged in closed groups or via peer-to-peer networks. Criminal groups also use the Internet to make big money selling child pornography. 

8. Prostitution

Persuading, inducing, enticing, or coercing any individual to travel in interstate commerce to engage in prostitution.The internet has become one of the preferred methods of communication for prostitution, as clients and prostitutes are less vulnerable to arrest or assault and for its convenience








9. Drug Trafficking


Delivering, distributing, or dispensing a controlled substance by means of the Internet. Darknet markets are used to buy and sell recreational drugs online. Some drug traffickers use encrypted messaging tools to communicate with drug mules. The dark web site Silk Road was a major online marketplace for drugs before it was shut down by law enforcement (then reopened under new management, and then shut down by law enforcement again)

10. Criminal Copyright Infringement

Criminal Copyright Infringement, the act of piracy mainly for financial gain. In late 2014, the number one pirate website, The PirateBay, was raided for the second time due to years of pirating movies, music, games, books, and other software. These kinds of websites earn money through advertsing.

83 comments:

  1. When someone hacked my account for example my Facebook, is there any chance to retrieve my personal account? How?

    ReplyDelete
    Replies
    1. Yes there is always a chance to retrieve it. If your facebook account was hacked by someone and you really want it back this tutorial would help you get it back. Click the button "Your account has been Compromised". Then type in your email address, Login name , Full Name or your specified Phone No. Then facebook would search for matching users.

      Delete
  2. Mam Kat, How we can avoid this kind of crimes which are related to ICT?

    ReplyDelete
    Replies
    1. We can avoid cybercrimes by following this basic steps:

      *Keep your computer current with the latest patches and updates.
      *Make sure your computer is configured securely.
      *Choose strong passwords and keep them safe.
      *Protect your computer with security software.
      *Protect your personal information.
      *Online offers that look too good to be true usually are.
      *Review bank and credit card statements regularly.

      Delete
  3. If i got ban at Face Book , because of click bait can i retrieve my Face book Account?

    ReplyDelete
    Replies
    1. As far as I know, you're not being banned on Facebook if you click a bait. If you clicked a bait you will not see the content and without knowing your bait also send to your friends and they are soon to be a victim.

      Delete
  4. How can i avoid hackers to get in my system? Can the authoritys's trace their location?

    ReplyDelete
    Replies
    1. To prevent hackers:

      1. Perform required software updates for your operating system and web browser.

      2. Install a firewall on your computer.

      3. Change your passwords often.

      4. Purchase or download anti-virus software.

      5. Install anti-spyware/adware programs onto your system.

      6. Delete emails from unknown sources.

      For your second question, yes the authorities had a way to track the location of hackers.

      Delete
  5. i was once a victim of malware, i received a notification in a social media website, and when i clicked it, there are apps automatically downloading on my smartphone, and it always restarts etc. how can i avoid that situation from happening again?

    ReplyDelete
    Replies
    1. Do the step 6 above.

      6. Delete emails from unknown sources.

      Think before you click :)

      Delete
  6. Is there a way to avoid cyber harassment or child pornography? In this terms of cybercrime, does the government make an action for this harassment? And in copyright issues, how will the government support the author or the artist?

    ReplyDelete
    Replies
    1. We can prevent it by following the rules of cybercrime law and yes, it is included in Cybercrime Prevention Act of 2012, officially recorded as Republic Act No. 10175. In copyright issues, I don't know if there an act or bill about it, but I hope we have to avoid cybercrimes.

      Delete
  7. I have a friend whose fb account had been hacked. What actions should we make in order to be safe from hackers and avoid the loss of privacy and account?

    ReplyDelete
    Replies
    1. WHAT TO DO IF YOUR FACEBOOK ACCOUNT HAS BEEN HACKED

      Go to https://www.facebook.com/hacked and follow the instructions on-screen. You’ll go through three steps:

      1. Verify your account and change password. You’ll be asked to identify your account, change your password, and change the password associated with the e-mail account that you use for Facebook.

      2. Review and fix anything the cybercriminal changed.

      3. Unlock account.

      Delete
    2. HOW TO PREVENT YOUR FACEBOOK ACCOUNT FROM BEING HACKED

      Security settings are the key. So stop what you’re doing and print out this article. Then log into Facebook and update these settings.

      From Account settings, click on Security. I recommend the following settings for the highest level of security.

      1. Secure Browsing – enabled.

      2. Login Notifications – enabled.

      3. Login Approvals – enabled. This feature requires that you have a cell phone capable of receiving text messages. When enabled, you will receive a code via text message if your account is accessed from an unrecognized location.

      This is important for teens. They may use computers at a friend’s house, the library, or other public locations. As an example, if you are logging in to Facebook from a computer in the library, you’ll be asked to enter in a code. You’ll receive the text message, know that it’s YOU using Facebook, and enter the code. If you receive the text message and you WERE NOT trying to log into Facebook, you’ll know there is a problem. And the hacker trying to get into your account will not have the code.

      4. App Passwords – If you don’t have many apps associated with your Facebook account, you can probably leave this off. If you do enable login approvals as described above, and you do use apps such as Skype through Facebook, then you may want to set app passwords. You can read about this feature on Facebook Help and Inside Facebook.

      5. Recognized Devices – if there is anything listed here that doesn’t look familiar, or the date is not recent, remove it.

      6. Active Sessions – remove all except Current session.

      As a last step, go to General Account settings and change your Facebook password. And finally, log out of Facebook when not in use.

      Now with your Facebook account safe and secure, you can get back to important Facebook activities, such as post-election re-friending, without too much of a fear of hackers accessing your account.

      Delete
  8. Can you please enlighten me more about the 'Phishing and Spoofing.' I kinda don't get it.

    ReplyDelete
    Replies
    1. Phishing is the act of trying to trick someone into giving up valuable information to gain something, usually financial. As mentioned in one of my previous articles discussing social engineers, it could be through a variety of methods. A fake e-mail, call, Facebook message, text message, and the like, all to get you to expose your account details, such as your password or account numbers.

      Spoofing is the act of creating a fake persona to make a person do something they normally wouldn't do. Would you intentionally download a virus? Intentionally send your friend a link to malware? Probably not. A malicious hacker would spoof their e-mail address to look like an official address and send an e-mail with a link for users to click. When a user clicks the link, the malware or a virus is installed automatically.

      Phishing may, at times, require spoofing to trick the user into giving up information but spoofing does not necessarily result in phishing someone's account.

      Delete
  9. What must be the first thing that we should do as one of this cybercrimes happen to us?

    ReplyDelete
  10. What are the things that we must remember once we use or once we create our social media accounts in order to avoid this case ma'am?

    ReplyDelete
    Replies
    1. To prevent hackers:

      1. Perform required software updates for your operating system and web browser.

      2. Install a firewall on your computer.

      3. Change your passwords often.

      4. Purchase or download anti-virus software.

      5. Install anti-spyware/adware programs onto your system.

      6. Delete emails from unknown sources.

      For your second question, yes the authorities had a way to track the location of hackers.

      Delete
  11. What would be the best way to avoid getting you're account hacked?

    ReplyDelete
    Replies
    1. To prevent hackers:

      1. Perform required software updates for your operating system and web browser.

      2. Install a firewall on your computer.

      3. Change your passwords often.

      4. Purchase or download anti-virus software.

      5. Install anti-spyware/adware programs onto your system.

      6. Delete emails from unknown sources.

      Delete
  12. How do we can prevent/avoid from cybercrimes ??

    ReplyDelete
    Replies
    1. In order to prevent cybercrime IT News Africa has come up with 8 tips to avoid cybercrime:

      *Constantly update passwords and login details
      By changing your login details, at least once or twice a month, you can cut down your chances of being a target of cybercrime.

      *A secure computer will deter cyber criminals
      Always be sure to activate your firewall settings. Furthermore, installing anti-virus and anti-spyware software will protect your computer from various forms of malware, viruses, Trojan horses and other malicious software used to obtain your personal details.

      *Be social media savvy
      Make sure your social networking profiles (e.g. Facebook, Twitter, YouTube, MSN, etc.) are set to private. Check your security settings. Be careful what information you post online. Once it is on the Internet, it is extremely difficult to remove.

      *Secure mobile devices
      More often than not, we leave our mobile devices unattended. By activating the built-in security features you can avoid any access to personal details. Never store passwords, pin numbers and even your own address on any mobile device.

      *Protect your Data
      Use encryption for your most sensitive files such as tax returns or financial records, make regular back-ups of all your important data, and store it in a different location.

      *Be aware of what you do while using public Wi-Fi Hotspots
      While these access points are convenient, they are far from secure. Avoid conducting financial or corporate transactions on these networks.

      *Protect your e-identity
      Be cautious when giving out personal information such as your name, address, phone number or financial information on the Internet. Make sure that websites are secure (e.g. when making online purchases) or that you’ve enabled privacy settings (e.g. when accessing/using social networking sites).

      *Avoid being scammed
      Always think before you click on a link or file of unknown origin. Don’t feel pressured by any emails. Check the source of the message. When in doubt, verify the source. Never reply to emails that ask you to verify your information or confirm your user ID or password.

      Delete
  13. How can we protect ourselves when using internet?

    ReplyDelete
  14. how can we avoid hackers? why do they have to hack other people's account?

    ReplyDelete
    Replies
    1. To prevent hackers:

      1. Perform required software updates for your operating system and web browser.

      2. Install a firewall on your computer.

      3. Change your passwords often.

      4. Purchase or download anti-virus software.

      5. Install anti-spyware/adware programs onto your system.

      6. Delete emails from unknown sources.

      Other Tips:

      Social Networking Security Tips

      Panda Security offers 4 very simple social networking security tips:

      1. Don’t post everything about your life.
      2. Use strong passwords, with upper case letters and numbers.
      3. Configure your profile privacy settings.
      4. Keep your antivirus and operating system up-to-date.


      From a hackers perspective, it's because they have nothing to do. Theres no way to hack facebook.
      What they did is keylogged you. Make sure you have virus programs on your computer. SCAN everything. Then change your password. If you can, have someone else change your password.

      Delete
  15. Maam. What is the easiest way to avoid those disadvantages?

    ReplyDelete
    Replies
    1. As I listed above, you must practice it to avoid those disadvantages.

      Delete
  16. So, we all know that commitment of cybercrimes have been interfering with the netizens. A lot of ways for the crimes to spread have been invented. So, now that that's the case, how can you assure the people that we can still use the internet safely? And is there a way to sue the criminals?

    ReplyDelete
    Replies
    1. You can prevent it by doing the safety tips above and there is always a way to sue the criminals.

      Delete
  17. Ma'am, what if i receive a blackmail what should i do first?

    ReplyDelete
    Replies
    1. Take this as an initial step:

      1.Inform the authorities that you are being blackmailed.

      2.Keep in mind that paying is unlikely to stop the blackmailer's demands.

      3.Don't confront the person (online or otherwise); end all contact with them immediately.

      4.Place filters on your email account(s) to block their email address.

      5.Block them from your social networking accounts and change the privacy settings to try to keep them accessing from your list of friends.

      6.Change all of your passwords with strong, unique alphanumeric codes if you think you were hacked.

      7.Consider starting new email accounts. Let contacts know that your old accounts were hacked and they should not open any message from them.

      8.Password protect all of your devices.

      Delete
  18. Now, we learn more different struggles we face using the internet, so my question maam is how can protect ourselves from internet? specifically to the hackers?

    ReplyDelete
    Replies
    1. Kate also asked it to me. You can read my answer above.

      Delete


  19. if there is an disadvantage in ict then is it possible to have some advantages in ict? what are those advantages?

    ReplyDelete
    Replies
    1. ICT had a lot of advantages but I listed some advantages:

      ICT encompasses telephone, wireless and computer technology, which are industries which have changed the way the world operates. Among its advantages:
      Utility - communications can take place instantaneously, 24 hours a day, 365 days a year across the globe. Messages can be sent to one or multiple recipients.

      Shared resources - groups of users can access the same programs, applications and even hardware such as printers and faxes using networking and wireless technology.

      Education - used in schools, ICT has motivated students as well as facilitating completion of work and the communications between teachers and students. It is an equalizing agent in that all students can have access to it and work together.

      Control - network set-up can control access to specific information and processes. It is also easy to monitor work as well as communications

      Delete
  20. When I read this, I prefer to follow the 10 commandments of using social media. Thanks for teaching :)

    ReplyDelete
    Replies
    1. Yes, you must follow it to avoid for being a victim of cybercrimes.

      Delete
  21. Can you give some examples of what are the effective solutions to avoid this issue?

    ReplyDelete
    Replies
    1. In order to prevent cybercrime IT News Africa has come up with 8 tips to avoid cybercrime:

      *Constantly update passwords and login details
      By changing your login details, at least once or twice a month, you can cut down your chances of being a target of cybercrime.

      *A secure computer will deter cyber criminals
      Always be sure to activate your firewall settings. Furthermore, installing anti-virus and anti-spyware software will protect your computer from various forms of malware, viruses, Trojan horses and other malicious software used to obtain your personal details.

      *Be social media savvy
      Make sure your social networking profiles (e.g. Facebook, Twitter, YouTube, MSN, etc.) are set to private. Check your security settings. Be careful what information you post online. Once it is on the Internet, it is extremely difficult to remove.

      *Secure mobile devices
      More often than not, we leave our mobile devices unattended. By activating the built-in security features you can avoid any access to personal details. Never store passwords, pin numbers and even your own address on any mobile device.

      *Protect your Data
      Use encryption for your most sensitive files such as tax returns or financial records, make regular back-ups of all your important data, and store it in a different location.

      *Be aware of what you do while using public Wi-Fi Hotspots
      While these access points are convenient, they are far from secure. Avoid conducting financial or corporate transactions on these networks.

      *Protect your e-identity
      Be cautious when giving out personal information such as your name, address, phone number or financial information on the Internet. Make sure that websites are secure (e.g. when making online purchases) or that you’ve enabled privacy settings (e.g. when accessing/using social networking sites).

      *Avoid being scammed
      Always think before you click on a link or file of unknown origin. Don’t feel pressured by any emails. Check the source of the message. When in doubt, verify the source. Never reply to emails that ask you to verify your information or confirm your user ID or password.

      Delete
  22. how can we avoid to those hackers?

    ReplyDelete
    Replies
    1. To prevent hackers:

      1. Perform required software updates for your operating system and web browser.

      2. Install a firewall on your computer.

      3. Change your passwords often.

      4. Purchase or download anti-virus software.

      5. Install anti-spyware/adware programs onto your system.

      6. Delete emails from unknown sources.

      Delete
  23. These are serious cases that we should really avoid and now i feel a lot cautious in my social media accounts. Thanks for the blog maam.

    ReplyDelete
  24. What steps/tips can we use to prevent hackers from getting to our system?

    ReplyDelete
    Replies
    1. 7 Tips to prevent from hackers:

      1. Be suspicious of emails
      2. Check link locations
      3. Never open attachments (unless you’re really sure)
      4. Use two-factor authentication
      5. Use advanced passwords
      6. Be wary of the cloud
      7. On public Wi-Fi? Don’t share personal data

      Delete
  25. As of now i think most of the people are not using the technology well

    ReplyDelete
    Replies
    1. It depends in the user April. Technology had a big role in our life and we must use it in a good way.

      Delete
  26. Can you give me some tips on how to prevent cyber crime?

    ReplyDelete
    Replies
    1. I mentioned it above. It is Ruwan's question also.

      Delete
  27. it has too many disadvantages for example the smugglers in the philippines can communicate faster on what they do

    ReplyDelete
    Replies
    1. I didn't get your point Patrick. I'm sorry. Would you please make it clearer to me :)

      Delete
  28. Everything has disadvantages and advantages. What do you think are the advantages of cyber bullying?

    ReplyDelete
    Replies
    1. I think cyberbullying doesn't have advantages because it is also part of cybercrimes in other countries. I hope the bill about cyberbullying in our country will be approved.

      Delete
  29. maam I think there are a lot of information can internet give to us but my question is how can we know if is it true? it is an example of disadvantages of ict right? because we all know that most on the internet was a garbage right?

    ReplyDelete
    Replies
    1. Some information above came from your book Empowerment Technology and some from the internet. I think they are reliable because it is coming from Ma'am Juliet's book :) And not all information on the internet is a garbage. What do you think?

      Delete
  30. I think the advantages of ICT can help diminish these disadvantages. We can use ICT to send opinions and campaign against illegal and unfair actions being made by some netizens and we can also make people aware and inform them and call their attention through social media. But how maam can we really keep ourselves away from these disadvantages?

    ReplyDelete
    Replies
    1. We can keep away from the disadvantages from doing the safety tips in using ICT. It will help us a lot, so we must practice for being secure in the disadvantages.

      Delete
  31. Is Torrent downloader an example of criminal copyright infringement?

    ReplyDelete
    Replies
    1. Yes, maybe. But I read this conclusion in the internet that

      "One thing for sure, torrent is not equal to piracy. The torrent protocol is just a transmission mean for users to download files more easily. It is the content (not the protocol) that makes the act illegal. When it comes to downloading through the torrent protocol, there’s no real way to stay completely safe. However, it remains one of the most effective peer-to-peer protocols in the world."

      So I'm not really sure if it is an example of criminal copyright infringement.

      Delete
  32. How can we protect our internet/social media in hackers?

    ReplyDelete
    Replies
    1. 7 Tips to prevent from hackers:

      1. Be suspicious of emails
      2. Check link locations
      3. Never open attachments (unless you’re really sure)
      4. Use two-factor authentication
      5. Use advanced passwords
      6. Be wary of the cloud
      7. On public Wi-Fi? Don’t share personal data

      Delete
  33. I often believe that everything has its advantages and disadvantages. These disadvantages are caused mostly by the improper use of people or their unwise approach to it. It is so unavoidable in this society but of course, the advantages of it is what truly matters.

    ReplyDelete
    Replies
    1. Yes, I agree with you. Although there is a negative effect of ICT, we must always focus in the positive side and practice to be safe in the cyber criminals.

      Delete
  34. It is normal for everything in this world to have its pros and cons. Yes, this is inevitable so what are best thing to do to lessen these things ?

    ReplyDelete
    Replies
    1. Just be aware of the cyber criminals and practice some tips to keep secured in surfing in the internet.

      Delete
  35. What are things need to consider if we're browsing or using Internet ?

    ReplyDelete
    Replies
    1. There are a lot of things to consider in surfing in the internet and it is like preventing from the hackers also, so this the tips for that:

      7 Tips to prevent from hackers:

      1. Be suspicious of emails
      2. Check link locations
      3. Never open attachments (unless you’re really sure)
      4. Use two-factor authentication
      5. Use advanced passwords
      6. Be wary of the cloud
      7. On public Wi-Fi? Don’t share personal data

      Delete
  36. If I am being blackmailed, is calling the police a right move?

    ReplyDelete
    Replies
    1. Take this as an initial step:

      1.Inform the authorities that you are being blackmailed.

      2.Keep in mind that paying is unlikely to stop the blackmailer's demands.

      3.Don't confront the person (online or otherwise); end all contact with them immediately.

      4.Place filters on your email account(s) to block their email address.

      5.Block them from your social networking accounts and change the privacy settings to try to keep them accessing from your list of friends.

      6.Change all of your passwords with strong, unique alphanumeric codes if you think you were hacked.

      7.Consider starting new email accounts. Let contacts know that your old accounts were hacked and they should not open any message from them.

      8.Password protect all of your devices.

      So, the answer in your question JC is a yes.

      Delete
  37. I was once a victim of a hacker, is there a way to prevent/avoid it?

    ReplyDelete
    Replies
    1. 7 Tips to prevent from hackers:

      1. Be suspicious of emails
      2. Check link locations
      3. Never open attachments (unless you’re really sure)
      4. Use two-factor authentication
      5. Use advanced passwords
      6. Be wary of the cloud
      7. On public Wi-Fi? Don’t share personal data

      Delete
  38. The Pirate Bay (commonly abbreviated TPB) is an online index of digital content of mostly entertainment media, founded in 2003, where visitors can search, download and contribute magnet links and torrent files, which facilitate peer-to-peer file sharing among users of the BitTorrent protocol.

    In 2009, the website's founders were found guilty in Sweden for assisting in copyright infringement. In some countries, Internet service providers have been ordered to block access to the website. Subsequently, proxies have been providing access to it, and its content is being provided by multiple round-robin servers, collectively nicknamed the "TPB hydra"

    I don't know if torrent can be shut down also. I think it is in the process of the court.

    ReplyDelete
  39. The site is reporting an illegal sports betting site in Korea.먹튀

    ReplyDelete
  40. Channels made redirection beguilement structures to sports and more data online have moved sports. 토토

    ReplyDelete
  41. Everything about the site reports illegal sports betting site in Korea. 토토

    ReplyDelete
  42. Place more disadvantage or tell us u don't have anything

    ReplyDelete
  43. What are the possible means of curtailing the harmful effects of ICT

    ReplyDelete