You are on page 1of 11

NORTHWESTERN UNIVERSITY

LAOAG CITY







KONSEPTONG
PAPEL


















Paksa:

Ang mababang sekyuridad ng internet dulot ng Malware, Spyware, Adware,
Virus, Hackers, at Scams










TARGET NA PAKSAIN:
Ang Mababang Sekyuridad ng Internet Dulot ng Malware, Spyware,
Adware, Virus, Hackers, at Scams

RASYUNAL:
Noon pa naming naitatanong sa aming murang isipan kung gaano nga ba
talaga kaligtas ang pagbibisita sa internet. Ano nga ba talaga? Gaano nga ba
kaligtas?
Dulot na rin sa paglago ng gumagamit, ibat-ibang antas nang aktibidad ang
tuwirang nagaganap. Gaano nga ba talaga kaligtas ang internet? Ibat-iba nang
Cyber Crimes ang nagaganap dahil sa paglaganap ng Malware, Virus,
Adware, Spams, at idagdag pa ang mga Hackers.
May mas mataas kayang seguridad ang kapwa seguridad sa Cyber Space?

LAYUNIN:
1. Upang maiwasan ang paglaganap o tuluyan nang mapuksa ang
lumalaganap na Cyber Crime.
2. Upang maging malinaw sa atin na ang paggamit sa internet ng lubusan at
walang Caution na tinatawag ay nakakasira sa sarili nating kapwa.
Narito na rin ang paglabag o panghihimasok sa kanyang pansariling
aydentidad o mas kilala bilang Violation of Privacy.
3. Upang mapalaganap ang wastong kaalaman sa tuwirang pagreresolba sa
malawakang pagkalop ng datos dulot ng Cyber Threat upang maiwasan
ang palala nang palalang krimen sa internet.
4. Upang paigtingin pa ang seguridad sa pamamagitan ng wastong
kaalaman at kakayahan upang mapanatili ang kaayusan at hind imaging
isa sa mga biktima ng Cyber Threat at Cyber Criminals.

SULIRANIN:
Ano ang ibat-ibang pang uri ng Threat sa Cyberspace?
Sinu-sino ang responsible sa paglaganap ng mga threats na ito?
Sinu-sino ang mga nabiktima ng Cyber Crime?
Gaano na kalawak ang Cyber Threat?







PAGPAPALIWANAG SA:

CYBER SPACE
CYBER THREAT
CYBER CRIMINAL
MALWARE
SPYWARE
ADWARE
VIRUS
SCAMS
HACKERS



CYBER SPACE
is the electronic medium of computer networks, in which online
communication takes place

Ang terminong "cyberspace" ay unang ginamit sa pamamagitan ng
cyberpunk science fiction may-akda ng William Gibson.

Ayon sa WikiPedia ang Cyber Space ay Now ubiquitous, in current usage
the term "cyberspace" stands for the global network of interdependent information
technology infrastructures, telecommunications networks and computer processing
systems. As a social experience, individuals can interact, exchange ideas, share
information, provide social support, conduct business, direct actions, create
artistic media, play games, engage in political discussion, and so on, using this
global network.Ang ibig sabihin lamang nito na ang terminong Cyber Space ay
kasalukuyang ginagamit para sa Global Network of Interdependent Information
Technology Infrastractures, Telecomunications Networks and Computer
Processing Systems.

Ang terminong ito rin ay ang ibang katawagan sa Internet o World Wide
Web.






CYBER THREAT
Cyber Threat, o mas kilala bilang Computer Virus. Ito ay uri ng isang
Malicious Code na kung saan maari nitong sirain ang isang yunit ng kompyuter,
gawin itong balisa o irresponsive, pinapagalaw itong mag-isa, ginagamit bilang
Proxy upang gamitin sa pagdedeliber ng isang mensahe sa ibat-ibang account sa
internet.
Ang Cyber Threat din ay ang numero unong problema sa lahat ng mga
Computer Users o iyong mga taong gumagamit ng kompyuter sa ibat-ibang uri
ng gawain, ang Cyber Threat na kasi ngayon ay marami nang uri at sa pagdaan ng
mga panahon, unti-unti na rin itong dumadami dahil sa daliang pagkalat ng
Malicious Codes na nakakaapekto sa perpormans at reyabilidad ng isang
kompyuter.



CYBER CRIMINAL

Ang krimen o sala ay isang gawaing mapaparusahan ng batas o itinuturing
na masamang gawain. Isa itong paglabag sa pangkaraniwang batas o batas publiko
(halimbawa na ang itinatadhana ng Kodigo Penal o Binagong Kodigo
Penal o sistemang legal). Maaari rin itong isang pagtrato o kalagayang hindi
makatarungan o hindi makabatas. Mabibigyang kahulugan din ito bilang isang
maling gawaing itinuturing ng isang estado o ng Kongreso bilang
isang pelonya (felony sa Ingles) o isang kasalanang hindi gaanong mabigat
(misdemeanor sa Ingles, pag-uugaling masama) na ang parusa ay maaaring multa o
pagkakakulong sa lokal na kulungan. Sa pangkalahatang diwa, ang krimen ay
kinabibilangan ng lahat ng mga paglabag, subalit sa diwang limitado ay nakatuon
lamang sa pelonya.

Gaya na din sa depinisyon ng krimen, ganyan din ang Cyber Crime ang
diperensya lamang ay ito ay nagagawa lamang sa isang teknikal na bagay gaya ng
kompyuter. Samantala, ang terminong Cyber Criminal naman ay iyong taong
gumagawa ng tinatawag nating Cyber Crime, wari nila na makapagnakaw sa
mga bangko sa pamamagitan ng Hacking na kung saan araw-araw ay maraming
bangkong nananakawan. Hindi lamang pagnanakaw ng pera ang pwedeng gawin
ng isang Cyber Criminal maari din silang gumawa ng mga bagay na di kaaya-
aya at lumalabag sa Copyrights ng isang produkto (Computer Software) na kung
saan nilalabag nila ang pagiging Shareware o lisensyadong produkto nito. Isa pa
ang tinatawag nilang Account Hacking na kung saan, ninanakaw nila ang
account ng isang tao upang hindi na kaylanman mabubuksan ng taong iyon ang
kanyang account, halimbawa nito ay ang Hacking sa Facebook, Twitter, MySpace
at iba pang Social Networks, laganap itong account hacking na ito sa kasalukuyan
at dahan dahang sinisira ng Cyber Criminal na ito ang aydentidad ng user.

Ayon sa site na ito http://www.naavi.org/pati/pati_cybercrimes_dec03.htmang
Cyber Threat ay:
Ang Cybercrime pinakabago at masasabin pinakakumplikadong problema sa
cyber world. Ang Cybercrime daw ay masasabing sangkap kung saan ang mga
may dunong ang siyang conventional crime,at kung saan ang mga kumpyuter
ang siyang object or subject sa paggawa ng konstitusyong krimen. Sa anumang
aktong pangkrimen kung saan ang gamit ay kumpuyuter bilang instrumento, target
o dahilan ng paglaganap ng mga krimen ay may kalakip na marusa sa kung sino
man ang gagawa ng isang Cyber Crime.
Ang depinisyon ng Cyber Crime ay maaring isang unlawful act na kung saan
ang kompyuter ay ginagamit bilang isang kagamitan sa mga sumusunod klase ng
mga gawaing financial crimes, sale of illegal articles, pornography, online
gambling, intellectual property crime, e-mail spoofing, forgery, cyber defamation,
cyber stalking. Samakatuwid ang kumpyuter ay maaari ring maging isang target
sa mga sumusunod na kaso ng mga katiwalian tulad ng walang pahintulot na
paggamit sa isang computer system, pagnanakaw ng pribadong aydentidad,
pagkalat ng mga virus sa internet, paggawa ng isang e-mail bomb, at pagsira ng
isang sistema ng isang kompyuter.
CYBER CRIMINALS:
May ibat-ibang kategorya at grupo ang cyber criminal. Ang dibisyon na ito ay
maaring basehan sa isang bagay na nasa kanilang isipan. Ang mga sumusunod ay
kategorya ng cyber criminals.
1. Ang mga kabataan na naggugulang n gamin hanggang labingwalo-
*C- 1CCC- ccCcC Ccc 1c -cCOCC-
O C- CcacOc CcOOC C- Cc-OO-cC 1c
-c acOccO CcCCOc C- CcccC cc
C 1c cC- CcO11ccC cCccC cO -cCO-c
C cC- -c ac-cO_lac CcC- -c c-CcO-C
cO ccCcC cO cccC- OCcC- CcOOCcOcC
cC- CcCCcC- 1cC Cc c-C- acCOC
- 1c CccO C- ac CcC- -c acOc 1cCcC
CcC- -OCC.
cc-cc-cC- -c ccCcC cO cccC- C
cC-Cc1CcC CcO_ tcCacOc cC ccl
lJC Cc1C cO cC- CCcCcac1cC C- CcCC
C-cC- C- CcacOc 1c Cccc-OcC C- Cc
COcC- -c Cca-cC.
2. Organised hackers-
*C- -c O C- -c csC1 Cc OC cO
cCC1 C-cC1ccC OCcC- cOOCcc cC- CcC-
-c CcOOCC_ *C- ccCcC cO OCcC-
cOOCcc cC- CcCCcC- CcCOCOCc ac1CO
CccCOcC1C cO ac Cc_ *C- -c -cC
1OcC1 cO 1Cca 1c 1c CCcCccO1cO
Cc CcCccc C- -c csC1 1c OCcC
_ *C- CcCCcC- CcC-OCcC- Oc-O cO
cC- -c lCccC -COCCO 1O cC-
CcOOCC CCc cO cOOCcc cC- CcCCcC
- CcCOCOCcC- CcOOCC_ *C- *L* c
O cC- 1lLLE 1O cO CcCc-C- Cc1c
CcC C- -c cOcC C- -c csC
1_
3. Professional hackers / crackers
Ang kanilang trabaho ay ganyakin ang kulay ng pera. Ang ganitong uri ng hacker
ay karaniwang inemploy para ma-hack ang site ng kalaban para makakuha ng
isang maasahang datos.
Further they are ven employed to crack the system of the employer basically as a
measure to make it safer by detecting the loopholes.
4. Discontented employees-
This group include those people who have been either sacked by their
employer or are dissatisfied with their employer. To avenge they normally hack
the system of their employee.
MODE AND MANNER OF COMMITING CYBER CRIME:
1. Unauthorized access to computer systems or networks / Hacking-
This kind of offence is normally referred as hacking in the generic sense. However
the framers of the information technology act 2000 have nowhere used this term so
to avoid any confusion we would not interchangeably use the word hacking for
unauthorized access as the latter has wide connotation.
2. Theft of information contained in electronic form-
This includes information stored in computer hard disks, removable storage
media etc. Theft may be either by appropriating the data physically or by
tampering them through the virtual medium.
3. Email bombing-
This kind of activity refers to sending large numbers of mail to the victim,
which may be an individual or a company or even mail servers there by
ultimately resulting into crashing.
4. Data diddling-
This kind of an attack involves altering raw data just before a computer
processes it and then changing it back after the processing is completed.
The electricity board faced similar problem of data diddling while the
department was being computerised.
5. Salami attacks-
This kind of crime is normally prevalent in the financial institutions or for the
purpose of committing financial crimes. An important feature of this type of
offence is that the alteration is so small that it would normally go unnoticed.
E.g. the Ziegler case wherein a logic bomb was introduced in the banks
system, which deducted 10 cents from every account and deposited it in a
particular account.
6. Denial of Service attack-
The computer of the victim is flooded with more requests than it can handle
which cause it to crash. Distributed Denial of Service (DDoS) attack is also a
type of denial of service attack, in which the offenders are wide in number and
widespread. E.g. Amazon, Yahoo.
7. Virus / worm attacks-
Viruses are programs that attach themselves to a computer or a file and then
circulate themselves to other files and to other computers on a network. They
usually affect the data on a computer, either by altering or deleting it. Worms,
unlike viruses do not need the host to attach themselves to. They merely make
functional copies of themselves and do this repeatedly till they eat up all the
available space on a computer's memory. E.g. love bug virus, which affected at
least 5 % of the computers of the globe. The losses were accounted to be $ 10
million. The world's most famous worm was the Internet worm let loose on the
Internet by Robert Morris sometime in 1988. Almost brought development of
Internet to a complete halt.
8. Logic bombs-
These are event dependent programs. This implies that these programs are
created to do something only when a certain event (known as a trigger event)
occurs. E.g. even some viruses may be termed logic bombs because they lie
dormant all through the year and become active only on a particular date
(like the Chernobyl virus).
9. Trojan attacks-
This term has its origin in the word Trojan horse. In software field this
means an unauthorized programme, which passively gains control over
anothers system by representing itself as an authorised programme. The most
common form of installing a Trojan is through e-mail. E.g. a Trojan was
installed in the computer of a lady film director in the U.S. while chatting. The
cybercriminal through the web cam installed in the computer obtained her nude
photographs. He further harassed this lady.
10. Internet time thefts-
Normally in these kinds of thefts the Internet surfing hours of the victim are
used up by another person. This is done by gaining access to the login ID and
the password. E.g. Colonel Bajwas case- the Internet hours were used up by
any other person. This was perhaps one of the first reported cases related to
cybercrime in India. However this case made the police infamous as to their
lack of understanding of the nature of cybercrime.
11. Web jacking-
This term is derived from the term hi jacking. In these kinds of offences
the hacker gains access and control over the web site of another. He may
even mutilate or change the information on the site. This may be done for
fulfilling political objectives or for money. E.g. recently the site of MIT
(Ministry of Information Technology) was hacked by the Pakistani hackers
and some obscene matter was placed therein. Further the site of Bombay
crime branch was also web jacked. Another case of web jacking is that of the
gold fish case. In this case the site was hacked and the information
pertaining to gold fish was changed. Further a ransom of US $ 1 million was
demanded as ransom. Thus web jacking is a process whereby control over
the site of another is made backed by some consideration for it.

MALWARE
Ito ay isang salitang pinaikli lamang mula sa mga salitang, malicious at
software. Sa mga salitang pinanggalingan ng termino, alam na natin agad kung
ano ang simpleng konsepto ng isang malware.

Ang Malware ay naglalaman ng programming (code, scripts, active
content, and other software) na sadyang dinesenyo para patigilin ang isang
operasyon, nangunguha ng impormasyon na napupunta sa pagkawala ng pribadong
impormasyon, naglalayong buksan ang sistema ng isang yunit ng walang
awtoridad, at iba pang mga mapang-abusong gawain sa isang kompyuter yunit.

Ang malware ay naglalaman ng computer viruses, worms, trojan
horses, spyware, adware, scareware, crimeware and differenet malicious
programs that harms a computer unit.

GAMIT NG MALWARE


Malware bilang kategorya noong Marso 16, 2011.
Noon pa lang ay marami ng infectious programs, kabilang na dito ang unang
Internet Worm and a number of MS-DOS viruses, na ginawa o isunulat na
parang isperimento o pranks. They were generally intended to be harmless or
merely annoying, rather than to cause serious damage to computer systems. In
some cases, the perpetrator did not realize how much harm his or her creations
would do. Young programmers learning about viruses and their techniques wrote
them simply for practice, or to see how far they could spread. As late as 1999,
widespread viruses such as the Melissa virus and the virus appear to have been
written chiefly as pranks. The first mobile phone virus, Cabir, appeared in 2004.
Hostile intent related to vandalism can be found in programs designed to
cause harm or data loss. Many DOS viruses, and the Windows Explore Zip worm,
were designed to destroy files on a hard disk, or to corrupt the file system by
writing invalid data to them. Network-borne worms such as the 2001 Code Red
worm or the Ramen worm fall into the same category. Designed to vandalize web
pages, worms may seem like the online equivalent to graffiti tagging, with the
author's alias or affinity group appearing everywhere the worm goes.
Since the rise of widespread broadband Internet access, malicious software has
been designed for a profit, for examples forced advertising. For instance, since
2003, the majority of widespread viruses and worms have been designed to take
control of users' computers for black-market exploitation. Infected "zombie
computers" are used to send email spam, to host contraband data such as child
Ito ay ang kamakaylan lamang na
resulta sa laganap na Cyber
Threat na may kinalaman sa
Malware
pornography, or to engage in distributed denial-of-service attacks as a form
of extortion.
Another strictly for-profit category of malware has emerged in spyware --
programs designed to monitor users' web browsing, display unsolicited
advertisements, or redirect affiliate marketing revenues to the spyware creator.
Spyware programs do not spread like viruses; they are, in general, installed by
exploiting security holes or are packaged with user-installed software, such as
peer-to-peer applications.

You might also like