As a software Engineer and practitioner, putting security measures in code from the start is very important in the overall Software architecture and the release product , having the right security planning workflow is already a standard in most IT and software companies and customers are already looking for that certain app or product that has an already established measures in handling cybersecurity before purchasing or even signing a deal. If these measure are not met means a huge risk of being victimized in today’s cybercrime.
What is a cybercrime?
A cybercrime is a crime committed with or through the use of information and communication technologies such as radio, television, cellular phone, computer and network, and other communication device or application.
The main difference between a cybercrime and crime committed in the physical world is that cybercrime is committed with or through the use of information and communication technology. Furthermore, cybercrimes are punishable under special cybercrime laws and subject to distinct law enforcement provisions.
There are various types and kinds of cybercrimes. The 2001 Budapest Convention on Cybercrime categorizes cybercrime offenses into four:
- Offenses against the confidentiality, integrity and availability of computer data and systems;
- Computer-related offenses;
- Content-related offenses;
- Offenses related to infringements of copyright and related rights.
Cybercrime is one of the fastest growing crimes globally. According to Norton Cyber Crime Report, 431 million adults worldwide were victims of cybercrimes in 2011. The costs
that cybercrimes caused in 2011 amounted to $114 billion.
Globally, the top cybercrimes in 2011 were
- computer viruses or malware – 54% overall;
- online Scams – 11%overall;
- phishing – 10% overall.
In a 2010 report of the security software firm Symantec, 87% of Filipino internet users were identified as victims of crimes and malicious activities committed online. The following activities were:
(1) malware (virus and Trojan) invasion;
(2) online or phishing scams;
(3) sexual predation;
(4) services in social networking site like Facebook and Twitter.
The Anti-Transnational Crime Division (ATCD) of the Criminal Investigation and Detection Group (CIDG) of the Philippine National Police (PNP) has encountered 2,778 referred cases of computer crimes from government agencies and private individuals nationwide from 2003 to 2012.
On 14 June 2000, RA 8792 or the Electronic Commerce Act was signed into law. RA 8792 positioned the Philippines as the third country to enact an e-commerce law, next to Singapore and Malaysia. The E-Commerce Act placed the Philippines on the list countries which penalize cybercrime.
If you’re starting or running a small business, getting expert advice can be a wise investment. An information-security professional can assist you in designing and implementing your approach to cybersecurity. The minimal cost of a small amount of professional help may pay for itself many times over in terms of time, money, and aggravation saved down the road.
Hire a Pro
Remember The folks who will attack you — cybercriminals and other hackers — have, and utilize, technical expertise. If you’d hire a lawyer if you were charged with a crime, go to a doctor if you felt a virus coming on, or hire an accountant if you were audited by the IRS, hire a cyberpro.
Be equipped with cybersecurity know-how to rise above a crisis, make informed decisions, and win the war against cyber threats. DECODE 2021 will be on November 10-11.
DECODE is the premier cybersecurity conference in the Philippines hosted by Trend Micro, a global leader in cybersecurity. To know more about this event and to secure your slot for free, visit https://decodeph.com