1. IDENTITY THEFT

    Identity theft on the Internet - through the so-called phishing technique - consists in taking control of a person's virtual identity by extracting their password and username and posing as them to use their account for different, often fraudulent and unhealthy purposes.

    Tips : Caution

    • Use a complex password. Passwords that are too simple, such as'azerty','1234' or your date of birth, expose you to identity theft.
    • When completing a form, be careful when checking the boxes that allow your personal data to be used. Be assured of the ethical use of your personal data.
    • Use a good anti-virus and anti-phishing filter.
    • Regularly delete cookies from your computer.
    • Your passwords and PIN code are confidential: NEVER disclose them.

  2. SEXUAL PREDATORS / PAEDOPHILES / CRIMINALS

    A paedophile on the Internet does not expose himself openly by saying who he is and what he is coming for. These predators hide under false identities and try to win your friendship to make you feel confident. They use fake profile photos, false names, surnames, ages, etc., to pretend to be people they are not. That's what makes these crimes so common.

    Other crimes are committed using the same approaches. These crimes include social engineering.

    Tips : Care, Discretion, Awareness, Parental Control


    According to the Law No. 2010/012 of 21 December 2010 Relating to Cybersecurity and Cyber criminality in Cameroon: Whoever uses electronic communication devices to make sexual proposal to a person of the same sex shall be punished with imprisonment for, from 01 (one) to 02 two years or a fine of from 500 000 (five hundred thousand) to 1 000 000 (one million) CFA francs or both of such fine and imprisonment.

    Penalities provided for above shall be doubled if sexual proposals are followed by sexual intercourse.


  3. CYBER HARASSMENT

    Cyberbullying is a recent form of harassment that has developed at the same time as social networks. Harassment is no longer only in physical relationships (playgrounds or classrooms, offices, etc.). The Internet is now becoming a formidable weapon for harassment. More and more people are using this space to attack other people with messages containing threats, insults and degrading images.

    Tips : Care, Discretion, Awareness, Parental Control


  4. COMPUTER PIRACY

    A hacker, in computer science, is a person who penetrates a computer object without authorization, by computer means.

    There are many kinds of hackers on the Internet, good and bad. Each with a specific purpose and different ways of operating:

    • Hackers: IT security specialist, who likes to understand the internal operations of a system, especially computers and computer networks).
    • Script kiddies/Lamer: A pejorative expression of Anglo-Saxon origin referring to neophytes who, lacking the main skills in IT security management, spend most of their time trying to infiltrate systems).
    • Crackers: Pirate who aims to make money by hacking into documents, computer systems and destroys shareware (proprietary software that can be used free of charge for a period of time after which the user must pay the author to continue using this software).
    • Black Hat: Intentioned hacker.
    • Grey Hat: Competent hacker who sometimes acts in a good spirit, and sometimes not. This is a hybrid between a white hat hacker and a black hat hacker).
    • White Hat: They oppose black hats, who are malicious hackers and are computer security experts.

            Tips : To avoid such attacks as much as possible, you should use an up-to-date antivirus software, scan your computer regularly, make regular updates (patches), use complex passwords, never share your password, know and avoid social engineering mechanisms.

            MTN Cameroon has deployed a range of technological, human and procedural means to ensure the availability, confidentiality and integrity of communications on its network.