2nd discussion Flashcards

1
Q

RA 10175

A

“Cybercrime Prevention Act of 2012”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The access to the whole or any part of a computer system without right.

A

Illegal Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The interception made by technical means and without right, of any non-public transmission of computer data to, from, or within a computer system, including electromagnetic emissions from a computer system carrying such computer data

A

Illegal Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document or electronic data message, without right, including the introduction or transmission of viruses.

A

Data Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The intentional alteration, or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document or electronic data message, without right or authority, including the introduction or transmission of viruses.

A

System Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The use, production, sale, procurement, importation, distribution or otherwise making available, intentionally and without right

A

Misuse of Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The input, alteration or deletion of any computer data without right, resulting in inauthentic data, with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible

A

Computer-related Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The act of knowingly using computer data, which is the product of computer-related forgery as defined herein, for the purpose of perpetuating a fraudulent or dishonest design.

A

Computer-related Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The unauthorized “Input, alteration or deletion of computer data or program, or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.

A

Computer-related Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right.

A

Computer-related Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Any person found guilty of Child Pornography shall be punished in accordance with the penalties set forth in _______________ or the _________________________________”.

A

Republic Act No. 9775; “Anti-Child Pornography Act of 2009”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The penalty to be imposed in child pornography shall be ___________________________________ if committed through a computer system.

A

one (1) degree higher than that provided for in Republic Act No. 9775

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The acquisition of a domain name over the internet, in bad faith, in order to profit, mislead, destroy reputation, and deprive others from registering the same

A

Cyber-squatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The willful engagement, maintenance, control or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.

A

Cybersex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The unlawful or prohibited acts of libel, as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means.

A

Libel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Any person who willfully abets, aids, or financially benefits in the commission of any of the offenses enumerated in the Act shall be held liable, except with respect to Child Pornography and online Libel.

A

Aiding or Abetting in the Commission of Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Any person who willfully attempts to commit any of the offenses enumerated in the Act shall be held liable, except with respect to Child Pornography and online Libel.

A

Attempt to Commit Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The ___________________________ and the __________________________ shall be responsible for the efficient and effective law enforcement of the provisions of RA 10175.

A

National Bureau of Investigation (NBI); Philippine National Police (PNP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The _____ and the _____ shall organize a cybercrime division or unit to be manned by Special Investigators to exclusively handle cases involving violations of this Act.

A

NBI; PNP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The NBI shall create a cybercrime division to be headed by at least a ___________. The PNP shall create an anti-cybercrime unit headed by at least a _____________.

A

Head Agent; Police Director

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The _______________________ created under the Act shall coordinate the efforts of the NBI and the PNP in enforcing the provisions of the Act.

A

DOJ-Office of Cybercrime (OOC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

It also provided under this law the creation of an inter-agency body known as the __________________________________ under the Office of the President.

A

Cybercrime Investigation and Coordinating Center (CICC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

To ensure that the technical nature of cybercrime and its prevention is given focus, and considering the procedures involved for international cooperation, law enforcement authorities, specifically the computer or technology crime divisions or units responsible for the investigation of cybercrimes, are required to submit ________________________ including pre-operation, post-operation and investigation results, and such other documents as may be required to the Department of Justice (DOJ) – Office of Cybercrime for review and monitoring.

A

timely and regular reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The integrity of traffic data and subscriber information shall be kept, retained and preserved by a service provider for a minimum period of ______________________ from the date of the transaction. Content data shall be similarly preserved for __________________ from the date of receipt of the order from law enforcement authorities requiring its preservation.

A

six (6) months; six (6) months

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Law enforcement authorities, upon the issuance of a ______________, shall be authorized to collect or record by technical or electronic means, and the service providers are required to collect or record by technical or electronic means and/or to cooperate and assist in the collection or recording of computer data that are associated with specified communications transmitted by means of a computer system.

A

court warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Law enforcement authorities, upon securing a court warrant, shall issue an order requiring any person or service provider to disclose or submit, within _________________ from receipt of such order, subscriber’s information, traffic data or relevant data in his/its possession or control.

A

seventy-two (72) hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Law enforcement authorities may request for an extension of time to complete the examination of the computer data storage medium and to make a return thereon, but in no case for a period ________________________________________.

A

longer than thirty (30) days from date of approval by the court

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

All computer data, including content and traffic data, that are examined under a proper warrant shall, within _______________ after the expiration of the period fixed therein, be deposited with the court in a sealed package, and shall be accompanied by an affidavit of the law enforcement authority executing it, stating the dates and times covered by the examination, and the law enforcement authority who may have access to the deposit, among other relevant data.

A

forty-eight (48) hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Upon expiration of the periods as provided in Sections 12 (6months) and Section 15 (Within the time period specified in the warrant), or until the final termination of the case and/or as ordered by the Court, as the case may be, service providers and law enforcement authorities, as the case may be, shall ___________________________________.

A

immediately and completely destroy the computer data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Any evidence obtained without a valid warrant or beyond the authority of the same shall be inadmissible for any proceeding before any court or tribunal.

A

Exclusionary Rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Any evidence obtained _________________ or _____________________ shall be inadmissible for any proceeding before any court or tribunal.

A

without a valid warrant; beyond the authority of the same

32
Q

Failure to comply with the provisions of stated above specifically the orders from law enforcement authorities, shall be punished as a violation of _______________________, entitled _______________________________________.

A

Presidential Decree No. 1829; ‘Penalizing Obstruction of Apprehension and Prosecution of Criminal Offenders.’

33
Q

The criminal charge for obstruction of justice shall be filed before the _____________________________________________________________________.

A

designated cybercrime court that has jurisdiction over the place where the non-compliance was committed

34
Q

The criminal actions for violation of RA 10175, shall be filed before the designated ________________________________ of the province or city where the offense or any of its elements is committed, or where any part of the computer system used is situated, or where any of the damage caused to a natural or juridical person took place.

A

special cybercrime court (RTC)

35
Q

As provided under RA 10175, There shall be designated special cybercrime courts manned by specially trained judges to handle cybercrime cases and the ______________ shall designate prosecutors and investigators who shall comprise the prosecution task force or division under the DOJ-Office of Cybercrime, which will handle cybercrime cases in violation of the said Act.

A

Secretary of Justice

36
Q

It authorizes law enforcement to issue an order to disclose or submit subscriber’s information, traffic data, or relevant data in the possession or control of a person or service provider within seventy-two (72) hours from the receipt of the order.

A

Warrant to Disclose Computer Data (WDCD)

37
Q

Within ___________________ from implementation or after the expiration of the effectivity of the WDCD, the authorized law enforcement officer must accomplish a return and to turn over the disclosed computer data or subscriber’s information to the court.

A

forty-eight (48) hours

38
Q

It authorizes law enforcement to listen, record, monitor, or surveil the content of the communications through electronic eavesdropping or tapping devices, at the same time the communication is occurring.

A

Warrant to Intercept Computer Data (WICD)

39
Q

It authorizes the search the particular place for items to be seized and/or examined.

A

Warrant to Search, Seize, and Examine Computer Data (WSSECD)

40
Q

Upon the conduct of the seizure, law enforcement must file a return stating the (a) _________________________________ and (b) the __________________________________________ containing such data.

A

devices that were subject of the WSSECD; hash value of the computer data and/or the seized computer device or computer system

41
Q

It allows law enforcement agencies to search a computer device or computer seized during a lawful warrantless arrest or by any other lawful method such as valid warrantless seizure, in flagrante delicto, or by voluntary surrender.

A

Warrant to Examine Computer Data (WECD)

42
Q

The four warrants described above are only obtained by _____________________________________ from ____________________ specially designated to handle cybercrime cases. Thus, private complainants will need to coordinate with such agencies if such warrants are to be obtained.

A

law enforcement agencies (PNP or the NBI); Regional Trial Courts

43
Q

It provided the four general types of cybercrime.

A

Budapest Convention on Cyber Crime

44
Q

When someone gains access to a website, program, server, service, or other system using someone else’s account.

A

Unauthorized Access

45
Q

Any attempt to intrude into a computer or a network without authorization. This involves changing of system or security features in a bid to accomplish a goal that differs from the intended purpose of the system. It can also refer to non-malicious activities, usually involving unusual or improvised alterations to equipment or processes. An individual who involves themselves in hacking activities is known as a hacker.

A

Hacking

46
Q

They are also known as ethical hackers. They strive to operate in the public’s best interest, rather than to create turmoil. Many white hat hackers work doing penetration, to attempt to break into the company’s networks to find and report on security vulnerabilities.

A

White hats

47
Q

This kind of hackers hack to take control over the system for personal gains. They destroy, steal, and even prevent authorized users from accessing the system.

A

Black hat hackers

48
Q

They belong to the neutral zone. They act in the middle ground between white hat hackers, who operate on behalf of those maintaining secure systems, and sometimes act as black hat hackers who act maliciously to exploit vulnerabilities in systems.

A

Gray hat hackers

49
Q

It is breaking into a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. Crackers also act as Black Hats by gaining access to the accounts of people maliciously and misusing this information across networks. They can steal credit card information, they can destroy important files, disclose crucial data and information or personal details and sell them for personal gains.

A

Cracking

50
Q

The crime committed via a computer and internet with the intent to corrupt another individual’s personal and financial information stored online from people illegally by deceiving them.

A

Cyber Fraud

51
Q

It is a type of scam in which criminals attempt to obtain someone’s personal information by pretending to be a legitimate source.

A

Spoofing or Phishing

51
Q

It is a type of scam in which criminals attempt to obtain someone’s personal information by pretending to be a legitimate source.

A

Spoofing or Phishing

52
Q

It is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust. The sender forges email headers so that client software displays the fraudulent sender address, which most users take at face value.

A

Email Spoofing

53
Q

It is sometimes referred to as smishing. The text message may appear to come from a legitimate source, such as your bank. It may request that you call a certain phone number or click on a link within the message, with the goal of getting you to divulge personal information.

A

Text Message Spoofing

54
Q

This happens when scammers set up a fraudulent website to obtain information from victims or to install malware on their computers.

A

URL Spoofing

55
Q

These are false reports about non-existent viruses, often claiming to do impossible things like blow up the recipient’s computer and set it on fire, or less sensationally, delete everything on the user’s computer.

A

Virus hoaxes

56
Q

These are emails which inform the recipient that he/ she has won a prize in a lottery.

A

Lottery Frauds

57
Q

It is the unauthorized use of a credit or debit card, or similar payment tool to fraudulently obtain money or property. Credit and debit card numbers can be stolen from unsecured websites or can be obtained in an identity theft scheme.

A

Credit Card Fraud

58
Q

It is the scheme of obtaining the personal, financial information or other information of another person to use their identity to commit fraud or other illegal activities.

A

Identity theft

59
Q

It is the unauthorized use of Internet hours paid for by another person.

A

Theft of Internet Hours

60
Q

It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.

A

Cyber Terrorism

61
Q

It is the act of using cyberspace to create, display, distribute, import, or publish pornography or obscene materials, especially materials depicting children engaged in sexual acts with adults.

A

Cyber Pornography

62
Q

It is the term used when someone has posted or emailed something that is untrue and damaging about someone else on the social media, including blogs, chat rooms, personal websites, social media, social networking sites, or other published articles.

A

Cyber-libel or cyber defamation

63
Q

Cyber defamation is also called as ________________________.

A

Cyber smearing

64
Q

This refers to the use of the Internet, e-mail, or other electronic communications device to stalk and later on harass another person.

A

Cyber Stalking

65
Q

This is accomplished by flooding the target with traffic, or sending many information that triggers a crash on someone’s computer or computer network.

A

Denial of Service (DoS) attacks

66
Q

It occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.

A

Distributed Denial-of-Service Attack (DDoS attack)

67
Q

It is a technique by which cyber-criminals steal money or resources a bit at a time so that it will be remain unnoticeable.

A

Salami Slicing Attack

68
Q

It is a common cyberattack where malware executes unauthorized actions on the victim’s computer system. The malicious software encompasses many specific types of attacks like infecting computers.

A

Malware attack

69
Q

It is a type of malware that automatically delivers advertisements.

A

Adware (Advertising-supported software)

70
Q

It is a malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.

A

Ransomware

71
Q

It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.

A

Rootkit

72
Q

It is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware.

A

Trojan horse

73
Q

It is designed to damage the target computer or device by corrupting data, reformatting your hard disk, or completely shutting down your system.

A

Virus

74
Q

It is a type of malware that spreads copies of itself from computer to computer.

A

Worm