CHAPTER 4 Flashcards
Mema lang: TITLE OF CHAPTER 4
INFORMATION,
CONTROL &
PRIVACY
It is a knowledge that you get about
someone or something.
Information
considered relevant truths which have
been validated and identified.
Facts
Information is Considered:
● Expandable
● Compressible
● Transportable
● Diffusive
refers to data, facts, or knowledge that
holds significant worth, relevance, or
usefulness.
Valuable Information
ENUMERATE:
The few characteristics
of valuable information:
● Accurate
● Complete
● Economical
● Reliable
● Flexible
● Relevant
● Simple
● Timely
● Verifiable
● Accessible
● Secure
It is the protection of computer systems
and information from harm, theft, and
unauthorized use.
Computer Security
It is the process of
preventing and detecting unauthorized
use of your computer system.
Computer Security
Computer Security protects computer systems and information from what? (3)
harm (1), theft (2), unauthorized use (3)
ENUMERATE:
Types of Computer Security:
- Information Security
- Application Security
- Network Security
- Cybersecurity
What Type of Computer Security:
securing information
from unauthorized access, modification &
deletion
Information Security
What Type of Computer Security:
securing an application
by building security features to prevent from
Cyber Threats such as SQL injection, DoS
attacks, data breaches and etc.
Application Security
What Type of Computer Security:
securing both the
software and hardware technologies
Network Security
What Type of Computer Security:
defined as protecting
computer systems, which communicate over
the computer networks
Cybersecurity
It is a model designed to guide policies for
information security within an
organization.
CIA TRIAD
The “CIA” in CIA TRIAD stands for:
Confidentiality, Integrity, Availability
The CIA TRIAD:
ensuring that information is available
only to the intended audience.
Confidentiality
The CIA TRIAD:
protecting information from being
modified by unauthorized parties.
Integrity
The CIA TRIAD:
ensures that information and
systems are accessible and
operational when needed.
Availability
are potential risks that have the capability
of disrupting the normal functioning of
computer systems.
They are on
the rise each day, especially with the
digitization of the world.
Computer Security Threats
ENUMERATE:
Types of Computer Security Threats:
- Viruses
- Computer Worm
- Phishing
- Botnet
- Rootkit
- Keylogger
a malicious program
which is loaded into the
user’s computer without
user’s knowledge.
Viruses
a software program that
can copy itself from one
computer to another,
without human interaction.
Computer Worm
Disguising as a trustworthy
person or business,
phishers attempt to steal
sensitive financial or
personal information
through fraudulent email
or instant messages.
Phishing
a group of computers
connected to the internet,
that have been
compromised by a hacker
using a computer virus.
Botnet
a computer program
designed to provide
continued privileged
access to a computer while
actively hiding its presence.
Rootkit
Also known as a keystroke
logger, can
track the real-time activity
of a user on his computer.
Keylogger
any illegal act involving a computer.
computer crime
refers to online or internet based illegal acts.
cybercrime
A person that commits
cybercrime
cybercriminal
Cybercriminals may also use software for
their crimes, that kind of software is
called what?
crimeware
It can be individuals, groups, or
organizations that engage in illegal
activities using computer networks or the
internet.
Cybercrime Perpetrators
ENUMERATE:
Common Types of
Cybercrime Perpetrators:
- Hackers
- Malware Developers
- Phishers
- Scammers
- Organized Crime Groups
individuals or groups who gain unauthorized
access to computer systems or networks.
Hackers
These groups may engage in activities such as hacking, identity theft, credit card fraud, or selling illegal goods and services on the dark web. They often have
sophisticated operations and networks spanning multiple countries.
Organized Crime Groups
create malicious software such as
viruses, worms, trojans, ransomware, and spyware.
Malware Developers
individuals or groups who send deceptive
emails or create fraudulent websites to trick users into providing sensitive information such as usernames,
passwords, credit card details, or social security numbers.
Phishers
use various techniques such as email, phone calls, or fake websites to deceive individuals into providing money, personal information, or access to their computers.
Scammers
Tips for protecting
yourself from cyberattacks: (Basahin or imemorize, your choice hehe)
● The first and most basic step in maintaining cybersecurity is to create a unique and original password for each account
● Keeping up with software updates is important, as cybercriminals often target known flaws in software to access a user’s system.
● Cybercriminals may comb through social media posts in search of information commonly used in security questions, such as a pet’s name or mother’s maiden name.
● A virtual private network (VPN) is a great way to protect sensitive data, especially when accessing a public Wi-Fi
network. A VPN encrypts all information transmitted by your device and helps prevent many types of cyberattacks.
It is a legislation that governs intellectual
property rights in the country.
The Intellectual
Property Code of
Philippines
What is the current
Intellectual Property Code of the
Philippines?
Republic Act No. 8293
Republic Act No. 8293 was enacted on _________
June 6, 1997
ENUMERATE:
some key
provisions of the Intellectual Property Code:
● Copyrights
● Patents
● Trademarks and Service Marks
● Industrial Designs
● Integrated Circuit Layout Designs
● Enforcement and Remedies
It is a legislation in the Philippines that
governs the protection of personal
information in both the government and
private sectors.
Data Privacy
Act of 2012
Data Privacy Act of 2012 is officially known as what?
Republic Act No. 10173
The Data Privacy Act of 2012 or also known as the Republic Act No. 10173 was signed into law on __________
August 15, 2012
aims to ensure the
privacy of individuals’ personal information
while facilitating the free flow of
information for innovation and economic
growth.
Data Privacy Act of 2012 (Republic Act No. 10173)
is a legislation in the Philippines that
addresses cybercrime and provides legal
measures for its prevention, investigation,
and prosecution.
Cybercrime
Prevention Act of 2012
Cybercrime
Prevention Act of 2012 is officially known as what?
Republic Act No.
10175
Cybercrime
Prevention Act of 2012 was signed into law on __________
September 12, 2012
It aims to
effectively combat cyber-related offenses
and promote a safe and secure
cyberspace.
Cybercrime
Prevention Act of 2012 (Republic Act No. 10175)
is a legislation in the Philippines that provides a legal framework for electronic transactions, electronic documents, and
electronic signatures.
Electronic Commerce Act of 2000
Electronic Commerce Act of 2000 is also called what?
Republic Act 8792
(it is the “eCommerce Law of the Philippines”)
Electronic Commerce Act of 2000 (Republic Act 8792) was signed into law on ________
June 14, 2000
Its purpose is to facilitate and promote the use of electronic commerce in the country.
Electronic Commerce Act of 2000 (Republic Act 8792)
a legislation in the Philippines that addresses the regulation and control of the production, mastering, replication, importation, exportation, sale, rental, and distribution of optical media.
Optical Media Act of
2003
Optical Media Act of
2003 is also known as what?
Republic Act No. 9239
Optical Media Act of 2003 (Republic Act No. 9239) was signed into law on _______
March 19, 2004
Its primary objective is to combat piracy and protect intellectual property rights related to optical media formats such as CDs, DVDs, and Blu-ray discs.
Optical Media Act of 2003 (Republic Act No. 9239)
I miss you
Bili ako ulam