CHAPTER 4 Flashcards

1
Q

Mema lang: TITLE OF CHAPTER 4

A

INFORMATION,
CONTROL &
PRIVACY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It is a knowledge that you get about
someone or something.

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

considered relevant truths which have
been validated and identified.

A

Facts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information is Considered:

A

● Expandable
● Compressible
● Transportable
● Diffusive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

refers to data, facts, or knowledge that
holds significant worth, relevance, or
usefulness.

A

Valuable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ENUMERATE:

The few characteristics
of valuable information:

A

● Accurate
● Complete
● Economical
● Reliable
● Flexible
● Relevant
● Simple
● Timely
● Verifiable
● Accessible
● Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is the protection of computer systems
and information from harm, theft, and
unauthorized use.

A

Computer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is the process of
preventing and detecting unauthorized
use of your computer system.

A

Computer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computer Security protects computer systems and information from what? (3)

A

harm (1), theft (2), unauthorized use (3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ENUMERATE:

Types of Computer Security:

A
  1. Information Security
  2. Application Security
  3. Network Security
  4. Cybersecurity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What Type of Computer Security:

securing information
from unauthorized access, modification &
deletion

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What Type of Computer Security:

securing an application
by building security features to prevent from
Cyber Threats such as SQL injection, DoS
attacks, data breaches and etc.

A

Application Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What Type of Computer Security:

securing both the
software and hardware technologies

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What Type of Computer Security:

defined as protecting
computer systems, which communicate over
the computer networks

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is a model designed to guide policies for
information security within an
organization.

A

CIA TRIAD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The “CIA” in CIA TRIAD stands for:

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The CIA TRIAD:

ensuring that information is available
only to the intended audience.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The CIA TRIAD:

protecting information from being
modified by unauthorized parties.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The CIA TRIAD:

ensures that information and
systems are accessible and
operational when needed.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

are potential risks that have the capability
of disrupting the normal functioning of
computer systems.

They are on
the rise each day, especially with the
digitization of the world.

A

Computer Security Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ENUMERATE:

Types of Computer Security Threats:

A
  1. Viruses
  2. Computer Worm
  3. Phishing
  4. Botnet
  5. Rootkit
  6. Keylogger
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

a malicious program
which is loaded into the
user’s computer without
user’s knowledge.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

a software program that
can copy itself from one
computer to another,
without human interaction.

A

Computer Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Disguising as a trustworthy
person or business,
phishers attempt to steal
sensitive financial or
personal information
through fraudulent email
or instant messages.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

a group of computers
connected to the internet,
that have been
compromised by a hacker
using a computer virus.

26
Q

a computer program
designed to provide
continued privileged
access to a computer while
actively hiding its presence.

27
Q

Also known as a keystroke
logger, can
track the real-time activity
of a user on his computer.

28
Q

any illegal act involving a computer.

A

computer crime

29
Q

refers to online or internet based illegal acts.

A

cybercrime

30
Q

A person that commits
cybercrime

A

cybercriminal

31
Q

Cybercriminals may also use software for
their crimes, that kind of software is
called what?

32
Q

It can be individuals, groups, or
organizations that engage in illegal
activities using computer networks or the
internet.

A

Cybercrime Perpetrators

33
Q

ENUMERATE:

Common Types of
Cybercrime Perpetrators:

A
  1. Hackers
  2. Malware Developers
  3. Phishers
  4. Scammers
  5. Organized Crime Groups
34
Q

individuals or groups who gain unauthorized
access to computer systems or networks.

35
Q

These groups may engage in activities such as hacking, identity theft, credit card fraud, or selling illegal goods and services on the dark web. They often have
sophisticated operations and networks spanning multiple countries.

A

Organized Crime Groups

36
Q

create malicious software such as
viruses, worms, trojans, ransomware, and spyware.

A

Malware Developers

37
Q

individuals or groups who send deceptive
emails or create fraudulent websites to trick users into providing sensitive information such as usernames,
passwords, credit card details, or social security numbers.

38
Q

use various techniques such as email, phone calls, or fake websites to deceive individuals into providing money, personal information, or access to their computers.

39
Q

Tips for protecting
yourself from cyberattacks: (Basahin or imemorize, your choice hehe)

A

● The first and most basic step in maintaining cybersecurity is to create a unique and original password for each account

● Keeping up with software updates is important, as cybercriminals often target known flaws in software to access a user’s system.

● Cybercriminals may comb through social media posts in search of information commonly used in security questions, such as a pet’s name or mother’s maiden name.

● A virtual private network (VPN) is a great way to protect sensitive data, especially when accessing a public Wi-Fi
network. A VPN encrypts all information transmitted by your device and helps prevent many types of cyberattacks.

40
Q

It is a legislation that governs intellectual
property rights in the country.

A

The Intellectual
Property Code of
Philippines

41
Q

What is the current
Intellectual Property Code of the
Philippines?

A

Republic Act No. 8293

42
Q

Republic Act No. 8293 was enacted on _________

A

June 6, 1997

43
Q

ENUMERATE:

some key
provisions of the Intellectual Property Code:

A

● Copyrights

● Patents

● Trademarks and Service Marks

● Industrial Designs

● Integrated Circuit Layout Designs

● Enforcement and Remedies

44
Q

It is a legislation in the Philippines that
governs the protection of personal
information in both the government and
private sectors.

A

Data Privacy
Act of 2012

45
Q

Data Privacy Act of 2012 is officially known as what?

A

Republic Act No. 10173

46
Q

The Data Privacy Act of 2012 or also known as the Republic Act No. 10173 was signed into law on __________

A

August 15, 2012

47
Q

aims to ensure the
privacy of individuals’ personal information
while facilitating the free flow of
information for innovation and economic
growth.

A

Data Privacy Act of 2012 (Republic Act No. 10173)

48
Q

is a legislation in the Philippines that
addresses cybercrime and provides legal
measures for its prevention, investigation,
and prosecution.

A

Cybercrime
Prevention Act of 2012

49
Q

Cybercrime
Prevention Act of 2012 is officially known as what?

A

Republic Act No.
10175

50
Q

Cybercrime
Prevention Act of 2012 was signed into law on __________

A

September 12, 2012

51
Q

It aims to
effectively combat cyber-related offenses
and promote a safe and secure
cyberspace.

A

Cybercrime
Prevention Act of 2012 (Republic Act No. 10175)

52
Q

is a legislation in the Philippines that provides a legal framework for electronic transactions, electronic documents, and
electronic signatures.

A

Electronic Commerce Act of 2000

53
Q

Electronic Commerce Act of 2000 is also called what?

A

Republic Act 8792

(it is the “eCommerce Law of the Philippines”)

54
Q

Electronic Commerce Act of 2000 (Republic Act 8792) was signed into law on ________

A

June 14, 2000

55
Q

Its purpose is to facilitate and promote the use of electronic commerce in the country.

A

Electronic Commerce Act of 2000 (Republic Act 8792)

56
Q

a legislation in the Philippines that addresses the regulation and control of the production, mastering, replication, importation, exportation, sale, rental, and distribution of optical media.

A

Optical Media Act of
2003

57
Q

Optical Media Act of
2003 is also known as what?

A

Republic Act No. 9239

58
Q

Optical Media Act of 2003 (Republic Act No. 9239) was signed into law on _______

A

March 19, 2004

59
Q

Its primary objective is to combat piracy and protect intellectual property rights related to optical media formats such as CDs, DVDs, and Blu-ray discs.

A

Optical Media Act of 2003 (Republic Act No. 9239)

60
Q

I miss you

A

Bili ako ulam