CHAPTER 6 CYBER CRIMINAL AND THE CYBERCRIMELAW Flashcards
is defined as any illegal and criminal activity committed in the internet. It includes unlawful acts where information technology is used either a tool or target, or both, in the commission of such unlawful acts
Cybercrime
CYBERCRIME
Computer Malware
Phishing
Identity Theft
Hacking
Cyber Sex
Photo or Video voyeurism
is a type of malware that attaches to another program, which can replicate and spread after a person first runs it on their system
computer virus
short for “malicious software”, refers to any software intentionally designed to cause damage to a computer, server, client, or computer network
computer malware
aren’t creating new viruses all the time, instead they focus their efforts on more sophisticated and lucrative threats
cybercriminals
are harmful and can destroy data, slow down system resources, and log keystrokes
Viruses
It can be viruses; is a computer program pretending to be something it’s not for the purpose of sneaking onto your computer and delivering some sort of malware
Trojan
are not viruses; doesn’t need a host system and is capable of spreading across a network and any systems connected to the network
worm
are not viruses; refers to a flaw or mistake in the computer code that a given software program is made of
software bug
referred to as Love Letter, was a computer worm that attacked tens of millions of windows personal computers on and after May 5, 2000
ILOVEYOU
six week after the attack, the congress quickly enacted ___ or ___ which was signed into law on June 14, 2004
The Electronic Commerce Act of 2000 or Republic Act 8792
focuses on electronic evidence and common online crimes such as hacking and copyright violations
RA 8792
created the iloveyou virus
Onel de Guzman
which means that the law of the place where the crime is committed shall be applicable in the administration of justice
TERRITORIALITY
When criminals use fake emails, social media posts or direct messages with the goal of luring you to click on a bad link or download a malicious attachment
phishing
HOW CAN WE PROTECT OURSELVES?
Install antivirus or anti-malware software
Keep your antivirus software up to date
Run antivirus scans regularly
Keep your operating system up to date
Protect your network
Think before you click
Keep your personal information secure
Don’t use unsecured Wi-Fi
Back up your files
Use several secure passwords
COMMON FEAUTURES OF PHISING EMAILS
Too Good To Be True
Sense of Urgency
Hyperlinks
Attachments
Unusual Sender
Lucrative offers and eye-catching or attention-grabbing statements are designed to attract people’s attention immediately.
Too Good To Be True
A favorite tactic amongst cybercriminals is to ask you to act fast because the super deals are only for a limited time.
Sense of Urgency
A link may not be all it appears to be. Hovering over a link shows you the actual URL where you will be directed upon clicking on it. It could be completely different or it could be a popular website with a misspelling, for instance www.bankofarnerica.com- the ‘m’ is actually an ‘r’ and an ‘n’, so look carefully.
Hyperlinks
Whether it looks like it’s from someone you don’t know or someone you do know, if anything seems out of the ordinary, unexpected, out of character or just suspicious in general don’t click on it!
Unusual Sender
If you see an attachment in an email you weren’t expecting or that doesn’t make sense, don’t open it! They often contain payloads like ransomware or other viruses. The only file type that is always safe to click on is a .txt file
Attachments
TIPS TO PREVENT PHISHING ATTACKS
- Know what a phishing scam looks like
- Don’t click on that link
- Get free anti-phishing add-ons
- Don’t give your information to an unsecured site
- Rotate passwords regularly
- Don’t ignore those updates
- Install firewalls
- Don’t be tempted by those pop-ups
- Don’t give out important information unless you must
- Have a Data Security Platform to spot signs of an attack
is the crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases.
Identity theft
HOW TO PROTECT YOURSELF FROM IDENTITY THEFT
- Do not answer phone calls, texts, or email from numbers or people you do not know.
- Do not share personal information like your bank account number, Social Security number, or date of birth.
- Collect your mail every day
- Review credit card and bank account statements.
- Store personal information, including your Social Security card, in a safe place. Do not carry it in your wallet.
is the activity of identifying weaknesses in a computer system or a network to exploit the security to gain access to personal data or business data.
HACKING
Types of Hacking
- White Hacking
- Black Hacking
- Grey Hacking
The Philippines ranked fourth as the most targeted countries in the world by hackers
Cebu, Philippines
Katrina sued Hayden for violation of
RA9262 otherwise known as the Anti-Violence Against Women and their Children Act of 2004.
is a cybercrime and a form of modern slavery; is when a victim is forced into sexual exploitation using coercion, force, or fraud, and their abuse is streamed live on the internet via webcam, video, photography, or other digital media.
CYBERSEX
means the act of taking photo or video coverage of a person or group of persons performing sexual act or any similar activity or of capturing an image of the private area of a person or persons without the latter’s consent, under circumstances in which such person/s has/have a reasonable expectation of privacy, or the act of selling, copying, reproducing, broadcasting, sharing, showing or exhibiting the photo or video coverage or recordings of such sexual act or similar activity through VCD/DVD, internet, cellular phones and similar means or device without the written consent of the person/s involved, notwithstanding that consent to record or take photo or video coverage of same was given by such person’s.
PHOTO OR VIDEO VOYEURISM