CHAPTER 6 CYBER CRIMINAL AND THE CYBERCRIMELAW Flashcards

1
Q

is defined as any illegal and criminal activity committed in the internet. It includes unlawful acts where information technology is used either a tool or target, or both, in the commission of such unlawful acts

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CYBERCRIME

A

Computer Malware
Phishing
Identity Theft
Hacking
Cyber Sex
Photo or Video voyeurism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is a type of malware that attaches to another program, which can replicate and spread after a person first runs it on their system

A

computer virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

short for “malicious software”, refers to any software intentionally designed to cause damage to a computer, server, client, or computer network

A

computer malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

aren’t creating new viruses all the time, instead they focus their efforts on more sophisticated and lucrative threats

A

cybercriminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

are harmful and can destroy data, slow down system resources, and log keystrokes

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It can be viruses; is a computer program pretending to be something it’s not for the purpose of sneaking onto your computer and delivering some sort of malware

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

are not viruses; doesn’t need a host system and is capable of spreading across a network and any systems connected to the network

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

are not viruses; refers to a flaw or mistake in the computer code that a given software program is made of

A

software bug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

referred to as Love Letter, was a computer worm that attacked tens of millions of windows personal computers on and after May 5, 2000

A

ILOVEYOU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

six week after the attack, the congress quickly enacted ___ or ___ which was signed into law on June 14, 2004

A

The Electronic Commerce Act of 2000 or Republic Act 8792

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

focuses on electronic evidence and common online crimes such as hacking and copyright violations

A

RA 8792

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

created the iloveyou virus

A

Onel de Guzman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

which means that the law of the place where the crime is committed shall be applicable in the administration of justice

A

TERRITORIALITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When criminals use fake emails, social media posts or direct messages with the goal of luring you to click on a bad link or download a malicious attachment

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HOW CAN WE PROTECT OURSELVES?

A

Install antivirus or anti-malware software
Keep your antivirus software up to date
Run antivirus scans regularly
Keep your operating system up to date
Protect your network
Think before you click
Keep your personal information secure
Don’t use unsecured Wi-Fi
Back up your files
Use several secure passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

COMMON FEAUTURES OF PHISING EMAILS

A

Too Good To Be True
Sense of Urgency
Hyperlinks
Attachments
Unusual Sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Lucrative offers and eye-catching or attention-grabbing statements are designed to attract people’s attention immediately.

A

Too Good To Be True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A favorite tactic amongst cybercriminals is to ask you to act fast because the super deals are only for a limited time.

A

Sense of Urgency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A link may not be all it appears to be. Hovering over a link shows you the actual URL where you will be directed upon clicking on it. It could be completely different or it could be a popular website with a misspelling, for instance www.bankofarnerica.com- the ‘m’ is actually an ‘r’ and an ‘n’, so look carefully.

A

Hyperlinks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Whether it looks like it’s from someone you don’t know or someone you do know, if anything seems out of the ordinary, unexpected, out of character or just suspicious in general don’t click on it!

A

Unusual Sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If you see an attachment in an email you weren’t expecting or that doesn’t make sense, don’t open it! They often contain payloads like ransomware or other viruses. The only file type that is always safe to click on is a .txt file

A

Attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TIPS TO PREVENT PHISHING ATTACKS

A
  1. Know what a phishing scam looks like
  2. Don’t click on that link
  3. Get free anti-phishing add-ons
  4. Don’t give your information to an unsecured site
  5. Rotate passwords regularly
  6. Don’t ignore those updates
  7. Install firewalls
  8. Don’t be tempted by those pop-ups
  9. Don’t give out important information unless you must
  10. Have a Data Security Platform to spot signs of an attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

is the crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases.

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

HOW TO PROTECT YOURSELF FROM IDENTITY THEFT

A
  1. Do not answer phone calls, texts, or email from numbers or people you do not know.
  2. Do not share personal information like your bank account number, Social Security number, or date of birth.
  3. Collect your mail every day
  4. Review credit card and bank account statements.
  5. Store personal information, including your Social Security card, in a safe place. Do not carry it in your wallet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is the activity of identifying weaknesses in a computer system or a network to exploit the security to gain access to personal data or business data.

A

HACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Types of Hacking

A
  1. White Hacking
  2. Black Hacking
  3. Grey Hacking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The Philippines ranked fourth as the most targeted countries in the world by hackers

A

Cebu, Philippines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Katrina sued Hayden for violation of

A

RA9262 otherwise known as the Anti-Violence Against Women and their Children Act of 2004.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

is a cybercrime and a form of modern slavery; is when a victim is forced into sexual exploitation using coercion, force, or fraud, and their abuse is streamed live on the internet via webcam, video, photography, or other digital media.

A

CYBERSEX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

means the act of taking photo or video coverage of a person or group of persons performing sexual act or any similar activity or of capturing an image of the private area of a person or persons without the latter’s consent, under circumstances in which such person/s has/have a reasonable expectation of privacy, or the act of selling, copying, reproducing, broadcasting, sharing, showing or exhibiting the photo or video coverage or recordings of such sexual act or similar activity through VCD/DVD, internet, cellular phones and similar means or device without the written consent of the person/s involved, notwithstanding that consent to record or take photo or video coverage of same was given by such person’s.

A

PHOTO OR VIDEO VOYEURISM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

SALIENT FEATURES OF RA 9995

A

Section 4. Prohibited Acts
Section 5. Penalties

29
Q

Section 4. Prohibited Acts. - It is hereby prohibited and declared unlawful for any person:

A

a. To take photo or video coverage of a person or group of persons performing sexual act or any similar activity or to capture an image of the private area of a person/s such as the naked or undergarment clad genitals, public area, buttocks or female breast without the consent of the person/s involved and under circumstances in which the person/s has/have a reasonable expectation of privacy;
b. To copy or reproduce, or to cause to be copied or reproduced, such photo or video or recording of sexual act or any similar activity with or without consideration;
c. To sell or distribute, or cause to be sold or distributed, such photo or video or recording of sexual act, whether it be the original copy or reproduction thereof; or
d. To publish or broadcast, or cause to be published or broadcast, whether in print or broadcast media, or show or exhibit the photo or video coverage or recordings of such sexual act or any similar activity through VCD/DVD, internet, cellular phones and other similar means or device.

30
Q

penalty of imprisonment under Section 5. Penalties

A

not less than three (3) years but not more than seven (7) years

30
Q

fine of imprisonment under Section 5. Penalties

A

not less than One hundred thousand pesos (P100,000.00) but not more than Five hundred thousand pesos (P500,000.00)

31
Q

six (6) cybercrime offenses under Section 4(a) of Cybercrime Law or RA 10175

A
  1. Illegal Access
  2. Illegal Interception
  3. Data Interference
  4. System Interference
  5. Misuse of Device
  6. Cyber-squatting
32
Q

is defined as the intentional access to the whole or any part of a computer system without right.

A

Illegal Access

33
Q

means any device or a group of interconnected and related devices, one or more of which, pursuant to a program, performs automatic processing of data.

A

Computer system

34
Q

Elements of the Offense of Illegal Access

A
  1. There must be an intentional access in whole and in part of a computer system.
  2. The person who attempts to, or is accessing, or had already access the data has no right of access to the system.
35
Q

Example: A student assistant who sneak into the files of the College Dean without the latter’s consent.

A

ILLEGAL ACCESS

36
Q

evaluate the target system’s security and report back to the owners the vulnerability they found in it and give instructions for how these can be remedied.

A

Ethical hackers

37
Q

The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data

A

Section 4 (a)(2)

38
Q

refers to listening, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of computer system or indirectly, through the use of electronic eves dropping or tapping devices, at the same time the communication is occurring.

A

Interception

39
Q

refers to the modification or change, in form or substance, of an existing computer data or program (Sec 3 (b)).

A

Alteration

40
Q

Elements of Illegal Interception

A
  1. It must be intentional;
  2. It must be by technical means;
  3. The person involved is without any right to do the interception;
  4. The transmission of computer data to, from, or within the computer system is non-public.
41
Q

two transmission methods

A

Cellular transmission using Global System for Mobile Communication (GSM).
Satellite transmission through Broadband Global Area Network (BGAN)

42
Q

The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.

A

Section 4 (a)(3) : Data Interference

43
Q

How will the person be guilty of system interference if he will alter only the computer data?

A

A person who shall alter the computer data only shall be guilty of system interference if the alteration of the data shall affect the functioning of the computer or computer network.

43
Q

The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction of transmission of viruses.

A

Section 4 (a)(4): System Interference

44
Q

What are the distinguishing characteristics of the two (2) cybercrime offenses?

A

▪ First, in data interference, as the name implies, interference is directed against the data itself. In system interference, the interference is directed against the functioning of a computer system.
▪ Second, in data interference, alteration involves only data. While in system interference; alteration involves both data and computer program.

44
Q

Under Section 4(b) of RA 10175, there are only three offenses, thus:

A
  1. Computer-related forgery
  2. Computer-related fraud
  3. Computer-related identity theft
45
Q

Is it possible that a person is guilty of System Interference by altering only the data, that is, without altering the computer program?

A

Yes. System interference is the intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message without right or authority, including the introduction or transmission of viruses.

45
Q

The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same, if such domain is:

i. Similar, identical, or confusingly similar to an existing trademark registered with the appropriate government agency at the time of the domain name registration:
ii. Identical or in any way similar with the name of a person other than the registrant, in case of a personal name; and
iii. Acquired without right or with intellectual property interests in it.

A

Section 4(a)(6): Cyber-Squatting

46
Q

i. The use, production, sale, procurement, importation, distribution, or otherwise making available, without right of:

a. device, including computer program, designed or adapted primarily for the purpose of committing any of the offenses under this Act; or
b. a computer password, access code, or similar data by which the whole or any part of a computer is capable of being accessed with intent that it be used for the purpose of committing any of the offenses under this Act:

ii. The possession of an item referred to in paragraphs 5(i)(aa) or (bb) above with intent to use said devices for the purpose of committing any of the offenses under this section.

A

Section 4 (a)(5) : Misuse of Devices

47
Q

i. The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon legal purpose as if it were authentic, regardless whether or not the data is directly readable and intelligible; or
ii. The act of knowingly using computer data which is the product of computer-related forgery as defined herein, for the purpose of perpetuating a fraudulent or dishonest design.

A

Computer-Related Forgery

48
Q

The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system causing damage thereby with fraudulent intent

A

Computer-Related Fraud

49
Q

The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right

A

Computer-Related Identity Theft

49
Q

is a form of stealing someone’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name.

A

Identity Theft

50
Q

The willful engagement, maintenance, control, or operation directly or indirectly, or any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or for consideration

A

CYBERSEX

51
Q

If punishable acts in Section 4(a) are committed against critical infrastructure, the penalty of reclusion temporal or a fine of

A

at least Five hundred thousand pesos (PhP500,000.00) up to maximum amount commensurate to the damage incurred or both, shall be imposed.

51
Q

Any person found guilty of any of the punishable acts enumerated in Sections 4(a) and 4(b) of this Act shall be punished with imprisonment of prision mayor or a fine of at least Two hundred thousand pesos(PhP200,000.00) up to a maximum amount commensurate to the damage incurred or both.

A

Section 8. Penalties.

51
Q

The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system: Provided that the penalty to be imposed shall be (1) one degree higher than that provided for in Republic Act No. 9775

A

CHILD PORNOGRAPHY

52
Q

Any person found guilty of the punishable act under Section 4(a)(5) shall be punished with imprisonment of prision mayor or a fine of _

A

not more than Five hundred thousand pesos (PhP500,000.00) or both.

53
Q

Any person found guilty of any of the punishable acts enumerated in Section 4(c)(1) of this Act shall be punished with imprisonment of prision mayor or a fine of

A

at least Two hundred thousand pesos (PhP200,000.00) but not exceeding One million pesos (PhPl,000,000.00) or both.

54
Q

encrypts your data

A

ransomware

55
Q

backdoor maker

A

Rootkit

56
Q

backdoor that can be buy online

A

Flipper zero

57
Q

Will compute variable into binaries

A

ENIAC or Electronic Numerical Integrator and Computer

58
Q

the first person who teaches computer english

A

Grace Hopper

59
Q

First computer bug is

A

MOTH

60
Q

ILOVEYOU Virus HAPPENED

A

May 5, 2000

61
Q

The first cybercrime law is

A

Electronic commerce act of 200 or RA 8792
Signed on June 14, 2000

62
Q

highly targeted type of phishing

A

Spear phishing

63
Q

highly targeted type of phishing for more important person

A

Whale phishing/Whaling

64
Q

which involves defrauding people over the phone, enticing them to divulge sensitive information.

A

Vishing or voice phishing

65
Q

type of phishing that uses fake text messages to trick people into downloading malware

A

Smshing or Sms phishing

66
Q

specific website phishing (most common phishing)

A

Pharming

67
Q

example of system interference is

A

denial of service attack (or DoS attack)

68
Q

The Chief Registrar may be guilty of illegal access for reason that she had undertaken an act in

A

EXCESS OF HER AUTHORITY