Cyber Flashcards

1
Q

____ short for “cybernetics,” refers to the interconnected world of computers, networks, and digital systems.

A

Cyber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It encompasses everything related to the internet, software, hardware, and data.

A

Cyber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ involves criminal activities carried out in the digital realm.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of cybercrime include

A
  1. Hacking
  2. Online Fraud
  3. Identity Theft
  4. Distributing Malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Cybercrime

A
  1. Financial Cybercrimes
  2. Identity Theft
  3. Cyberbullying
  4. Hacking and Data Breaches
  5. Online Fraud
  6. Distributed Denial of Service Attacks (DDoS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of Cybercrimes

Illicit activities targeting financial assets or information for monetary gain.

A

Financial Cybercrimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of Cybercrimes

Examples of Financial Cybercrimes

A
  1. Credit card fraud
  2. Online banking scams
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of Cybercrims

Unauthorized acquisition and use of personal information for fraudulent activities or impersonation.

A

Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of Cybercrimes

Harassment, threats, or intimidation through digital communication tools, often causing emotional distress.

A

Cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of Cybercrimes

Unauthorized access to computer systems or networks, leading to data theft or disruption of operations.

A

Hacking and Data Breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of Cybercrimes

Deceptive practices online to defraud individuals or organizations for financial gain, includung phishing and fake online marketplaces.

A

Online fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of Cybercrimes

Overwhelming target services with excessive traffic, rendering them unavailable, often for malicious purposes.

A

Distributed Denial of Service (DDoS) Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Impact of Cybercrime

Cybercrime can have far-reaching consequences

FDLEN

A
  1. Financial Loss
  2. Damage to Reputation
  3. Legal Consequences
  4. Emotional Distress
  5. National Security Threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ are individuals or groups responsible for carrying out cybercrimes. They exploit vulnerabilities in digital systems for personal gain.

A

Cybercriminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of Cybercriminals

Four main categories of cybercriminals

A
  1. Hacktivists
  2. Cyberterrorists
  3. Script Kiddies
  4. Organized Crime
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of Cybercriminals

Motivated by social or poilitical causes

A

Hacktivists

17
Q

Types of Cybercriminals

Intend to cause fear and disruption

A

Cyberterrorists

18
Q

Types of Cybercriminals

Amateur hackers driven by curiosity

A

Script Kiddies

19
Q

Types of Cybercriminals

Seek financial gain through cybercrimes

A

Organized Crime

20
Q

A 27-year-old Algerian computer science graduate who was sentenced in a US court for using a computer virus to steal money from more than 200 American banks and financial institutions. He then reportedly gave millions of dollars to Palestinian charities.

A

Hamza Bendelladj

21
Q

A virus also known as the ____, was a malicious computer worm that spread globally in May 2000 via email.

A

I Love You Virus or Love Bug

22
Q

Motivations of Cybercriminals

Cybercriminals are motivated by various factors, including:

FIPRC

A
  1. Financial Gain
  2. Ideological beliefs
  3. Personal Satisfaction
  4. Revenge
  5. Challenge and curiosity
23
Q

Profile of a Cybercriminal

A typical cybercriminal may have the following characteristics:

TAARE

A
  1. Tech-savvy
  2. Anonymity-seeking
  3. Adaptable
  4. Resourceful
  5. Evolves with technology
24
Q

Measures protecting against cybercrime.

A

Cybersecurity

25
Q

Cybersecurity measures include

SRAFE

A
  1. Strong passwords
  2. REgular software updates
  3. Antivirus software
  4. Firewalls
  5. Employee Training
26
Q

A law in the Philippines that was enacted to address issues related to cybercrimes and internet-related offenses. It was signed into law on September 12, 2012, and it became effective on October 3, 2012.

A

Republic Act No. 10175, Cybercrime Prevention Act of 2012

27
Q

Key Provisions of RA 10175

A
  • Defines and classifies cyber crimes such as hacking, identity theft, and online fraud.
  • Emphasizes the protection of computer data and systems.
  • Includes provisions on online libel, which has sparked debates on freedom of speech.
  • Mandates the creation of a National Cybersecurity Plan for enhanced online security.
28
Q

Importance of RA 10175

A

Provides legal framework to prosecute cybercriminals and protect individuals and organizations online.

29
Q

A Philippine law that was enacted to protect the personal information and data privacy of individuals.

A

Republic Act No. 10173, Data Privacy Act of 2012

30
Q

Key Provisions of RA 10173

A
  • Data subject rights
  • Consent for data collection
  • Data security measures
  • Restrictions on international data transfers
  • Data breach reporting
  • Penalties for non-compliance.
31
Q

Enforces data privacy regulations and ensures compliance with the law

A

National Privacy Commission (NPC)