Internet Threats and Cybercrime Law Flashcards

1
Q

Offenses against the confidentiality, integrity and availability of computer data and systems.

A

Cybercrime Prevention Act Law 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Years of imprisonment for Cybercrime Prevention Act Law 2012

A

3-20 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How much is the fine for Cybercrime Prevention Act Law 2012

A

Php 200,000 fine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.

A

Illegal Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is defined to include only computer hacking, theft, robbery, burglary and bribery.

A

Illegal Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When committed intentionally, the interception without right, made. by technical means, of non-public transmission of computer data to, from, or within a. computer system; seeks to protect the privacy of non-public computer data transmissions.

A

Illegal Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An example of ________________ is a “man-in-the-middle attack,” which enables an offender to eavesdrop on communications between the sender and receiver and/or impersonate the sender and/or receiver and communicate on their behalf.

A

Illegal Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

renders data meaningless, useless or ineffective. obstructs, interrupts or interferes with the lawful processing of data. obstructs, interrupts or interferes with any person in their lawful use of data. denies access to data to any person authorized to access it.

A

Data Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intentional or reckless alteration, damaging, deletion or deterioration with the function of a computer or a computer network.

A

System Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An example of ________________ is a denial of service attack (or DoS attack). A DoS attack interferes with systems by overwhelming servers and/or intermediaries (e.g., routers) with requests to prevent legitimate traffic from accessing a site and/or using a system

A

System Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Use of a computer program, a computer password or access code, or the possession of these for the purpose of committing offenses under this act.

A

Misuse of Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

unauthorized registration and use of Internet domain names that are identical or similar to trademarks, service marks, company names, or personal names.

A

Cybersquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another person.

A

Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.

A

Cybersex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the ___________________________, committed through a computer system.

A

Anti-Child Pornography Act of 2009

Child Pornography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Electronically advertising, selling, or offering for sale products and services are prohibited that mislead people.

A

Unsolicited Commercial Communications

17
Q

Publishing a false statement of a person or an organization to destroy their reputation.

A

Cyber Libel

18
Q

is a type of malicious software – or malware – that is installed on a computing device without the end user’s knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users.

A

Spyware

19
Q

is unwanted software designed to throw advertisements up on your screen, most often within a web browser.

A

Adware

20
Q

is unsolicited email, instant messages, or social media messages. These messages are fairly easy to spot and can be damaging if you open or respond.

A

Spam

21
Q

is like phishing in that it is a threat that tricks users into divulging private information, but instead of relying on email as the attack vector, it uses malicious code executed on the victim’s device to redirect to an attacker-controlled website.

A

Pharming

22
Q

are software programs or hardware devices that track the activities (keys pressed) of a keyboard

A

Keyloggers

23
Q

is an email sent from an Internet criminal disguised as an email from a legitimate, trustworthy source.

A

Phishing