Internet Threats and Cybercrime Law Flashcards
Offenses against the confidentiality, integrity and availability of computer data and systems.
Cybercrime Prevention Act Law 2012
Years of imprisonment for Cybercrime Prevention Act Law 2012
3-20 years
How much is the fine for Cybercrime Prevention Act Law 2012
Php 200,000 fine
The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
Illegal Access
is defined to include only computer hacking, theft, robbery, burglary and bribery.
Illegal Access
When committed intentionally, the interception without right, made. by technical means, of non-public transmission of computer data to, from, or within a. computer system; seeks to protect the privacy of non-public computer data transmissions.
Illegal Interception
An example of ________________ is a “man-in-the-middle attack,” which enables an offender to eavesdrop on communications between the sender and receiver and/or impersonate the sender and/or receiver and communicate on their behalf.
Illegal Interception
renders data meaningless, useless or ineffective. obstructs, interrupts or interferes with the lawful processing of data. obstructs, interrupts or interferes with any person in their lawful use of data. denies access to data to any person authorized to access it.
Data Interference
Intentional or reckless alteration, damaging, deletion or deterioration with the function of a computer or a computer network.
System Interference
An example of ________________ is a denial of service attack (or DoS attack). A DoS attack interferes with systems by overwhelming servers and/or intermediaries (e.g., routers) with requests to prevent legitimate traffic from accessing a site and/or using a system
System Interference
Use of a computer program, a computer password or access code, or the possession of these for the purpose of committing offenses under this act.
Misuse of Device
unauthorized registration and use of Internet domain names that are identical or similar to trademarks, service marks, company names, or personal names.
Cybersquatting
The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another person.
Identity Theft
The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.
Cybersex
The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the ___________________________, committed through a computer system.
Anti-Child Pornography Act of 2009
Child Pornography