Internet Threats and Cybercrime Law Flashcards
Offenses against the confidentiality, integrity and availability of computer data and systems.
Cybercrime Prevention Act Law 2012
Years of imprisonment for Cybercrime Prevention Act Law 2012
3-20 years
How much is the fine for Cybercrime Prevention Act Law 2012
Php 200,000 fine
The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
Illegal Access
is defined to include only computer hacking, theft, robbery, burglary and bribery.
Illegal Access
When committed intentionally, the interception without right, made. by technical means, of non-public transmission of computer data to, from, or within a. computer system; seeks to protect the privacy of non-public computer data transmissions.
Illegal Interception
An example of ________________ is a “man-in-the-middle attack,” which enables an offender to eavesdrop on communications between the sender and receiver and/or impersonate the sender and/or receiver and communicate on their behalf.
Illegal Interception
renders data meaningless, useless or ineffective. obstructs, interrupts or interferes with the lawful processing of data. obstructs, interrupts or interferes with any person in their lawful use of data. denies access to data to any person authorized to access it.
Data Interference
Intentional or reckless alteration, damaging, deletion or deterioration with the function of a computer or a computer network.
System Interference
An example of ________________ is a denial of service attack (or DoS attack). A DoS attack interferes with systems by overwhelming servers and/or intermediaries (e.g., routers) with requests to prevent legitimate traffic from accessing a site and/or using a system
System Interference
Use of a computer program, a computer password or access code, or the possession of these for the purpose of committing offenses under this act.
Misuse of Device
unauthorized registration and use of Internet domain names that are identical or similar to trademarks, service marks, company names, or personal names.
Cybersquatting
The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another person.
Identity Theft
The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.
Cybersex
The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the ___________________________, committed through a computer system.
Anti-Child Pornography Act of 2009
Child Pornography
Electronically advertising, selling, or offering for sale products and services are prohibited that mislead people.
Unsolicited Commercial Communications
Publishing a false statement of a person or an organization to destroy their reputation.
Cyber Libel
is a type of malicious software – or malware – that is installed on a computing device without the end user’s knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users.
Spyware
is unwanted software designed to throw advertisements up on your screen, most often within a web browser.
Adware
is unsolicited email, instant messages, or social media messages. These messages are fairly easy to spot and can be damaging if you open or respond.
Spam
is like phishing in that it is a threat that tricks users into divulging private information, but instead of relying on email as the attack vector, it uses malicious code executed on the victim’s device to redirect to an attacker-controlled website.
Pharming
are software programs or hardware devices that track the activities (keys pressed) of a keyboard
Keyloggers
is an email sent from an Internet criminal disguised as an email from a legitimate, trustworthy source.
Phishing