Module 10: Confidentiality and Availability of Computer Data Systems Flashcards
Cybercrimes are primarily those that target what?
Systems, networks, and data
Cybercrimes tend to seek to compromise:
confidentiality, integrity, and availability of systems, networks, and data
Systems, networks, and data when they are protected and only authorized users can access them
Confidentiality
Data is accurate and trustworthy and has not been modified
Integrity
Data, services, and systems are accessible on demand
Availability
Cybercrimes that target systems, networks, and data usually include:
Hacking; malware creation, possession, and distribution; denial of service (DoS) attacks, Distributed Denial of Service (DDoS) attacks; and website defacement
A type of cybercrime regarding the access to the whole or any part of a computer system without right
Illegal Access
Any device or a group of interconnected or related devices, one or more of which, pursuant to a program, performs automatic processing of data.
It covers any type of computer device including devices with data processing capabilities (i.e., mobile phones and computer networks)
The device consisting of hardware and software may include input, output and storage facilities which may stand alone or be connected in a network or other similar devices.
It also includes computer data storage devices or media (Section 3(g) of RA 10175).
Computer system
Elements of a Computer System
There must be a device or a group of interconnected or related devices
At least one of the device perform automatic processing of data pursuant to a program
The device need not be connected in a network as long as it consists of both hardware and software, with input, output and storage devices.
Elements of the Offense for Illegal Access
There must be an intentional access in whole or in part of a computer system.
The person who attempts to, or is accessing, or had already accessed the data has no right of access to the system.
An example of Illegal Access that describes unauthorized access to systems, networks, and data (hereafter target)
Hacking
The Penalty for Illegal Access
Prision mayor (imprisonment of six years and 1 day up to 12 years)
A fine of at least Two hundred thousand pesos (P200,000) up to a maximum amount commensurate to the damage incurred or BOTH.
The Penalty for Illegal Access if committed against critical infrastructure
Reclusion temporal (imprisonment for twelve years and one day up to twenty years)
A fine of at least Five hundred thousand pesos (P500,000) up to a maximum amount commensurate to the damage incurred or BOTH.
Evaluate the target system’s security and report back to the owners the vulnerabilities they found in it and give instructions for how these can be remedied.
Ethical hackers
A type of cybercrime regarding the interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
Illegal Interception
Refers to listening to, recording, monitoring, or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
Interception
Elements of Illegal Interception
It must be intentional
It must be by technical means
The person involved is without any to do the interception
The transmission of computer data to, from, or within a computer system is non-public
Penalty for Illegal Interception
Similar to Illegal Access