Module 10: Confidentiality and Availability of Computer Data Systems Flashcards

1
Q

Cybercrimes are primarily those that target what?

A

Systems, networks, and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cybercrimes tend to seek to compromise:

A

confidentiality, integrity, and availability of systems, networks, and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Systems, networks, and data when they are protected and only authorized users can access them

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data is accurate and trustworthy and has not been modified

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data, services, and systems are accessible on demand

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cybercrimes that target systems, networks, and data usually include:

A

Hacking; malware creation, possession, and distribution; denial of service (DoS) attacks, Distributed Denial of Service (DDoS) attacks; and website defacement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A type of cybercrime regarding the access to the whole or any part of a computer system without right

A

Illegal Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Any device or a group of interconnected or related devices, one or more of which, pursuant to a program, performs automatic processing of data.

It covers any type of computer device including devices with data processing capabilities (i.e., mobile phones and computer networks)

The device consisting of hardware and software may include input, output and storage facilities which may stand alone or be connected in a network or other similar devices.

It also includes computer data storage devices or media (Section 3(g) of RA 10175).

A

Computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Elements of a Computer System

A

There must be a device or a group of interconnected or related devices

At least one of the device perform automatic processing of data pursuant to a program

The device need not be connected in a network as long as it consists of both hardware and software, with input, output and storage devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Elements of the Offense for Illegal Access

A

There must be an intentional access in whole or in part of a computer system.

The person who attempts to, or is accessing, or had already accessed the data has no right of access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An example of Illegal Access that describes unauthorized access to systems, networks, and data (hereafter target)

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Penalty for Illegal Access

A

Prision mayor (imprisonment of six years and 1 day up to 12 years)

A fine of at least Two hundred thousand pesos (P200,000) up to a maximum amount commensurate to the damage incurred or BOTH.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Penalty for Illegal Access if committed against critical infrastructure

A

Reclusion temporal (imprisonment for twelve years and one day up to twenty years)

A fine of at least Five hundred thousand pesos (P500,000) up to a maximum amount commensurate to the damage incurred or BOTH.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Evaluate the target system’s security and report back to the owners the vulnerabilities they found in it and give instructions for how these can be remedied.

A

Ethical hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A type of cybercrime regarding the interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.

A

Illegal Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Refers to listening to, recording, monitoring, or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.

A

Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Elements of Illegal Interception

A

It must be intentional

It must be by technical means

The person involved is without any to do the interception

The transmission of computer data to, from, or within a computer system is non-public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Penalty for Illegal Interception

A

Similar to Illegal Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An examples of Illegal Interception which enables an offender to eavesdrop on communications between the sender and receiver and/or impersonate the sender and/or receiver and communicate on their behalf.

A

Man-in-the-middle attack

20
Q

A man-in-the-middle attack compromises what?

A

The confidentiality of data (through eavesdropping) and integrity of data (by impersonating sender and/or receiver)

21
Q

The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.

A

Data Interference

22
Q

Refers to the modification or change, in form or substance, of an existing computer data or program (Sec. 3(b)).

A

Alteration

23
Q

Authorized action can also be covered by the provision Data Interference if:

A

The action of the person went beyond agreed scope resulting to damages stated in this provision

24
Q

Data interference is directed against what?

A

The data itself

25
Q

In data interference, Alteration only involves what?

A

Data

26
Q

Penalty for Data Interference

A

Same with Illegal Access

27
Q

Data Interference can include:

A

Suppressing, modifying, adding, transmitting, editing, deleting or otherwise damaging data, systems, and services.

28
Q

The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network

A

System Interference

29
Q

The interference in system interference is directed against what?

A

The functioning of a computer system.

30
Q

In System interference, alteration involves what?

A

Both data and computer program

31
Q

Penalty for System Interface

A

Same with Illegal Access

32
Q

Example of System Interference wherein this attack interferes with systems by overwhelming servers and/or intermediaries (e.g., routers) with requests to prevent legitimate traffic from accessing a site and/or using a system.

A

Denial of Service (DoS) attack

33
Q

A type of DoS attack wherein there is the use of multiple computers and other digital technologies to conduct coordinated attacks with the intention of overwhelming servers and/or intermediaries to prevent legitimate users’ access.

A

Distributed Denial of Service Attack (DDoS attack)

34
Q

The use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of a device, a computer password.

The possession of an item referred to in paragraphs 5(i)(aa) or (bb) above with intent to use said devices for the purpose of committing any of the offenses under this section.

A

Device Misuse

35
Q

In device misuse, (i) The use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of:

A

(aa) A device, including a computer program, designed or adapted primarily for the purpose of committing any of the offenses under this Act; or

(bb) A computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed with intent that it be used for the purpose of committing any of the offenses under this Act.

36
Q

Penalty for Device Misuse

A

Same with Illegal Access except fine should me no more than Five hundred thousand pesos (500,000)

37
Q

Used to infect target systems in order to monitor them, collect data, take control of the system, modify system operation and/or data, and damage the system and/or data.

A

Malware

38
Q

Standalone malicious software that spreads without the need for user activity.

A

Worm

39
Q

Malware that requires user activity to spread (e.g., an executable file with virus spreads when opened by the user).

A

Virus

40
Q

Malware designed to look like legitimate software in order to trick the user into downloading the programme, which infects the users’ system to spy, steal and/or cause harm.

A

Trojan Horse

41
Q

Malware designed to surreptitiously monitor infected systems, and collect and relay information back to the creator and/or user of this type of malware

A

Spyware

42
Q

Malware designed to take users’ system, files, and/or data hostage and relinquish control back to the user only after ransom is paid.

A

Ransomware

43
Q

A form of ransomware. is malware that infects a user’s digital device, encrypts the user’s documents, and threatens to delete files and data if the victim does not pay the ransom.

A

Cryptoransomware

44
Q

A form of cryptoransomware that perpetrators use against victims that releases the user’s data (i.e., makes it public) if ransom is not paid to decrypt the files and data.

A

Doxware

45
Q

The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same

A

Cybersquatting

46
Q

Elements of the offense of Cybersquatting

A

There must be an acquisition of a domain name over the internet;

The acquisition is done in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same;

In case of a juridical person, the domain name is similar, identical or confusingly similar to an existing trademark registered with the appropriate government agency at the time of the domain name registration;

Identical or in any way similar with the name of a person other than the registrant in case the domain name involves a natural person.

47
Q

Penalty for Cybersquatting

A

Same with Device Misuse