Module 3 Flashcards

1
Q

What is Republic Act No. 10175 commonly known as?

A

Cybercrime Prevention Act of 2012

It is also referred to as the Cybercrime Law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary objective of RA 10175?

A

To tackle legal issues arising from online interactions and activities

This ensures that laws keep pace with technological advancements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What rights does RA 10175 aim to protect?

A

Individual rights against cyber threats such as identity theft and online harassment

This protection is essential for fostering a safe digital environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does RA 10175 contribute to national security?

A

By combating cybercrime that can destabilize the country’s infrastructure

This enhances resilience against cyber-attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is it important for RA 10175 to define cybercrimes clearly?

A

It aids law enforcement and legal processes in prosecuting offenders effectively

Clear definitions help establish what constitutes a cybercrime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the term ‘Access’ refer to in the context of cybercrime?

A

Instruction, communication with, storing, retrieving data from, or using resources of a computer system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does ‘Alteration’ mean in terms of computer data?

A

Modification or change of existing computer data or programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define ‘Computer’.

A

An electronic, magnetic, optical, or other data processing device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is ‘Computer Data’?

A

Any representation of facts, information, or concepts formatted for processing by a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does ‘Cyber’ encompass?

A

A wide array of technologies including computers, computer networks, electronic communication systems, and the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is ‘Critical Infrastructure’?

A

Essential computer systems, networks, and databases vital to national security, economic stability, public health, and safety.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is considered ‘Illegal Access’?

A

Unauthorized access to computer systems or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does ‘Illegal Interception’ involve?

A

Unauthorized capturing of data being transmitted over networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What constitutes ‘Data Interference’?

A

Unauthorized alteration, deletion, or destruction of computer data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ‘Computer-Related Forgery’?

A

Alteration or manipulation of digital documents or data with the intent to deceive or defraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the penalty range for cybercrimes?

A

Fines can range from ₱50,000 to ₱5,000,000.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What role does the Cybercrime Investigation and Coordinating Center (CICC) play?

A

Ensures that cybercrime-related strategies align with national laws and international standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

True or False: The introduction of online libel provisions has raised concerns about freedom of speech.

19
Q

What are some serious cyber offenses outlined in RA 10175?

A

Cybersex, child pornography, unsolicited commercial communications, online libel.

20
Q

What are the implications of crimes against critical infrastructure?

A

They attract higher penalties, often one degree higher than standard offenses.

21
Q

Fill in the blank: The NBI is tasked with investigating _______.

A

cybercrimes.

22
Q

What is the significance of continuous policy updates for RA 10175?

A

To ensure the law remains relevant and effective against emerging cyber threats.

24
Q

What is the purpose of the SIM Registration Act or RA No. 11934?

A

To put an end to the perpetration of crimes through the use of unregulated SIM cards

Signed into law by President Ferdinand Marcos, Jr. on Oct. 10.

25
What is the CIA Triad?
* CONFIDENTIALITY * INTEGRITY * AVAILABILITY ## Footnote These are key principles in cybersecurity aimed at protecting information.
26
Define computer-related crime.
Crimes involving computers, specifically computer forgery and computer fraud ## Footnote Historically, the term covered all categories of crimes involving computers.
27
What are content-related offenses in cybercrime?
Cybercrimes involving illegal content ## Footnote This includes activities that are considered illicit by certain parties.
28
What is the definition of cybercrime according to Eoghan Casey?
Any crime that involves a computer and a network, where a computer may or may not have played an instrumental part in the commission of the crime.
29
What are copyright-related offenses?
Acts of unauthorized removal or alteration of electronic information related to copyright ## Footnote Some jurisdictions specially define these as criminal offenses.
30
List categories of cybercrime.
* Spam * Extortion * Fraud and Phishing * Service Disruption * Info Theft * Laundering * Pornography
31
What is fraud?
Trickery used to gain a dishonest advantage, often financial, over another person.
32
What is keylogging?
The act of creating records of everything typed on a computer or mobile keyboard.
33
Define social engineering.
A manipulation technique that exploits human error to gain private information, access, or valuables.
34
What is a non-fungible token (NFT)?
A unique digital identifier recorded in a blockchain, used to certify authenticity and ownership.
35
What is cryptocurrency?
Digital money that exists only in the network, not backed by government or banks, aiming for decentralization, security, and anonymity.
36
Describe a DDoS attack.
A malicious attempt to disrupt normal traffic of a targeted server by overwhelming it with a flood of Internet traffic.
37
What is a brute force attack?
An attack that uses trial-and-error to guess login info, encryption keys, or find hidden web pages.
38
What are bots in the context of cybercrime?
Malware or internet bots programmed/hacked to break into user accounts, send spam, or perform other harmful acts.
39
What is phishing?
A type of social engineering attack used to steal user data by masquerading as a trusted entity.
40
Define money laundering.
The process by which criminal proceeds are sanitized to disguise their illicit origins.
41
What is identity theft?
Stealing personal information to create accounts, make purchases, or commit fraud.
42
What constitutes the dark net?
A small fraction of the deep web made up of hidden websites and services, often associated with illicit activity.
43
What is the deep web?
Parts of the internet not fully accessible using standard search engines.