mod 4

Cards (19)

  • Cyber is relating to or characteristics of the culture of computers, information, technology, and virtual reality
  • Cybercrime is a crime in which a computer is the object of the crime or is used as a tool to commit an offense
  • Republic Act No. 10175 Cybercrime Prevention Act of 2012 is a law in the Philippines approved on September 12, 2012, addressing legal issues concerning online interactions and the internet
  • Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting individual personal information
  • Common forms of cybercrimes:
    • Copyright infringement: violation, piracy, or theft of a copyright holder's exclusive rights through the unauthorized use of copyrighted material or work
    • Plagiarism: using or imitating the language and thoughts of another author without authorization
    • Computer Addiction: excessive or compulsive use of the computer with serious negative consequences for personal, social, or occupational function
  • Common forms of cybercrimes:
    • Copyright infringement: violation, piracy, or theft of a copyright holder's exclusive rights through the unauthorized use of copyrighted material or work
    • Plagiarism: using or imitating the language and thoughts of another author without authorization
    • Computer Addiction: excessive or compulsive use of the computer with serious negative consequences for personal, social, or occupational function
  • Criminal activities:
    • Hacking: unauthorized access or interference with computer systems, servers, or other information and communication systems
    • Computer-related forgery, fraud, and/or identity theft: attempting to obtain sensitive information for malicious reasons
    • Electronic theft: illegal downloading or obtaining files without the right to use them
    • Cyberbullying: using electronic communication to bully a person
    • Cybersex: engagement in lascivious exhibition of sexual organs or sexual activity with the aid of a computer system
    • Child Pornography: form of child sexual exploitation defined and punishable by law
    • Cyber Defamation: false statement of fact harming the reputation of a person or company
  • Hacking is gaining unauthorized access to a computer to exploit security weaknesses and install malware
  • Malware is malicious software infecting computers to intimidate, reformat hard drives, alter or delete files, steal information, send emails, or take control of computers
  • Pharming redirects users to malicious websites by spoofing legitimate URLs
  • Phishing uses fake emails, text messages, and websites to steal personal and financial information by tricking users into providing sensitive data
  • Ransomware restricts access to computers or files and demands payment for removal, with lockscreen and encryption ransomware being common types
  • Spam involves mass distribution of unsolicited messages, advertising, or pornography to collect information or spread malware
  • Spyware and Adware collect personal information without consent and can change computer settings or inundate users with pop-up ads
  • Trojan Horses are malicious programs disguised as legitimate software that can delete files, hack other computers, watch users through webcams, log keystrokes, or steal personal information
  • Viruses are malicious programs sent to infect computers, send spam, provide access to criminals, scan for personal information, hijack web browsers, disable security settings, and spread to other devices
  • Wi-Fi Eavesdropping captures personal information shared over unsecure Wi-Fi networks by virtually listening in on data transmissions
  • Worms propagate by sending themselves to other computers in a network, causing damage by spreading rapidly and potentially shutting down parts of the Internet