Cyber is relating to or characteristics of the culture of computers, information, technology, and virtual reality
Cybercrime is a crime in which a computer is the object of the crime or is used as a tool to commit an offense
Republic Act No. 10175 Cybercrime Prevention Act of 2012 is a law in the Philippines approved on September 12, 2012, addressing legal issues concerning online interactions and the internet
Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting individual personal information
Common forms of cybercrimes:
Copyright infringement: violation, piracy, or theft of a copyright holder's exclusive rights through the unauthorized use of copyrighted material or work
Plagiarism: using or imitating the language and thoughts of another author without authorization
Computer Addiction: excessive or compulsive use of the computer with serious negative consequences for personal, social, or occupational function
Common forms of cybercrimes:
Copyright infringement: violation, piracy, or theft of a copyright holder's exclusive rights through the unauthorized use of copyrighted material or work
Plagiarism: using or imitating the language and thoughts of another author without authorization
Computer Addiction: excessive or compulsive use of the computer with serious negative consequences for personal, social, or occupational function
Criminal activities:
Hacking: unauthorized access or interference with computer systems, servers, or other information and communication systems
Computer-related forgery, fraud, and/or identity theft: attempting to obtain sensitive information for malicious reasons
Electronic theft: illegal downloading or obtaining files without the right to use them
Cyberbullying: using electronic communication to bully a person
Cybersex: engagement in lascivious exhibition of sexual organs or sexual activity with the aid of a computer system
Child Pornography: form of child sexual exploitation defined and punishable by law
Cyber Defamation: false statement of fact harming the reputation of a person or company
Hacking is gaining unauthorized access to a computer to exploit security weaknesses and install malware
Malware is malicious software infecting computers to intimidate, reformat hard drives, alter or delete files, steal information, send emails, or take control of computers
Pharming redirects users to malicious websites by spoofing legitimate URLs
Phishing uses fake emails, text messages, and websites to steal personal and financial information by tricking users into providing sensitive data
Ransomware restricts access to computers or files and demands payment for removal, with lockscreen and encryption ransomware being common types
Spam involves mass distribution of unsolicited messages, advertising, or pornography to collect information or spread malware
Spyware and Adware collect personal information without consent and can change computer settings or inundate users with pop-up ads
Trojan Horses are malicious programs disguised as legitimate software that can delete files, hack other computers, watch users through webcams, log keystrokes, or steal personal information
Viruses are malicious programs sent to infect computers, send spam, provide access to criminals, scan for personal information, hijack web browsers, disable security settings, and spread to other devices
Wi-Fi Eavesdropping captures personal information shared over unsecure Wi-Fi networks by virtually listening in on data transmissions
Worms propagate by sending themselves to other computers in a network, causing damage by spreading rapidly and potentially shutting down parts of the Internet