LESSON 2 & e

Cards (42)

  • Types of cybercrime:
    • Viruses
    • Malware
    • DoS Attacks
    • Phishing Emails
    • Cyberstalking
    • Identity Theft
  • Cybercrimes can generally be divided into two categories:
    • Crimes that target networks or devices
    • Crimes using devices to participate in criminal activities
  • Categories of cybercrime:
    • Individual
    • Property
    • Government
  • Property cybercrime:
    • Involves illegally possessing an individual’s bank or credit card details
    • Hackers steal bank details to gain access to funds, make purchases online, or run phishing scams
    • Use malicious software to gain access to confidential information
  • Individual cybercrime:
    • Involves distributing malicious or illegal information online
    • Includes cyberstalking, distributing pornography, and trafficking
  • Government cybercrime:
    • Least common but most serious offense
    • Known as cyber terrorism
    • Includes hacking government websites, military websites, or distributing propaganda
    • Perpetrated by terrorists or enemy governments
  • DDoS Attacks:
    • Used to make an online service unavailable by overwhelming the site with traffic
    • Botnets are created by depositing malware on users’ computers
  • Botnets:
    • Networks from compromised computers controlled by remote hackers
    • Used to send spam or attack other computers
    • Can act as malware and perform malicious tasks
  • Identity Theft:
    • Criminal gains access to personal information to steal funds or participate in fraud
    • Can open accounts, plan criminal activities, or claim benefits in victim’s name
  • Cyberstalking:
    • Involves online harassment through messages and emails
    • Cyberstalkers use social media, websites, and search engines to intimidate victims
  • Social Engineering:
    • Criminals make direct contact to gain confidence and pose as customer service agents
    • Aim to obtain passwords, company information, or bank details
    • Gain access to accounts and sell information or secure accounts in victim’s name
  • PUPs:
    • Potentially Unwanted Programs are a type of malware
    • Uninstall necessary software including search engines and pre-downloaded apps
    • Can include spyware or adware
  • Phishing:
    • Involves sending malicious email attachments or URLs to gain access to accounts or computers
    • Users are tricked into changing passwords or updating information, giving criminals access
  • Prohibited/Illegal Content:
    • Involves sharing and distributing inappropriate content
    • Includes sexual activity, violent videos, and materials advocating terrorism or child exploitation
    • Exists on the everyday internet and dark web
  • Online Scams:
    • Usually in the form of ads or spam emails with promises of rewards or unrealistic amounts of money
    • Clicking on scams can compromise information through malware interference
  • Exploit Kits:
    • Need a vulnerability in software code to gain control of a user’s computer
    • Readymade tools available for purchase online on dark web hacking forums
  • Copyright infringement is the use or production of copyright-protected material without the permission of the copyright holder
  • Copyright infringement breaches the rights afforded to the copyright holder, such as the exclusive use of a work for a set period of time
  • Music and movies are forms of entertainment that suffer from significant amounts of copyright infringement
  • Infringement cases may lead to contingent liabilities, which are amounts set aside in case of a possible lawsuit
  • Individuals and companies register for copyright protection to profit from their efforts
  • Other parties may be granted permission to use works through licensing arrangements or may purchase the works from the copyright holder
  • Factors that may lead to copyright infringement include a high price for the authorized work or a lack of access to a supply of the authorized work
  • Original intellectual creations in the literary and artistic domain are copyrightable in the Philippines
  • Copyrightable works include books, articles, lectures, music compositions, drawings, paintings, sculptures, computer programs, and more
  • Derivative works are also protected, such as dramatizations, translations, adaptations, and collections of works
  • Copyright protection does not cover ideas, procedures, systems, news of the day, official texts, works of the Philippine Government, and statutes, among others
  • Owners of original literary and artistic works include the author, co-authors in joint ownership, employees, employers, commissioned work owners, and audio-visual work creators
  • Authors have copy or economic rights and moral rights over their work
  • Copy rights include reproduction, distribution, rental, display, performance, and communication to the public
  • Moral rights include attribution, alterations, objections to distortion, and restraint of use of name with respect to the work
  • Plagiarism is copying or stealing an idea or work of others without giving credits
  • Plagiarism can lead to consequences like imprisonment and fines
  • Six ways to avoid plagiarism include paraphrasing, citing, quoting, and referencing
  • Copyright violation grants authors and artists exclusive rights to their work and occurs when there is infringement upon the legal rights of the copyright holder
  • Plagiarism ensures proper credit is given when someone's work is used by another person and can lead to severe consequences like expulsion or loss of credibility
  • A person can commit plagiarism and copyright violation with the same action by using something without permission and not citing sources
  • An action may be a copyright violation but not plagiarism if the source is cited but not legally used
  • An action may be plagiarism but not a copyright violation if the material is not protected by copyright law but not properly cited
  • Plagiarism is about the failure to acknowledge the author of a source used and can be avoided by citing sources