LESSON 2 & e

    Cards (42)

    • Types of cybercrime:
      • Viruses
      • Malware
      • DoS Attacks
      • Phishing Emails
      • Cyberstalking
      • Identity Theft
    • Cybercrimes can generally be divided into two categories:
      • Crimes that target networks or devices
      • Crimes using devices to participate in criminal activities
    • Categories of cybercrime:
      • Individual
      • Property
      • Government
    • Property cybercrime:
      • Involves illegally possessing an individual’s bank or credit card details
      • Hackers steal bank details to gain access to funds, make purchases online, or run phishing scams
      • Use malicious software to gain access to confidential information
    • Individual cybercrime:
      • Involves distributing malicious or illegal information online
      • Includes cyberstalking, distributing pornography, and trafficking
    • Government cybercrime:
      • Least common but most serious offense
      • Known as cyber terrorism
      • Includes hacking government websites, military websites, or distributing propaganda
      • Perpetrated by terrorists or enemy governments
    • DDoS Attacks:
      • Used to make an online service unavailable by overwhelming the site with traffic
      • Botnets are created by depositing malware on users’ computers
    • Botnets:
      • Networks from compromised computers controlled by remote hackers
      • Used to send spam or attack other computers
      • Can act as malware and perform malicious tasks
    • Identity Theft:
      • Criminal gains access to personal information to steal funds or participate in fraud
      • Can open accounts, plan criminal activities, or claim benefits in victim’s name
    • Cyberstalking:
      • Involves online harassment through messages and emails
      • Cyberstalkers use social media, websites, and search engines to intimidate victims
    • Social Engineering:
      • Criminals make direct contact to gain confidence and pose as customer service agents
      • Aim to obtain passwords, company information, or bank details
      • Gain access to accounts and sell information or secure accounts in victim’s name
    • PUPs:
      • Potentially Unwanted Programs are a type of malware
      • Uninstall necessary software including search engines and pre-downloaded apps
      • Can include spyware or adware
    • Phishing:
      • Involves sending malicious email attachments or URLs to gain access to accounts or computers
      • Users are tricked into changing passwords or updating information, giving criminals access
    • Prohibited/Illegal Content:
      • Involves sharing and distributing inappropriate content
      • Includes sexual activity, violent videos, and materials advocating terrorism or child exploitation
      • Exists on the everyday internet and dark web
    • Online Scams:
      • Usually in the form of ads or spam emails with promises of rewards or unrealistic amounts of money
      • Clicking on scams can compromise information through malware interference
    • Exploit Kits:
      • Need a vulnerability in software code to gain control of a user’s computer
      • Readymade tools available for purchase online on dark web hacking forums
    • Copyright infringement is the use or production of copyright-protected material without the permission of the copyright holder
    • Copyright infringement breaches the rights afforded to the copyright holder, such as the exclusive use of a work for a set period of time
    • Music and movies are forms of entertainment that suffer from significant amounts of copyright infringement
    • Infringement cases may lead to contingent liabilities, which are amounts set aside in case of a possible lawsuit
    • Individuals and companies register for copyright protection to profit from their efforts
    • Other parties may be granted permission to use works through licensing arrangements or may purchase the works from the copyright holder
    • Factors that may lead to copyright infringement include a high price for the authorized work or a lack of access to a supply of the authorized work
    • Original intellectual creations in the literary and artistic domain are copyrightable in the Philippines
    • Copyrightable works include books, articles, lectures, music compositions, drawings, paintings, sculptures, computer programs, and more
    • Derivative works are also protected, such as dramatizations, translations, adaptations, and collections of works
    • Copyright protection does not cover ideas, procedures, systems, news of the day, official texts, works of the Philippine Government, and statutes, among others
    • Owners of original literary and artistic works include the author, co-authors in joint ownership, employees, employers, commissioned work owners, and audio-visual work creators
    • Authors have copy or economic rights and moral rights over their work
    • Copy rights include reproduction, distribution, rental, display, performance, and communication to the public
    • Moral rights include attribution, alterations, objections to distortion, and restraint of use of name with respect to the work
    • Plagiarism is copying or stealing an idea or work of others without giving credits
    • Plagiarism can lead to consequences like imprisonment and fines
    • Six ways to avoid plagiarism include paraphrasing, citing, quoting, and referencing
    • Copyright violation grants authors and artists exclusive rights to their work and occurs when there is infringement upon the legal rights of the copyright holder
    • Plagiarism ensures proper credit is given when someone's work is used by another person and can lead to severe consequences like expulsion or loss of credibility
    • A person can commit plagiarism and copyright violation with the same action by using something without permission and not citing sources
    • An action may be a copyright violation but not plagiarism if the source is cited but not legally used
    • An action may be plagiarism but not a copyright violation if the material is not protected by copyright law but not properly cited
    • Plagiarism is about the failure to acknowledge the author of a source used and can be avoided by citing sources
    See similar decks