Lie

Cards (187)

  • Cybercrime
    The use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking, Intellectual property, violating privacy
  • Cybercriminals
    May use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes
  • Common forms of cybercrimes
    • Copyright infringement
    • Plagiarism
    • Computer Addiction
  • Copyright infringement
    The violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work
  • Plagiarism
    An act or instance of using or closely imitating the language and thoughts of another author without authorization
  • Computer Addiction
    • Offline: Excessive gaming behavior, which can be practiced both offline and online
    • Online: Also known as "Internet Addiction", gets more attention in general from scientific research than offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the Internet
  • Virtual Self
    The persona you create about yourself virtually
  • RA 8293 is also known as the Intellectual Property Code of the Philippines, which governs and protects all intellectual properties within the Philippines
  • Types of intellectual property rights
    • Trade Secrets
    • Patents
    • Copyrights
    • Trademarks
  • Trade Secrets
    Specific, private information that is important to a business
  • Patents
    Give its owner the legal right to exclude others from making, using, or selling an invention for a limited period of years in exchange for publishing an enabling public disclosure of the invention
  • Copyrights
    Give its owner the exclusive right to make copies of a creative work, usually for a limited time
  • Trademarks
    Consisting of a recognizable sign, design, or expression which identifies products or services of a particular source from those of others
  • Identity Theft
    The crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases
  • Under the Cybercrime Prevention Act of 2012 (Republic Act No. 10175), computer-related identity theft is defined as "the intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right"
  • Types of identifying information
    • Name, date of birth, driver's license number, passport number or tax identification number
    • Unique biometric data, such as fingerprint or other unique physical representation
    • Unique electronic identification number, address or routing code
    • Telecommunication identifying information or access devices
  • Hacking
    Activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks
  • Reasons for hacking
    • Criminal financial gain
    • Gaining street cred and burnishing one's reputation
    • Corporate espionage
    • Steal business and/or national intelligence
  • Hacking prevention
    • Anti-malware protection
    • Be careful with apps
    • Protect your info
    • Update your software
    • Browse carefully
    • Password safety
  • Cyber Security
    The body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access
  • Types of cyber security threats
    • Malware
    • Ransomware
    • Phishing
    • Spear phishing
  • Malware
    A form of malicious software in which any file or program can be used to harm a computer user
  • Ransomware
    A type of malware that involves an attacker locking the victim's computer system files
  • Phishing
    A form of social engineering where fraudulent email or text messages that resemble those from reputable or known sources are sent
  • Spear Phishing
    A type of phishing attack that has an intended target user, organization or business
  • Cyber security challenges should also address end-user education, as individuals may accidently bring viruses into the workplace on their laptops or mobile devices
  • Regular security awareness training will help individuals do their part in keeping their workplace safe from cyber threats
  • Ethics
    The study of the ethical issues arising out of the use and development of electronic technologies
  • IT Professional
    A person who works in the information technology field. IT professionals can also include people who received education in a computer-related institution and people who possess vast knowledge in information technology
  • Qualities of an IT professional
    • Diligence
    • Updated
    • Skills and expertise
  • Guidelines for ethical internet use
    • The Internet must not be used to harm others
    • The interference of other Internet user's work is prohibited
    • Poking around in the personal files of other Internet users is bad
    • The use of the Internet for stealing is not allowed
    • The internet should not be used for deception or trickery
    • The copying or pirating of unpaid software is illegal
    • The use of other Internet sources without permission or compensation is wrong
    • Understand the social consequences that can occur when coding or designing
    • Always use the Internet in considerate ways and show respect to your fellow humans
  • Asimov's postulates
    • A robot cannot harm a person or by its inaction allow a person to be harmed
    • A robot must obey all orders given by a human, unless those orders are contrary to the first law
    • The robot must take care of its safety to the extent that this does not contradict the first or second law
  • Cybertechnology
    Any computing or communication technologies
  • Ethical code
    Principals and behavioral expectations established by organizations for their employees and third parties. The core values of a company are also implemented
  • Netiquette
    The etiquette of cyberspace and "etiquette" means the forms required by good breeding or prescribed by authority to be required in social or official life. In other words, netiquette is a set of rules for behaving properly online
  • Even though you may be interacting with a computer screen, you are communicating with a real person who will react to your message. Make a good impression - treat others with the same respect that you would like to receive and avoid confrontational or offensive language
  • To help convey meaning when creating messages, it is sometimes acceptable to include appropriate emoticon symbols, such as a smiley face :) However, for professional communications these would be inappropriate
  • Communicating effectively in college and the workplace requires avoiding slang, acronyms, and text talk
  • Netiquette
    The etiquette of cyberspace and "etiquette" means the forms required by good breeding or prescribed by authority to be required in social or official life
  • Netiquette
    A set of rules for behaving properly online