Living in the IT Era (Prefinals)

Cards (96)

  • Cyber
    • Characteristics of the culture of computer, information, technology and virtual reality
    • Denotes a relationship with information technology
    • Anything relating to computing such as the internet
  • Cybercrime
    • Criminal activity that involves computer, and network
    • Defined as a crime in which a computer is the object of the crime
  • Cybercrime offenses

    • Hacking
    • Phishing
    • Spamming
    • Child pornography
  • Cybercriminals
    They may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes
  • Republic Act No. 10175
    • Cybercrime Prevention Act of 2012
    • A law in the Philippines that was being approved on September 12,2012 which aims to address legal issues concerning online interactions and internet
    • Signed by President Benigno Aquino III
  • Republic Act No. 10173
    • Data Privacy Act of 2012
    • An act that protects the individual personal information
  • National Privacy Commission (NPC)

    • Implemented the Data Privacy Act of 2012
    • Monitor and ensure compliance of the country with international standards set for data protection
  • 3 common forms of cybercrime
    • Copyright
    • Plagiarism
    • Computer addiction
  • Copyright
    • The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same
    • Copyright infringement - violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work
  • Plagiarism
    An act or instance of using or closely imitating the language and thoughts of another author without authorization
  • 3 types of computer addiction

    • Offline
    • Online
    • Virtual self
  • Offline computer addiction

    Generally used when speaking about excessive gaming behavior, which can be practiced both offline and online
  • Online computer addiction

    Also known as "Internet Addiction", gets more attention in general from scientific research than offline computer addiction, mainly because the excessive use of the Internet
  • Virtual self
    The persona you create about yourself virtually
  • 7 common criminal activities

    • Hacking
    • Electronic theft
    • Forgery, fraud/identity theft
    • Cyberbullying
    • Cybersex
    • Child pornography
    • Cyber defamation
  • Hacking
    • Unauthorized access of or interference with computer systems, servers, or other information and communication system
    • Illegal access
    • Illegal interception
    • Data interference
    • System interference
    • Misuse of devices
    • Penalty of 6 years to 12 years of imprisonment
  • Forgery, fraud/identity theft

    • An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons
    • Phishing
    • Pharming
    • Spam
    • Maximum penalty of Php 200,000 fine or prison mayor
  • Electronic theft

    • Illegal downloading
    • Obtaining files that you do not have the right to use from the internet
    • Digital piracy - practice of illegally copying and selling digital music, video, computer software, etc.
    • Copyright infringement
    • Penalty of Php 50,000 - 500,000 and or prison mayor
  • Cyberbullying
    • The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature
    • The Anti-Bullying Act of 2013 (RA 10627) signed by President Benigno Aquino III
  • Cybersex
    • Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration
    • There is a discussion on this matter if it involves "couples" or "people in relationship" who engage in cybersex
    • Penalty of at least Php 200,000 and or prison mayor
  • Child pornography

    • A form of child sexual exploitation
    • Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti Child Pornography Act of 2009, committed through a computer system
    • Penalty of 12-20 years of imprisonment
  • Cyber defamation

    • An unprivileged false statement of fact which tends to harm the reputation of a person or company
    • Penalty of 6-12 years of imprisonment or prison mayor
  • Hacking
    It is a term used to describe actions taken by someone to gain unauthorized access to a computer
  • Hacking
    • Find weaknesses (or pre-existing bugs) in your security settings and exploit them in order to access your information
    • Install a Trojan horse, providing a back door for hackers to enter and search for your information
  • Malware
    Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware
  • Malware
    • Intimidate you with scareware, which is usually a pop-up message that tells you your computer has a security problem or other false information
    • Reformat the hard drive of your computer causing you to lose all your information
    • Alter or delete files, Steal sensitive information, Send emails on your behalf, Take control of your computer and all the software running on it
  • Pharming
    It is a common type of online fraud. Malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website
  • Pharming
    • Convince you that the site is real and legitimate by spoofing or looking almost identical to the actual site down to the smallest details. You may enter your personal information and unknowingly give it to someone with malicious intent.
  • Phishing
    Fake emails, text messages and websites created to look like they're from authentic companies. They're sent by criminals to steal personal and financial information from you. This is also known as "spoofing"
  • Phishing
    • Trick you into giving them information by asking you to update, validate or confirm your account. It is often presented in a manner than seems official and intimidating, to encourage you to take action
    • Provides cyber criminals with your username and passwords so that they can access your accounts (your online bank account, shopping accounts, etc.) and steal your credit card numbers
  • Ransomware
    It is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.
  • Ransomware
    • Lockscreen ransomware: displays an image that prevents you from accessing your computer
    • Encryption ransomware: encrypts files on your system's hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them
  • The two most common means of infection appear to be phishing emails that contain malicious attachments and website pop-up advertisements
  • It will display a notification stating that your computer or data have been locked and demanding a payment be made for you to regain access. Sometimes the notification states that authorities have detected illegal activity on your computer, and that the payment is a fine to avoid prosecution.
  • Do not pay the ransom. These threats are meant to scare and intimidate you, and they do not come from a law enforcement agency.
  • In order to lessen the impact of a ransomware infection, be sure to regularly back-up your data with a removable external storage drive
  • If your computer has been infected (i.e. you are unable to access your computer or your files have been encrypted), contact a reputable computer technician or specialist to find out whether your computer can be repaired and your data retrieved
  • Spam
    The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs
  • Spam
    • Annoy you with unwanted junk mail
    • Create a burden for communications service providers and businesses to filter electronic messages
    • Phish for your information by tricking you into following links or entering details with too-good to-be-true offers and promotions
    • Provide a vehicle for malware, scams, fraud and threats to your privacy
  • Spyware
    Software that collects personal information about you without you knowing. They often come in the form of a 'free' download and are installed automatically with or without your consent. These are difficult to remove and can infect your computer with viruses