lesson 6

Cards (45)

  • Cybercrime
    The use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy
  • Cybercriminal
    A person who uses his skills in technology to do malicious acts and illegal activities known as cybercrimes. They can be individuals or teams
  • Hacking is considered a cybercrime when it has a malicious purpose of conducting any harmful activities and we call this one "black hat hacker" or a cyber-criminal
  • Some examples of cybercriminals
    • Black hat hackers
    • Cyberstalkers
    • Cyber terrorists
    • Scammer
  • Classifications of Cybercrimes
    • Individual Cyber Crimes
    • Organisation Cyber Crimes
    • Property Cybercrimes
    • Society Cybercrimes
  • Individual Cyber Crimes
    Targeting individuals. Includes phishing, spoofing, spam, cyberstalking, and more
  • Organisation Cyber Crimes
    The main target is organizations. Usually, this type of crime is done by teams of criminals including malware attacks and denial of service attacks
  • Property Cybercrimes
    Targets property like credit cards or even intellectual property rights
  • Society Cybercrimes
    The most dangerous form of cybercrime as it includes cyber-terrorism
  • Most Common Cyber Crimes
    • Phishing and Scam
    • Identity Theft
    • Ransomware Attack
    • Hacking/Misusing Computer Networks
    • Internet Fraud
  • Phishing
    A type of social engineering attack that targets the user and tricks them by sending fake messages and emails to get sensitive information about the user or trying to download malicious software and exploit it on the target system
  • Identity Theft
    When a cybercriminal uses another person's personal data like credit card numbers or personal pictures without their permission to commit a fraud or a crime
  • Ransomware Attack
    A type of malware that has the capability to prevent users from accessing all of their personal data on the system by encrypting them and then asking for a ransom in order to give access to the encrypted data
  • Hacking/Misusing Computer Networks
    The crime of unauthorized access to private computers or networks and misuse of it either by shutting it down or tampering with the data stored or other illegal approaches
  • Internet Fraud
    A type of cybercrimes that makes use of the internet and it can be considered a general term that groups all of the crimes that happen over the internet like spam, banking frauds, theft of service, etc.
  • Other Types of Cybercrime
    • Cyber Bullying
    • Cyber Stalking
    • Software Piracy
    • Social Media Frauds
    • Online Drug Trafficking
    • Electronic Money Laundering
    • Cyber Extortion
    • Intellectual-property Infringements
    • Online Recruitment Fraud
  • Cyber Bullying
    Also known as online or internet bullying. It includes sending or sharing harmful and humiliating content about someone else which causes embarrassment and can be a reason for the occurrence of psychological problems
  • Cyber Stalking
    Unwanted persistent content from someone targeting other individuals online with the aim of controlling and intimidating like unwanted continued calls and messages
  • Software Piracy
    The illegal use or copy of paid software with violation of copyrights or license restrictions
  • Example of software piracy
    • Downloading a fresh non-activated copy of windows and using "Cracks" to obtain a valid license for windows activation
  • Social Media Frauds
    The use of social media fake accounts to perform any kind of harmful activities like impersonating other users or sending intimidating or threatening messages
  • Online Drug Trafficking
    The rise of cryptocurrency technology made it easy to transfer money in a secured private way and complete drug deals without drawing the attention of law enforcement
  • Electronic Money Laundering
    Also known as transaction laundering. It is based on unknown companies or online business that makes approvable payment methods and credit card transactions but with incomplete or inconsistent payment information for buying unknown products
  • Cyber Extortion
    The demand for money by cybercriminals to give back some important data they've stolen or stop doing malicious activities such as denial of service attacks
  • Intellectual-property Infringements
    The violation or breach of any protected intellectual-property rights such as copyrights and industrial design
  • Online Recruitment Fraud
    Fake job opportunities released by fake companies for the purpose of obtaining a financial benefit from applicants or even making use of their personal data
  • How to Prevent Cybercrimes
    • Use up-to-date security software like antivirus and firewalls
    • Implement the best possible security settings and implementations
    • Don't browse untrusted websites and be careful when downloading unknown files, and also be careful when viewing Email attachments
    • Use strong authentication methods and keep your passwords as strong as possible
    • Don't share sensitive information online or on your social media accounts
    • Educate your children about the risks of internet usage and keep monitoring their activities
    • Always be ready to make an immediate reaction when falling victim to cybercrimes by referring to the police
  • Republic Act 10175 – Cybercrime Prevention Act was signed into law last September 12, 2012. This law is already in effect as the Supreme Court uphold its constitutionality (February 18, 2014)
  • Types of Cybercrime covered under RA 10175 - Cybercrime Prevention Act of 2012
    • Illegal access
    • Illegal interception
    • Data Interference
    • System Interference
  • Illegal access
    Unauthorized access (without right) to a computer system or application
  • Illegal interception
    Unauthorized interception of any non-public transmission of computer data to, from, or within a computer system
  • Data Interference
    Unauthorized alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, and including the introduction or transmission of viruses
  • System Interference
    Unauthorized hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data messages, and including the introduction or transmission of viruses
  • Data Interference
    Unauthorized alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, and including the introduction or transmission of viruses. Authorized action can also be covered by this provision if the action of the person went beyond agreed scope resulting to damages stated in this provision.
  • System Interference
    Unauthorized hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data messages, and including the introduction or transmission of viruses. Authorized action can also be covered by this provision if the action of the person went beyond agreed scope resulting to damages stated in this provision.
  • Misuse of devices
    The unauthorized use, possession, production, sale, procurement, importation, distribution, or otherwise making available, of devices, computer program designed or adapted for the purpose of committing any of the offenses stated in Republic Act 10175. Unauthorized use of computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed with intent that it be used for the purpose of committing any of the offenses under Republic Act 10175.
  • Cyber-squatting
    Acquisition of domain name over the Internet in bad faith to profit, mislead, destroy reputation, and deprive others from the registering the same. This includes those existing trademark at the time of registration; names of persons other than the registrant; and acquired with intellectual property interests in it. Those who get domain names of prominent brands and individuals which in turn is used to damage their reputation – can be sued under this provision. Note that freedom of expression and infringement on trademarks or names of person are usually treated separately. A party can exercise freedom of expression without necessarily violating the trademarks of a brand or names of persons.
  • Computer-related Forgery
    Unauthorized input, alteration, or deletion of computer data resulting to inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible; or The act of knowingly using computer data which is the product of computer-related forgery as defined here, for the purpose of perpetuating a fraudulent or dishonest design.
  • Computer-related Fraud
    Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
  • Computer-related Identity Theft
    Unauthorized acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical.