Socsci

Cards (63)

  • Internet use in the Philippines has grown rapidly in the past decade. It has given rise to countless opportunities to a lot of Filipinos in every field imaginable. It has been an integral part of our daily lives.
  • Cybercrime is defined as any illegal and criminal activity committed in the internet. It includes unlawful acts where information technology is used either a tool or target, or both, in the commission of such unlawful acts.
  • Criminal activities in the cyberspace are on the rise. Computers today are often misused for activities like email espionage, credit card fraud, spams, and software piracy which not only invade our privacy but also offend our senses
  • Illegal activities where computers have been utilized as an instrument
    • Financial crime
    • Sale of illegal or stolen articles
    • Pornography
    • Online gambling
    • Crimes impinging on intellectual property rights
    • Email spoofing
    • Forgery
    • Cyber defamation
    • Cyber stalking
  • Malware
    Any software intentionally designed to cause damage to a computer, server, client, or computer network
  • Virus
    A computer virus is a type of malware that attaches to another program (like a document), which can replicate and spread after a person first runs it on their system
  • Trojan
    A computer program pretending to be something it's not for the purposes of sneaking onto your computer and delivering some sort of malware
  • Worm
    A worm doesn't need a host system and is capable of spreading across a network and any systems connected to the network without user action
  • Software bugs are not viruses. A software bug refers to a flaw or mistake in the computer code that a given software program is made up of.
  • ILOVEYOU virus

    • Caused $10 billion in losses in as many as 20 countries
    • Created by a 23-year-old Filipino computer student, Onel de Guzman, who intended to steal other users' passwords to access the internet without paying
  • The Philippines did not have a cybercrime law in place when the ILOVEYOU virus struck, so the author could not be successfully prosecuted.
  • The Electronic Commerce Act of 2000 or Republic Act 8792 was enacted six weeks after the ILOVEYOU attack to provide a legal framework for internet-based services and punish perpetrators of cybercrimes.
  • The territoriality principle of penal laws means the law of the place where the crime is committed shall be applicable, so the Philippines' new cybercrime law could not be applied retroactively to the ILOVEYOU case.
  • Ways to protect against computer malware
    • Install antivirus or anti-malware software
    • Keep your antivirus software up to date
    • Run antivirus scans regularly
    • Keep your operating system up to date
    • Protect your network
    • Think before you click
    • Keep your personal information secure
    • Don't use unsecured Wi-Fi
    • Back up your files
    • Use several secure passwords
  • Phishing
    When criminals use fake emails, social media posts or direct messages with the goal of luring you to click on a bad link or download a malicious attachment
  • Common features of phishing emails
    • Too good to be true
    • Sense of urgency
    • Hyperlinks
    • Attachments
    • Unusual sender
  • Tips to prevent phishing attacks
    • Know what a phishing scam looks like
    • Don't click on that link
    • Get free anti-phishing add-ons
    • Don't give your information to an unsecured site
    • Rotate passwords regularly
    • Don't ignore those updates
    • Install firewalls
    • Don't be tempted by those pop-ups
    • Don't give out important information unless you must
  • it. It could be completely different or it could be a popular website with a misspelling, for instance www.bankofarnerica.com - the 'm' is actually an 'r' and an 'n', so look carefully.
  • Attachments - If you see an attachment in an email you weren't expecting or that doesn't make sense, don't open it! They often contain payloads like ransomware or other viruses. The only file type that is always safe to click on is a .txt file.
  • Unusual Sender - Whether it looks like it's from someone you don't know or someone you do know, if anything seems out of the ordinary, unexpected, out of character or just suspicious in general don't click on it!
  • TIPS TO PREVENT PHISHING ATTACKS
    • Know what a phishing scam looks like
    • Don't click on that link
    • Get free anti-phishing add-ons
    • Don't give your information to an unsecured site
    • Rotate passwords regularly
    • Don't ignore those updates
    • Install firewalls
    • Don't be tempted by those pop-ups
    • Don't give out important information unless you must
    • Have a Data Security Platform to spot signs of an attack
  • Identity theft
    The crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases
  • Identity thieves increasingly use computer technology to obtain other people's personal information for identity fraud. To find such information, they may search the hard drives of stolen or discarded computers; hack into computers or computer networks; access computer-based public records; use information-gathering malware to infect computers; browse social networking sites; or use deceptive emails or text messages.
  • HOW TO PROTECT YOURSELF FROM IDENTITY THEFT
    • Do not answer phone calls, texts, or email from numbers or people you do not know
    • Do not share personal information like your bank account number, Social Security number, or date of birth
    • Collect your mail every day
    • Review credit card and bank account statements
    • Store personal information, including your Social Security card, in a safe place. Do not carry it in your wallet
  • Hacking
    The activity of identifying weaknesses in a computer system or a network to exploit the security to gain access to personal data or business data
  • Types of Hacking
    • White Hacking
    • Black Hacking
    • Grey Hacking
  • Cybersex trafficking
    A cybercrime and a form of modern slavery where a victim is forced into sexual exploitation using coercion, force, or fraud, and their abuse is streamed live on the internet via webcam, video, photography, or other digital media
  • Photo or video voyeurism

    The act of taking photo or video coverage of a person or group of persons performing sexual act or any similar activity or of capturing an image of the private area of a person or persons without the latter's consent, under circumstances in which such person/s has/have a reasonable expectation of privacy, or the act of selling, copying, reproducing, broadcasting, sharing, showing or exhibiting the photo or video coverage or recordings of such sexual act or similar activity through VCD/DVD, internet, cellular phones and similar means or device without the written consent of the person/s involved, notwithstanding that consent to record or take photo or video coverage of same was given by such person's
  • The original version of the Cybercrime Law includes the main features of RA 9995 or the Anti-Photo or Video Voyeurism Act of 2009. However, because Congress was forced to quickly enact the said law due to the Sex Video Scandal of Dr. Hayden Kho and Ms. Katrina Halili, the said features were deleted from the Cybercrime Law.
  • During that year, the topic of the Halili and Kho video was prevalent. Because of the humiliation, embarrassment and dishonor, Katrina sued Hayden for violation of RA9262, otherwise known as the Anti-Violence Against Women and their Children Act of 2004.
  • Salient Features of RA 9995
    • To take photo or video coverage of a person or group of persons performing sexual act or any similar activity or to capture an image of the private area of a person/s such as the naked or undergarment clad genitals, public area, buttocks or female breast without the consent of the person/s involved and under circumstances in which the person/s has/have a reasonable expectation of privacy
    • To copy or reproduce, or to cause to be copied or reproduced, such photo or video or recording of sexual act or any similar activity with or without consideration
    • To sell or distribute, or cause to be sold or distributed, such photo or video or recording of sexual act, whether it be the original copy or reproduction thereof
    • To publish or broadcast, or cause to be published or broadcast, whether in print or broadcast media, or show or exhibit the photo or video coverage or recordings of such sexual act or any similar activity through VCD/DVD, internet, cellular phones and other similar means or device
  • Penalties under RA 9995
    • Imprisonment of not less that three (3) years but not more than seven (7) years and a fine of not less than One hundred thousand pesos (P100,000.00) but not more than Five hundred thousand pesos (P500,000.00), or both, at the discretion of the court
    • If the violator is a juridical person, its license or franchise shall be automatically be deemed revoked and the persons liable shall be the officers thereof including the editor and reporter in the case of print media, and the station manager, editor and broadcaster in the case of a broadcast media
    • If the offender is a public officer or employee, or a professional, he/she shall be administratively liable
    • If the offender is an alien, he/she shall be subject to deportation proceedings after serving his/her sentence and payment of fines
  • On December 10, 2010, Pasig City Judge Rodolfo Bonifacio of the RTC Branch 59 dismissed for "lack of merit" the Php100,000,000 civil damages claimed by Katrina Halili against Hayden Kho.
  • Many of people opined that Katrina did not win the case because of the absence of cybercrime laws in the Philippines.
  • It is undisputed that Dr. Kho would be guilty of violating RA9262 if: 1) He secretly, without consent of the woman (Katrina), videotaped their sexual acts; AND 2) He uploaded the same to the internet causing "mental and emotional anguish, public ridicule or humiliation to the woman…"
  • Offenses Against the Confidentiality, Integrity and Availability of Computer Data and Systems
    • Illegal Access
    • Illegal Interception
    • Data Interference
    • System Interference
    • Misuse of Device
    • Cyber-squatting
  • Illegal Access
    The intentional access to the whole or any part of a computer system without right
  • Elements of the Offense of Illegal Access: 1) There must be an intentional access in whole and in part of a computer system. 2) The person who attempts to, or is accessing, or had already access the data has no right of access to the system.
  • An authorized person may not be authorized. Chief registrar may be guilty of illegal access if he/she adds into the records of Student X a grade of 90 in the course Thesis II where in fact, the student has NOT yet taken the said course.
  • The Supreme Court ruled that a client's engagement of an ethical hacker requires an agreement between them as to the extent of the search, the methods to be used, and the systems to be tested. This is referred to as "get out of jail free card." Since the ethical hacker does his job with prior permission from the client, such permission would insulate him from the coverage of Section 4(a)(1).