CYBERCRIME

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

Categories of Cybercrime (PIG):

1. Property

2. Individual

3. Government

2
New cards

Property Cybercrime

Involves stealing or manipulating digital assets like bank details or confidential data for financial gain or fraud.

3
New cards

Individual Cybercrime

Targets specific people through illegal online actions such as harassment, stalking, or trafficking.

4
New cards

Government Cybercrime

Entails attacks on state institutions, often by terrorists or hostile nations, aiming to disrupt or damage national security.

5
New cards

Types of cybercrime:

- DDoS Attacks

- Botnets

- Identity Theft

- Cyberstalking

- Social Engineering

- PUPs (Potentially Unwanted Programs)

- Phishing

- Prohibited/Illegal Content

- Online Scams

- Exploit Kits

6
New cards

DDoS Attacks

Overwhelm websites or networks with excessive traffic to make them crash and open them to further intrusion.

7
New cards

Botnets

Networks of infected computers controlled remotely to send spam, attack systems, or perform malicious tasks.

8
New cards

Identity Theft

Involves stealing personal information to commit fraud, such as financial theft or impersonation.

9
New cards

Cyberstalking

Online harassment that uses social media and digital tools to intimidate or scare a known victim.

10
New cards

Social Engineering

Criminals manipulate victims into revealing sensitive information by posing as trustworthy entities.

11
New cards

PUPs (Potentially Unwanted Programs)

Mildly harmful software that disrupts system functionality and may include spyware or adware.

12
New cards

Phishing

Attackers send deceptive emails or links to trick users into giving away passwords or financial information.

13
New cards

Prohibited/Illegal Content

Sharing or distributing disturbing, violent, or unlawful material like child exploitation or terrorism-related content.

14
New cards

Online Scams

Fraudulent schemes using fake ads or promises to lure users into giving up money or information.

15
New cards

Exploit Kits

Readily available malicious tools that exploit software bugs to take control of vulnerable systems.

16
New cards

What is the Cybercrime Prevention Act of 2012?

REPUBLIC ACT NO. 10175

17
New cards

When was RA 10175 signed?

September 12, 2012

18
New cards

RA 10175 aims to

address legal issues concerning online interactions and the Internet in the Philippines

19
New cards

Cybercrime offenses include?

20
New cards

What does the RA 10175 include?

"catch-all" clause

21
New cards

What does "catch-all" clause mean?

If someone commits a regular crime (like fraud, threats, or libel), and they use a computer or the internet to do it, the punishment will be heavier.