IT Module 4 - Cybercrimes

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

flashcard set

Earn XP

Description and Tags

naku naku, skill issue

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

What is Cyber

It is relating to or characteristics of the culture of computers, information, technology, and virtual reality

2
New cards

Cybercrime

  • a crime in which a computer is the object of the crime and is used as a tool to commit the offense.

3
New cards

Cybercriminals

  • uses computer technology for exploitative and malicious purposes

4
New cards

Republic Act #10175

  • Cybercrime Prevention Act of the Philippines

  • aims to address legal issues concerning online interactions and internet

5
New cards

Republic Act #10173

  • Data Privacy Act

  • protects individuals’ personal information

6
New cards

Common forms of Cybercrimes

Copyright, Plagiarism, Computer Addiction,

7
New cards

Copyright

  • the exclusive right given to an originator or an assignee

8
New cards

Copyright Infringement

  • the violation of a copyright holder’s exclusive rights through the unauthorized use of copyrighted work or material

9
New cards

Plagiarism

  • and act or instance of using or closely imitating the language and thoughts of another author without authorization

10
New cards

Computer Addiction

  • excessive use of the computer

11
New cards

Internet Threats

  • Hacking

  • Malware

  • Pharming

  • Phishing

  • Ransomware

  • Spam

  • Spyware

  • Trojan Horses

  • Viruses

  • Worms

12
New cards

Hacking

  • actions taken by someone to gain unauthorized access to a computer

13
New cards

Malware

  • Malicious software that infects your computer

  • viruses, worms, trojan horses, spyware, adware

  • general term for computer damagers

14
New cards

Pharming

  • points you to a malicious and illegitimate website by redirecting the legitimate url

15
New cards

Phishing

  • fake emails, text messages, and websites created to took like they’re from authentic companies

  • sent by criminals to steal info

  • also known as spoofing

16
New cards

Ransomware

  • It is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed

17
New cards

Spam

  • The mass distribution of unsolicited messages, advertising, or pornography to addresses that can be easily found on the Internet through things like social networking sites, company websites, and personal blogs

18
New cards

Spyware & Adware

  • These are often used by third parties to infiltrate your computer.

19
New cards

Trojan Horses

  • A malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it's downloaded.

20
New cards

Viruses

  • Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list. Just visiting a site can start an automatic download of this.

21
New cards

Worms

  • It lives in your computer memory, doesn't damage or alter the hard drive and propagates by sending itself to other computers in a network – whether within a company or the Internet itself.