1/45
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Cybercrime
Refers to any criminal activity that involves computers, networks or digital devices. It includes crimes committed through the Internet or targeting computer systems.
Cyber dependent crimes and cyber enabled crimes
Two major categories of cybercrime
Cyber-dependent crimes
This describes can only happen using computers or network, such as hacking and unauthorized access, malware, attacks, and ransomware, denial of service attacks.
cyber enabled crimes
Traditional crimes that are made easier or more dangerous using technology.
Online fraud, scams, and identity theft
Cyber bullying and online harassment
Human trafficking and child exploitation online
Phishing
Fake emails or messages to steal personal info.
Identity theft
Using someone’s personal info without permission
Ransomware
Locking files and demanding payment
Cyberbullying
Harassing or threatening others online
Hacking
getting unauthorized access to systems
financial gain
Stealing money, credit card info, or selling data
political or ideological
Hactivism, cyberwarfare
personal satisfaction
Curiosity, revenge, challenge
organized crime
Professional groups conducting fraud or data theft
Financial loss, reputation damage, emotional stress, national security threats
impacts of cybercrime
financial loss
Millions lost to scams and frauds
reputation damage
Personal data leaks harm individuals and businesses
emotional stress
Victims of cyber bullying or identity theft suffer software
national security threats
Attacks on government networks
think before you click or share
Prevents phishing, scams, and the spread of malware
Respect others’ privacy
Avoid identity theft and doxxing
Use polite, ethical communication
reduces cyber bullying, and online harassment
Follow laws and rules of conduct
Keeps you from committing online offenses
be responsible with your digital footprint
Protects your reputation and data security
verify information before sharing
Prevents this information and digital manipulation
access
Refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network
alteration
Refers to the modification or change, in form or substance, of an existing computer data or program
communication
Refers to the transmission of information through ICT media, including voice, video and other forms of data
computer
Reverse to an electronic, magnetic, optical, electro chemical, or other data processing, capable of performing logical, arithmetic, routing, or storage functions.
Computer data
Refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system.
Computer program
refers to a set of instructions executed by the computer to achieve intended results
Computer system
refers to any device or group of interconnected or related devices pursuant to a program, perform automated processing of data.
cyber
Refers to a computer or a computer network, the electronic medium in which online communication takes place.
critical infrastructure
refers to the computer systems, and/or networks, whether physical or virtual, and/or the computer programs, computer data and/or traffic data so vital to this country that the incapacity or destruction of or interference with such system and assets would have a debilitating impact on security, national or economic security, national public health and safety, or any combination of those matters.
Cybersecurity
refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.
Database
refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
Interception
refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
Subscriber’s information
refers to any information contained in the form of computer data or any other form that is held by a service provider, relating to subscribers of its services other than traffic or content data and by which identity can be established
Traffic data
refers to any computer data other than the content of the communication including, but not limited to, the communication’s origin, destination, route, time, date, size, duration, or type of underlying service.
Illegal Access
The access to the whole or any part of a computer system without right.
Illegal Interception
The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
Data Interference
The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
System Interference
The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses.
Cyber-squatting
The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same
Cybersex
The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.
Unsolicited Commercial Communications
The transmission of commercial electronic communication with the use of computer system which seek to advertise, sell, or offer for sale products and services are prohibited
Libel
The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future.