cybercrimes and its law

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/45

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

46 Terms

1
New cards

Cybercrime

Refers to any criminal activity that involves computers, networks or digital devices. It includes crimes committed through the Internet or targeting computer systems.

2
New cards

Cyber dependent crimes and cyber enabled crimes

Two major categories of cybercrime

3
New cards

Cyber-dependent crimes

This describes can only happen using computers or network, such as hacking and unauthorized access, malware, attacks, and ransomware, denial of service attacks.

4
New cards

cyber enabled crimes

Traditional crimes that are made easier or more dangerous using technology.

  • Online fraud, scams, and identity theft

  • Cyber bullying and online harassment

  • Human trafficking and child exploitation online

5
New cards

Phishing

Fake emails or messages to steal personal info.

6
New cards

Identity theft

Using someone’s personal info without permission

7
New cards

Ransomware

Locking files and demanding payment

8
New cards

Cyberbullying

Harassing or threatening others online

9
New cards

Hacking

getting unauthorized access to systems

10
New cards

financial gain

Stealing money, credit card info, or selling data

11
New cards

political or ideological

Hactivism, cyberwarfare

12
New cards

personal satisfaction

Curiosity, revenge, challenge

13
New cards

organized crime

Professional groups conducting fraud or data theft

14
New cards

Financial loss, reputation damage, emotional stress, national security threats

impacts of cybercrime

15
New cards

financial loss

Millions lost to scams and frauds

16
New cards

reputation damage

Personal data leaks harm individuals and businesses

17
New cards

emotional stress

Victims of cyber bullying or identity theft suffer software

18
New cards

national security threats

Attacks on government networks

19
New cards

think before you click or share

Prevents phishing, scams, and the spread of malware

20
New cards

Respect others’ privacy

Avoid identity theft and doxxing

21
New cards

Use polite, ethical communication

reduces cyber bullying, and online harassment

22
New cards

Follow laws and rules of conduct

Keeps you from committing online offenses

23
New cards

be responsible with your digital footprint

Protects your reputation and data security

24
New cards

verify information before sharing

Prevents this information and digital manipulation

25
New cards

access

Refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network

26
New cards

alteration

Refers to the modification or change, in form or substance, of an existing computer data or program

27
New cards

communication

Refers to the transmission of information through ICT media, including voice, video and other forms of data

28
New cards

computer

Reverse to an electronic, magnetic, optical, electro chemical, or other data processing, capable of performing logical, arithmetic, routing, or storage functions.

29
New cards

Computer data

Refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system.

30
New cards

Computer program

refers to a set of instructions executed by the computer to achieve intended results

31
New cards

Computer system

refers to any device or group of interconnected or related devices pursuant to a program, perform automated processing of data.

32
New cards

cyber

Refers to a computer or a computer network, the electronic medium in which online communication takes place.

33
New cards

critical infrastructure

refers to the computer systems, and/or networks, whether physical or virtual, and/or the computer programs, computer data and/or traffic data so vital to this country that the incapacity or destruction of or interference with such system and assets would have a debilitating impact on security, national or economic security, national public health and safety, or any combination of those matters.

34
New cards

Cybersecurity

refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.

35
New cards

Database

refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.


36
New cards

Interception

refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.


37
New cards

Subscriber’s information

refers to any information contained in the form of computer data or any other form that is held by a service provider, relating to subscribers of its services other than traffic or content data and by which identity can be established

38
New cards

Traffic data

refers to any computer data other than the content of the communication including, but not limited to, the communication’s origin, destination, route, time, date, size, duration, or type of underlying service.

39
New cards

Illegal Access

The access to the whole or any part of a computer system without right.

40
New cards

Illegal Interception

The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.

41
New cards

Data Interference

The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.

42
New cards

System Interference

The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses.


43
New cards

Cyber-squatting

The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same

44
New cards

Cybersex

The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.

45
New cards

Unsolicited Commercial Communications

The transmission of commercial electronic communication with the use of computer system which seek to advertise, sell, or offer for sale products and services are prohibited

46
New cards

Libel

The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future.

Explore top flashcards

Medical terma quiz 4
Updated 409d ago
flashcards Flashcards (44)
Skull
Updated 5h ago
flashcards Flashcards (47)
Integrals
Updated 665d ago
flashcards Flashcards (41)
Ch13-14 Civics
Updated 1034d ago
flashcards Flashcards (45)
List 35
Updated 1098d ago
flashcards Flashcards (35)
Medical terma quiz 4
Updated 409d ago
flashcards Flashcards (44)
Skull
Updated 5h ago
flashcards Flashcards (47)
Integrals
Updated 665d ago
flashcards Flashcards (41)
Ch13-14 Civics
Updated 1034d ago
flashcards Flashcards (45)
List 35
Updated 1098d ago
flashcards Flashcards (35)