1/17
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Email and internet fraud.
Identity fraud
Theft of financial
Theft and sale of corporate data.
Cyberextortion
Ransomware attacks
Cryptojacking
Cyberespionage
Interfering with systems in a way that compromises a network.
Infringing copyright.
Illegal gambling.
Selling illegal items online.
Soliciting, producing, or possessing child pornography.
TYPES OF CYBERCRIME
Criminal activity targeting computers using viruses and other types of malware.
Criminal activity using computers to commit other crimes.
Cybercrime involves one or both of the following:
Malware attacks, Phishing, Distributed DoS attacks
EXAMPLES OF CYBERCRIME
Malware Attacks
is where a computer system or network is infected with a computer virus or other type of malware.
Phishing
is when spam emails, or other forms of communication, are sent with the intention of tricking recipients into doing something that undermines their security.
Distributed DoS attacks
are a type of cybercrime attack that cybercriminals use to bring down a system or network. Sometimes connected IoT (Internet of Things) devices are used to launch DDoS attacks.
Republic Act 10173 – Data Privacy Act of 2012Republic Act 10175 – Cybercrime Prevention Act 2012
Republic Act 10627 – Anti-Bullying Act of 2013DepEd Order no. 40, s. 2012 - Child Protection Policy
LEGAL REFERENCES
The Ghost Writer
The writer turns in another’s work, word-for-word, as his or her own.
The Photocopy
The writer copies significant portions of text straight from a single source, without alteration.
The Potluck Paper
The writer copies fromseveral different sources,tweaking the sentencesto make them fittogether while retainingmost of the originalphrasing.
The Poor Disguise
The writer has alteredthe paper’sappearance slightlyby changing keywords and phrases.
The Labor of Laziness
The writer takes thetime to paraphrase mostof the paper from othersources and make it allfit together.
The Self-Stealer
The writer“borrows”generously from hisor her previouswork.
The Forgotten Footnote
The writer mentions anauthor’s name for asource, but neglects toinclude specificinformation on thelocation of the materialreferenced.
The Misinformerer
The writer providesinaccurate informationregarding the sources,making it impossible tofind them.
The Too-Perfect Paraphrase
The writer properly citesa source, but neglects toput in quotation markson text that has beencopied word-for-word, orclose to it.
The Resourceful Citer
The writer properly cites allsources, paraphrasing andusing quotationsappropriately. The catch?The paper contains almostno original work!
The Perfect Crime
The writer properlyquotes and cites sourcesin some places but goeson to paraphrase otherarguments from thosesources without citation.