MIL QUARTER 2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards
  • Email and internet fraud.​

  • Identity fraud

  • Theft of financial

  • Theft and sale of corporate data.​

  • Cyberextortion

  • Ransomware attacks

  • Cryptojacking 

  • Cyberespionage

  • Interfering with systems in a way that compromises a network.​

  • Infringing copyright.​

  • Illegal gambling.​

  • Selling illegal items online.​

  • Soliciting, producing, or possessing child pornography.

TYPES OF CYBERCRIME

2
New cards
  • Criminal activity targeting computers using viruses and other types of malware.​

  • Criminal activity using computers to commit other crimes.

Cybercrime involves one or both of the following:

3
New cards

Malware attacks, Phishing, Distributed DoS attacks

EXAMPLES OF CYBERCRIME

4
New cards

Malware Attacks

 is where a computer system or network is infected with a computer virus or other type of malware.

5
New cards

Phishing

is when spam emails, or other forms of communication, are sent with the intention of tricking recipients into doing something that undermines their security.

6
New cards

Distributed DoS attacks

are a type of cybercrime attack that cybercriminals use to bring down a system or network. Sometimes connected IoT (Internet of Things) devices are used to launch DDoS attacks.

7
New cards

Republic Act 10173 – Data Privacy Act of 2012​Republic Act 10175 – Cybercrime Prevention Act 2012​​

Republic Act 10627 – Anti-Bullying Act of 2013​DepEd Order no. 40, s. 2012 - Child Protection Policy

LEGAL REFERENCES

8
New cards

The Ghost Writer

The writer turns in another’s work, word-for-word, as his or her own. ​

9
New cards

The Photocopy

  • The writer copies significant portions of text straight from a single source, without alteration. ​

10
New cards

The Potluck Paper

The writer copies fromseveral different sources,tweaking the sentencesto make them fittogether while retainingmost of the originalphrasing. ​

11
New cards

The Poor Disguise

  • The writer has alteredthe paper’sappearance slightlyby changing keywords and phrases. ​

12
New cards

The Labor of Laziness

  • The writer takes thetime to paraphrase mostof the paper from othersources and make it allfit together. ​

13
New cards

The Self-Stealer

  • The writer“borrows”generously from hisor her previouswork.

14
New cards

The Forgotten Footnote

  • The writer mentions anauthor’s name for asource, but neglects toinclude specificinformation on thelocation of the materialreferenced.​

15
New cards

The Misinformerer

  • The writer providesinaccurate informationregarding the sources,making it impossible tofind them. ​

16
New cards

The Too-Perfect Paraphrase

  • The writer properly citesa source, but neglects toput in quotation markson text that has beencopied word-for-word, orclose to it. ​

17
New cards

The Resourceful Citer

  • The writer properly cites allsources, paraphrasing andusing quotationsappropriately. The catch?The paper contains almostno original work!​

18
New cards

The Perfect Crime

The writer properlyquotes and cites sourcesin some places but goeson to paraphrase otherarguments from thosesources without citation.