CHAPTER TWO: CYBERCRIME

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Polymophic virus

Changes its code each time an infected file is executed. It does this to evade antivirus programs.

Also known as Child Pornography.

Child Sexual Exploitation

Computer-related Forgery

The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible

Cyber Enabled Crimes

Traditional crimes which can be increased in scale or reach by the use of computers, computer networks or other forms of ICT.

Macro Virus

Written in the same macro language used for software applications. Such viruses spread when you open an infected document, often through email attachments

Computer Virus

is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another.

Hacking

refers to the unauthorized access into or interference in a computer system/server, or information and communication system.

Piracy

refers to the unauthorized copying, reproduction, dissemination, distribution, importation, use, removal, alteration, substitution, modification, storage, uploading, but not limited to, the internet, in a manner that infringes intellectual property rights

Cyber-assisted crime

Are crimes in which the use of computers is an incidental aspect of the commission of the crime but may afford evidence of the crimes.

Skimming

Copying or counterfeiting any credit card, payment card or debit card, and obtaining any information therein with the intent of accessing the account and operating the same whether or not cash is withdrawn or monetary injury is caused by a perpetrator against the account holder or the depositary bank.

RA 10175

Cybercrime Prevention Act of 2012 September 12, 2012

DICTM

Directorate for Information and Communications Technology Management

The Republic Act No. 8792 also known as

Electronic Commerce Act

ICT

Information and Communications Technology

Libel

Is public and malicious imputation of a crime, or of a vice or defect, real or imaginary, or any act, omission, condition, status, or circumstance tending to cause the dishonor, discredit, or contempt of a natural or juridical person, or to blacken the memory of one who is dead.

Child Trafficking

It is the act of trading and dealing with children including, but not limited to, the act of buying and selling of a child for money, or for any other consideration, or barter.

Unauthorized Disclosure

It pertains to any personal information controller or personal information processor or any of its officials, employees or agents, who discloses to a third party personal information not covered by the immediately preceding section without the consent of the data subject.

ICT

It refers to the totality of the electronic means employed to systematically collect, process, store, present and share information to end-users in support of their activities

Information and Communication System

Refers to a system for generating, sending, receiving, storing or otherwise processing electronic data messages or electronic documents and includes the computer system or other similar device by or in which data is recorded or stored and any procedures related to the recording or storage of electronic data message or electronic document.

Card Skimming

Refers to a type of fraud which involves illegal copying of information from the magnetic stripe of a payment card to gain access to customer accounts.

Access Device Fraudulently Applied

Refers to any access device that was applied for or issued on account of the use of falsified documents, false information, fictitious identities and addresses, or any form of false pretense or misrepresentation.

Access Device

Refers to any card, plate, code, account number, electronic serial number, personal identification number, or other telecommunications service, equipment, or instrumental identifier, or other means of account access that can be used to obtain money, good, services, or any other thing of value or to initiate a transfer of funds.

Computer System

Refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data

Computer Data

Refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system including a program suitable to cause a computer system to perform a function and includes electronic documents and/or electronic data messages whether stored in local computer systems or online (RA 10175, 2012, Section 3

Photo or video voyeurism

Refers to the act of taking photo or video coverage of a person or group of persons performing sexual act or any similar activity or of capturing an image of the private area of a person or persons without the latter's consent.

Access

Refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network (RA 10175, 2012, Section 3).

Alteration

Refers to the modification or change, in form or substance, of an existing computer data or program.

Cybercrime

Refers to the use of a computer as an instrument to further illegal ends.

Hacking or cracking

Refers to unauthorized access into or interference in a computer system/server or information and communication system.

System Interference

The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority.

Misuse of Device

The use, production, sale, procurement, importation, distribution, or otherwise making available, without right.

Cyber Dependent Crimes

These are crimes that can only be committed through computers, computer networks, or other forms of ICT

Cyber-Trespass

These crimes involve crossing or violating the boundaries of other people digitally. For example, hacking data without consent.

File Infector Virus

This common virus inserts malicious code into executable files or files used to perform certain functions or operation on a system.

Cyber Deception and Theft

This involves offenses such as online fraud and IP theft.

Cyber Porn and Obscenity

This involves the exploitation of children and distribution of porn materials through the internet.

Resident Virus

This is a general term for any virus that inserts itself in a computer system's memory.

Computer-related Identity Theft

This is the intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right.

Multipartite Virus

This kind of virus infects and spreads in multiple ways. It can infect both program files and system sector.

Malicious Disclosure

This refers to any personal information controller or personal information processor or any of its officials, employees or agents, who, with malice or in bad faith, discloses unwarranted or false information relative to any personal information or personal sensitive information obtained by him or her.

Child Sexual Exploitation

This refers to any representation, whether visual, audio, or written combination thereof, by electronic, mechanical, digital, optical, magnetic or any other means, of child engaged or involved in real or simulated explicit sexual activities.

Illegal Access

This refers to the access to the whole or any part of a computer system without right (RA 10175, 2012, Section 4).

Cybersquatting

This refers to the acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same.

Obscene Publications and Indecent Shows

This refers to the acts of hiring, employing, using, persuading, inducing or coercing a child to perform in obscene exhibitions and indecent shows, whether live or in video, or model in obscene publications or pornographic materials or to sell or distribute the said materials.

Data Interference

This refers to the intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses (RA 10175, 2012, Section 4).

Illegal Interception

This refers to the interception made by technical means without the right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data (RA 10175, 2012, Section 4).

Cyber-Violence

This refers to the kind of emotional violence that can be enacted online such as bullying or harassment

Unsolicited Commercial Communication

This refers to the transmission of commercial electronic communication with the use of computer system which seek to advertise, sell, or offer for sale products and services

Computer-related Fraud

This refers to the unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.

Cybersex

This refers to the willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.

Browser Hijacker

This type of virus "hijacks" certain web browser functions, and you may be automatically directed to an unintended website.

Boot Sector Virus

This type of virus can take control when you start -or boot- your computer. One way it can spread is by plugging an infected USB drive into your computer.

Direct Action Virus

This type of virus comes into action when you execute a file containing a virus. Otherwise, it remains dormant.

Web Scripting Virus

This type of virus exploits the code of web browsers and web pages. If you access such a web page, the virus can infect your computer.


Ensembles d'études connexes

Solving Trigonometric Equations Quiz

View Set

Chapter 3 - External Analysis: Industry Structure

View Set

Physics Chapter 3 Force and Motion & Chapter 4 Work and Energy

View Set

Chapter exam 1 & 2 life policies & provision

View Set

AP Computer Science: Worksheet Overviews

View Set

Chapter 23: Conditions Occurring After Birth

View Set

Chapter 7: Voting, Elections, and Political Participation

View Set