Cybercrime Law Flashcards

1
Q

Global domain of information systems that include the internet, telecommunications networks, computer systems, etc.

A

Cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Practice of defending devices and data from malicious attacks; a shared responsibility between society and individuals

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Criminal activities that involve computers, networks, or both at the same time (e.g. viruses and malware)

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

T or F: The primary effect of cybercrime is FINANCIAL

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What organization defines cybercrime as a wide range of malicious activities that compromise network integrity and availability, and copyright infringements

A

Council of Europe Convention on Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What organization defines cybercrime as a wide range of malicious activities that compromise network integrity and availability, and copyright infringements

A

Council of Europe Convention on Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3 Categories of Cybercrime

A
  • computing device as the TARGET
  • computing device as a WEAPON
  • computing device as an ACCESSORY TO CRIME
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Type of cybercrime that wants to gain network access

A

Computing device as the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Type of cybercrime that launches a denial of service attack (shuts down a machine or network)

A

Computer is used as a weapon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Type of cybercrime that stores illegal data in a computer

A

Computer is used as an accessory to crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The 3 Pillars of Cybersecurity

A
  • People
  • Process
  • Data and Information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 Types of Data Sources

A
  • Information Technology
  • Operational Data
  • Personal Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The CIA Triad

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Refers to when data is only available to authorized parties

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Refers to when data is not tampered and unadulterated

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Refers to data accessibility to authorized users

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

UNODC stands for?

A

United Nations Office on Drugs and Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

→ intentional input, alteration, deletion, or suppression of computer data resulting in illegitimate data with the intent to pass it off as authentic
→ e.g. impersonation for fraudulent purposes

A

Fraud or Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

→ criminal unlawfully assumes the identity of the victim and the information related to it for illicit purposes
→ can be bank, email, and/or card fraud

A

Identity Offenses and Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Scammed practice of misdirecting users to a fraudulent website

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

→ can be literary, artistic, and/or technological-based works (books, music, film, software, patents, logos, inventions, etc.)

A

Copyright or Trademark Offenses

22
Q

→ harassment, bullying, threatening, stalking, or to cause fear or intimidation
→ e.g. cyberstalking, cyber harassment, or cyberbullying

A

Personal Harm

23
Q

→ process of fostering rapport and trust through the development of an emotional relationship with the victim
→ manipulates the victim using a variety of power and control tactics: gifts, isolation, intimidation, threats, etc.

A

Grooming of Children

24
Q

RA 10175

A

Cybercrime Prevention Act of 2012

25
Q

RA 10175 Chapter 2

A

Punishable Acts

26
Q

RA 10175 Section 4

A

Cybercrime Offenses

27
Q

Refers to the plan to profit from the company for just registering to the domain name

A

Cyber Squatting

28
Q

RA 10175 Chapter 3

A

Penalties

29
Q

RA 10175 Section 8

A

Penalties

30
Q

Maximum imprisonment sentence for cybercrimes

A

14 years

31
Q

Maximum fine for individuals involved in cybercrimes

A

1 million pesos

32
Q

Maximum fine for corporations involved in cybercrimes

A

10 million pesos

33
Q

RA 10175 Chapter 4

A

Enforcement and Implementation

34
Q

RA 10175 Section 10

A

Law Enforcement; under the NBI and PNP

35
Q

RA 10175 Sections 12 to 17

A

Collection, Preservation, Storage, Disclosure, Seizure, Custody, and Destruction of Data

36
Q

RA 10175 Chapter 6

A

Competent Authorities

37
Q

RA 10175 Section 23

A

Department of Justice (DOJ) - focal agency in implementing law enforcement investigation to curb cybercrime offenses nationwide

38
Q

RA 10175 Section 24

A

Cybercrime Investigation and Coordination Center (CICC) - responsible for all functions related to cybersecurity

39
Q

CERT stands for?

A

Computer Emergency Response Team

40
Q

→ targets are contacted by email or by text message to trick them into providing sensitive data
→ can result to identity theft and financial loss

A

Phishing

41
Q

What is the safest file type to click on?

A

.txt file

42
Q

SSL stands for?

A

Security Socket Layer; certificates beginning with “https”

43
Q

→ confidential information has been accessed by unauthorized people in an illegitimate fashion
→ may involve personal health info (PHI), personally identifiable info (PII), and trade secrets or intellectual property

A

Data Breach

44
Q

Taking something without permission during a data breach

A

Exfiltration

45
Q

Holes in a network where malicious entities may enter

A

Rogue Peers

46
Q

Software capable of fixing pieces of programming designed to resolve functionality issues

A

Patches

47
Q

Most popular browser but has many hidden agendas for data gathering

A

Google Chrome

48
Q

A closed-source browser (has hidden agendas)

A

Microsoft Internet Explorer/Edge

49
Q

Not the best browser for privacy, but can be customized and hardened (standard, strict, or custom)

A

Firefox

50
Q

Good browser option for anyone wanting a browser that supports Chrome extensions for Windows, Mac, OS, and Linux (none for iOS and Android)

A

Iridium Browser

51
Q

Browser that is a work of Firefox from the GNU free software project

A

GNU IceCat Browser

52
Q

Browser that is the hardened version of Firefox

A

Tor Browser