2 Flashcards
(142 cards)
provided the FOUR GENERAL TYPES OF CYBERCRIME:
BUDAPEST CONVENTION ON CYBER CRIME/ BUDAPEST CONVENTION
The BUDAPEST CONVENTION ON CYBER CRIME/ BUDAPEST CONVENTION held on
2001
FOUR GENERAL TYPES OF CYBERCRIME:
· OFFENSES AGAINST THE CONFIDENTIALITY, INTEGRITY AND AVAILABILITY OF COMPUTER DATA AND SYSTEMS,
· COMPUTER-RELATED OFFENSES
· CONTENT-RELATED OFFENSES
· COPYRIGHT-RELATED OFFENSES
–on the provisions of RA 10175, the online offenses or cybercrime offenses that will fall under this typology are the
ILLEGAL ACCESS, ILLEGAL INTERCEPTION, DATA INTERFERENCE, SYSTEM INTERFERENCE, AND MISUSE OF DEVICES
RA 8293
“INTELLECTUAL PROPERTY CODE”
–first international treaty
BUDAPEST CONVENTION ON CYBERCRIME
–held to seek or address cybercrime, to provide solution and measures in combating cybercrime
BUDAPEST CONVENTION ON CYBERCRIME
–during this convention, they crafted or created a guideline as a basis of every country in developing their national laws in terms of penalizing or combating cybercrime
BUDAPEST CONVENTION ON CYBERCRIME
–ito ang reason why na-enact ang RA 10175 kahit na meron ng RA 8792 since it only punishes limited online crimes
BUDAPEST CONVENTION ON CYBERCRIME
–nakapagdecided ang PH that they will enact another law which is RA 10175 to be compliant to this guidelines set by the convention
BUDAPEST CONVENTION ON CYBERCRIME
– is an international agreement depending on kung ano yung mga member countries involved in this convention
TREATY
–PH is involved and one of the state parties or countries na naging signatory on this convention
BUDAPEST CONVENTION ON CYBERCRIME
GENERAL CLASSIFICATIONS OF CYBERCRIME
- UNAUTHORIZED ACCESS
- HACKING
- CRACKING
- CYBER FRAUD
is when someone gains access to a website, program, server, service, or other system using someone else’s account.
UNAUTHORIZED ACCESS
using your friends fb account after they neglected or nakalimutan nila na ilog-out ito or pwede din na naiwan nung friend mo yung laptop niya na nakaopen yung fb niya dun then pinakelaman mo
UNAUTHORIZED ACCESS
PASSWORD GUESSING IS THE EXAMPLE
UNAUTHORIZED ACCESS
–it does not only include the attempt but also intrude or napasok or nagkaroon na siya ng access
HACKING
- Any attempt to intrude into a computer or a network without authorization.
HACKING
-This involves changing of system or security features in a bid to accomplish a goal that differs from the intended purpose of the system.
HACKING
- It can also refer to non-malicious activities, usually involving unusual or improvised alterations to equipment or processes.
HACKING
-An individual who involves themselves in hacking activities is known as a
HACKER.
– malicious software once installed it records everything you type or your keyboard strokes or it monitors everything you do on your computer
KEYLOGGER MALWARE
–gain through using other technique like gumamit ka ng KEYLOGGER MALWARE
HACKING
- is a malicious software where mal stands for malicious then ware is software
MALWARE