CHAPTER 4 Flashcards

(60 cards)

1
Q

Mema lang: TITLE OF CHAPTER 4

A

INFORMATION,
CONTROL &
PRIVACY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It is a knowledge that you get about
someone or something.

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

considered relevant truths which have
been validated and identified.

A

Facts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information is Considered:

A

● Expandable
● Compressible
● Transportable
● Diffusive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

refers to data, facts, or knowledge that
holds significant worth, relevance, or
usefulness.

A

Valuable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ENUMERATE:

The few characteristics
of valuable information:

A

● Accurate
● Complete
● Economical
● Reliable
● Flexible
● Relevant
● Simple
● Timely
● Verifiable
● Accessible
● Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is the protection of computer systems
and information from harm, theft, and
unauthorized use.

A

Computer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is the process of
preventing and detecting unauthorized
use of your computer system.

A

Computer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computer Security protects computer systems and information from what? (3)

A

harm (1), theft (2), unauthorized use (3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ENUMERATE:

Types of Computer Security:

A
  1. Information Security
  2. Application Security
  3. Network Security
  4. Cybersecurity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What Type of Computer Security:

securing information
from unauthorized access, modification &
deletion

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What Type of Computer Security:

securing an application
by building security features to prevent from
Cyber Threats such as SQL injection, DoS
attacks, data breaches and etc.

A

Application Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What Type of Computer Security:

securing both the
software and hardware technologies

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What Type of Computer Security:

defined as protecting
computer systems, which communicate over
the computer networks

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is a model designed to guide policies for
information security within an
organization.

A

CIA TRIAD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The “CIA” in CIA TRIAD stands for:

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The CIA TRIAD:

ensuring that information is available
only to the intended audience.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The CIA TRIAD:

protecting information from being
modified by unauthorized parties.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The CIA TRIAD:

ensures that information and
systems are accessible and
operational when needed.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

are potential risks that have the capability
of disrupting the normal functioning of
computer systems.

They are on
the rise each day, especially with the
digitization of the world.

A

Computer Security Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ENUMERATE:

Types of Computer Security Threats:

A
  1. Viruses
  2. Computer Worm
  3. Phishing
  4. Botnet
  5. Rootkit
  6. Keylogger
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

a malicious program
which is loaded into the
user’s computer without
user’s knowledge.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

a software program that
can copy itself from one
computer to another,
without human interaction.

A

Computer Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Disguising as a trustworthy
person or business,
phishers attempt to steal
sensitive financial or
personal information
through fraudulent email
or instant messages.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
a group of computers connected to the internet, that have been compromised by a hacker using a computer virus.
Botnet
26
a computer program designed to provide continued privileged access to a computer while actively hiding its presence.
Rootkit
27
Also known as a keystroke logger, can track the real-time activity of a user on his computer.
Keylogger
28
any illegal act involving a computer.
computer crime
29
refers to online or internet based illegal acts.
cybercrime
30
A person that commits cybercrime
cybercriminal
31
Cybercriminals may also use software for their crimes, that kind of software is called what?
crimeware
32
It can be individuals, groups, or organizations that engage in illegal activities using computer networks or the internet.
Cybercrime Perpetrators
33
ENUMERATE: Common Types of Cybercrime Perpetrators:
1. Hackers 2. Malware Developers 3. Phishers 4. Scammers 5. Organized Crime Groups
34
individuals or groups who gain unauthorized access to computer systems or networks.
Hackers
35
These groups may engage in activities such as hacking, identity theft, credit card fraud, or selling illegal goods and services on the dark web. They often have sophisticated operations and networks spanning multiple countries.
Organized Crime Groups
36
create malicious software such as viruses, worms, trojans, ransomware, and spyware.
Malware Developers
37
individuals or groups who send deceptive emails or create fraudulent websites to trick users into providing sensitive information such as usernames, passwords, credit card details, or social security numbers.
Phishers
38
use various techniques such as email, phone calls, or fake websites to deceive individuals into providing money, personal information, or access to their computers.
Scammers
39
Tips for protecting yourself from cyberattacks: (Basahin or imemorize, your choice hehe)
● The first and most basic step in maintaining cybersecurity is to create a unique and original password for each account ● Keeping up with software updates is important, as cybercriminals often target known flaws in software to access a user’s system. ● Cybercriminals may comb through social media posts in search of information commonly used in security questions, such as a pet’s name or mother’s maiden name. ● A virtual private network (VPN) is a great way to protect sensitive data, especially when accessing a public Wi-Fi network. A VPN encrypts all information transmitted by your device and helps prevent many types of cyberattacks.
40
It is a legislation that governs intellectual property rights in the country.
The Intellectual Property Code of Philippines
41
What is the current Intellectual Property Code of the Philippines?
Republic Act No. 8293
42
Republic Act No. 8293 was enacted on _________
June 6, 1997
43
ENUMERATE: some key provisions of the Intellectual Property Code:
● Copyrights ● Patents ● Trademarks and Service Marks ● Industrial Designs ● Integrated Circuit Layout Designs ● Enforcement and Remedies
44
It is a legislation in the Philippines that governs the protection of personal information in both the government and private sectors.
Data Privacy Act of 2012
45
Data Privacy Act of 2012 is officially known as what?
Republic Act No. 10173
46
The Data Privacy Act of 2012 or also known as the Republic Act No. 10173 was signed into law on __________
August 15, 2012
47
aims to ensure the privacy of individuals' personal information while facilitating the free flow of information for innovation and economic growth.
Data Privacy Act of 2012 (Republic Act No. 10173)
48
is a legislation in the Philippines that addresses cybercrime and provides legal measures for its prevention, investigation, and prosecution.
Cybercrime Prevention Act of 2012
49
Cybercrime Prevention Act of 2012 is officially known as what?
Republic Act No. 10175
50
Cybercrime Prevention Act of 2012 was signed into law on __________
September 12, 2012
51
It aims to effectively combat cyber-related offenses and promote a safe and secure cyberspace.
Cybercrime Prevention Act of 2012 (Republic Act No. 10175)
52
is a legislation in the Philippines that provides a legal framework for electronic transactions, electronic documents, and electronic signatures.
Electronic Commerce Act of 2000
53
Electronic Commerce Act of 2000 is also called what?
Republic Act 8792 (it is the "eCommerce Law of the Philippines")
54
Electronic Commerce Act of 2000 (Republic Act 8792) was signed into law on ________
June 14, 2000
55
Its purpose is to facilitate and promote the use of electronic commerce in the country.
Electronic Commerce Act of 2000 (Republic Act 8792)
56
a legislation in the Philippines that addresses the regulation and control of the production, mastering, replication, importation, exportation, sale, rental, and distribution of optical media.
Optical Media Act of 2003
57
Optical Media Act of 2003 is also known as what?
Republic Act No. 9239
58
Optical Media Act of 2003 (Republic Act No. 9239) was signed into law on _______
March 19, 2004
59
Its primary objective is to combat piracy and protect intellectual property rights related to optical media formats such as CDs, DVDs, and Blu-ray discs.
Optical Media Act of 2003 (Republic Act No. 9239)
60
I miss you
Bili ako ulam