Cyber Flashcards

(31 cards)

1
Q

____ short for “cybernetics,” refers to the interconnected world of computers, networks, and digital systems.

A

Cyber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It encompasses everything related to the internet, software, hardware, and data.

A

Cyber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ involves criminal activities carried out in the digital realm.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of cybercrime include

A
  1. Hacking
  2. Online Fraud
  3. Identity Theft
  4. Distributing Malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Cybercrime

A
  1. Financial Cybercrimes
  2. Identity Theft
  3. Cyberbullying
  4. Hacking and Data Breaches
  5. Online Fraud
  6. Distributed Denial of Service Attacks (DDoS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of Cybercrimes

Illicit activities targeting financial assets or information for monetary gain.

A

Financial Cybercrimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of Cybercrimes

Examples of Financial Cybercrimes

A
  1. Credit card fraud
  2. Online banking scams
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of Cybercrims

Unauthorized acquisition and use of personal information for fraudulent activities or impersonation.

A

Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of Cybercrimes

Harassment, threats, or intimidation through digital communication tools, often causing emotional distress.

A

Cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of Cybercrimes

Unauthorized access to computer systems or networks, leading to data theft or disruption of operations.

A

Hacking and Data Breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of Cybercrimes

Deceptive practices online to defraud individuals or organizations for financial gain, includung phishing and fake online marketplaces.

A

Online fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of Cybercrimes

Overwhelming target services with excessive traffic, rendering them unavailable, often for malicious purposes.

A

Distributed Denial of Service (DDoS) Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Impact of Cybercrime

Cybercrime can have far-reaching consequences

FDLEN

A
  1. Financial Loss
  2. Damage to Reputation
  3. Legal Consequences
  4. Emotional Distress
  5. National Security Threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ are individuals or groups responsible for carrying out cybercrimes. They exploit vulnerabilities in digital systems for personal gain.

A

Cybercriminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of Cybercriminals

Four main categories of cybercriminals

A
  1. Hacktivists
  2. Cyberterrorists
  3. Script Kiddies
  4. Organized Crime
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Types of Cybercriminals

Motivated by social or poilitical causes

17
Q

Types of Cybercriminals

Intend to cause fear and disruption

A

Cyberterrorists

18
Q

Types of Cybercriminals

Amateur hackers driven by curiosity

A

Script Kiddies

19
Q

Types of Cybercriminals

Seek financial gain through cybercrimes

A

Organized Crime

20
Q

A 27-year-old Algerian computer science graduate who was sentenced in a US court for using a computer virus to steal money from more than 200 American banks and financial institutions. He then reportedly gave millions of dollars to Palestinian charities.

A

Hamza Bendelladj

21
Q

A virus also known as the ____, was a malicious computer worm that spread globally in May 2000 via email.

A

I Love You Virus or Love Bug

22
Q

Motivations of Cybercriminals

Cybercriminals are motivated by various factors, including:

FIPRC

A
  1. Financial Gain
  2. Ideological beliefs
  3. Personal Satisfaction
  4. Revenge
  5. Challenge and curiosity
23
Q

Profile of a Cybercriminal

A typical cybercriminal may have the following characteristics:

TAARE

A
  1. Tech-savvy
  2. Anonymity-seeking
  3. Adaptable
  4. Resourceful
  5. Evolves with technology
24
Q

Measures protecting against cybercrime.

A

Cybersecurity

25
Cybersecurity measures include | SRAFE
1. Strong passwords 2. REgular software updates 3. Antivirus software 4. Firewalls 5. Employee Training
26
A law in the Philippines that was enacted to address issues related to cybercrimes and internet-related offenses. It was signed into law on September 12, 2012, and it became effective on October 3, 2012.
Republic Act No. 10175, Cybercrime Prevention Act of 2012
27
Key Provisions of RA 10175
* **Defines** and classifies cyber crimes such as hacking, identity theft, and online fraud. * Emphasizes the **protection of computer data and systems**. * Includes provisions on **online libel**, which has sparked debates on freedom of speech. * Mandates the creation of a **National Cybersecurity Plan** for enhanced online security.
28
Importance of RA 10175
Provides legal framework to prosecute cybercriminals and protect individuals and organizations online.
29
A Philippine law that was enacted to protect the personal information and data privacy of individuals.
Republic Act No. 10173, Data Privacy Act of 2012
30
Key Provisions of RA 10173
* Data subject rights * Consent for data collection * Data security measures * Restrictions on international data transfers * Data breach reporting * Penalties for non-compliance.
31
Enforces data privacy regulations and ensures compliance with the law
National Privacy Commission (NPC)