Cybercrime Law Flashcards

(52 cards)

1
Q

Global domain of information systems that include the internet, telecommunications networks, computer systems, etc.

A

Cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Practice of defending devices and data from malicious attacks; a shared responsibility between society and individuals

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Criminal activities that involve computers, networks, or both at the same time (e.g. viruses and malware)

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

T or F: The primary effect of cybercrime is FINANCIAL

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What organization defines cybercrime as a wide range of malicious activities that compromise network integrity and availability, and copyright infringements

A

Council of Europe Convention on Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What organization defines cybercrime as a wide range of malicious activities that compromise network integrity and availability, and copyright infringements

A

Council of Europe Convention on Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3 Categories of Cybercrime

A
  • computing device as the TARGET
  • computing device as a WEAPON
  • computing device as an ACCESSORY TO CRIME
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Type of cybercrime that wants to gain network access

A

Computing device as the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Type of cybercrime that launches a denial of service attack (shuts down a machine or network)

A

Computer is used as a weapon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Type of cybercrime that stores illegal data in a computer

A

Computer is used as an accessory to crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The 3 Pillars of Cybersecurity

A
  • People
  • Process
  • Data and Information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 Types of Data Sources

A
  • Information Technology
  • Operational Data
  • Personal Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The CIA Triad

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Refers to when data is only available to authorized parties

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Refers to when data is not tampered and unadulterated

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Refers to data accessibility to authorized users

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

UNODC stands for?

A

United Nations Office on Drugs and Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

→ intentional input, alteration, deletion, or suppression of computer data resulting in illegitimate data with the intent to pass it off as authentic
→ e.g. impersonation for fraudulent purposes

A

Fraud or Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

→ criminal unlawfully assumes the identity of the victim and the information related to it for illicit purposes
→ can be bank, email, and/or card fraud

A

Identity Offenses and Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Scammed practice of misdirecting users to a fraudulent website

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

→ can be literary, artistic, and/or technological-based works (books, music, film, software, patents, logos, inventions, etc.)

A

Copyright or Trademark Offenses

22
Q

→ harassment, bullying, threatening, stalking, or to cause fear or intimidation
→ e.g. cyberstalking, cyber harassment, or cyberbullying

A

Personal Harm

23
Q

→ process of fostering rapport and trust through the development of an emotional relationship with the victim
→ manipulates the victim using a variety of power and control tactics: gifts, isolation, intimidation, threats, etc.

A

Grooming of Children

24
Q

RA 10175

A

Cybercrime Prevention Act of 2012

25
RA 10175 Chapter 2
Punishable Acts
26
RA 10175 Section 4
Cybercrime Offenses
27
Refers to the plan to profit from the company for just registering to the domain name
Cyber Squatting
28
RA 10175 Chapter 3
Penalties
29
RA 10175 Section 8
Penalties
30
Maximum imprisonment sentence for cybercrimes
14 years
31
Maximum fine for individuals involved in cybercrimes
1 million pesos
32
Maximum fine for corporations involved in cybercrimes
10 million pesos
33
RA 10175 Chapter 4
Enforcement and Implementation
34
RA 10175 Section 10
Law Enforcement; under the NBI and PNP
35
RA 10175 Sections 12 to 17
Collection, Preservation, Storage, Disclosure, Seizure, Custody, and Destruction of Data
36
RA 10175 Chapter 6
Competent Authorities
37
RA 10175 Section 23
Department of Justice (DOJ) - focal agency in implementing law enforcement investigation to curb cybercrime offenses nationwide
38
RA 10175 Section 24
Cybercrime Investigation and Coordination Center (CICC) - responsible for all functions related to cybersecurity
39
CERT stands for?
Computer Emergency Response Team
40
→ targets are contacted by email or by text message to trick them into providing sensitive data → can result to identity theft and financial loss
Phishing
41
What is the safest file type to click on?
.txt file
42
SSL stands for?
Security Socket Layer; certificates beginning with "https"
43
→ confidential information has been accessed by unauthorized people in an illegitimate fashion → may involve personal health info (PHI), personally identifiable info (PII), and trade secrets or intellectual property
Data Breach
44
Taking something without permission during a data breach
Exfiltration
45
Holes in a network where malicious entities may enter
Rogue Peers
46
Software capable of fixing pieces of programming designed to resolve functionality issues
Patches
47
Most popular browser but has many hidden agendas for data gathering
Google Chrome
48
A closed-source browser (has hidden agendas)
Microsoft Internet Explorer/Edge
49
Not the best browser for privacy, but can be customized and hardened (standard, strict, or custom)
Firefox
50
Good browser option for anyone wanting a browser that supports Chrome extensions for Windows, Mac, OS, and Linux (none for iOS and Android)
Iridium Browser
51
Browser that is a work of Firefox from the GNU free software project
GNU IceCat Browser
52
Browser that is the hardened version of Firefox
Tor Browser