FINALS Flashcards

1
Q

involves any person with intent to lower down the dignity of the person by hacking his mail account and sending some mails with using vulgar languages to unknown persons mail account.

A

Cyber Defamation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

any inaccurately or injuriously written defamation triggered via electronic means, including the Internet, social media, email and websites.

  • creates instant and irrevocable reputation damage
A

Cyber Libel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Repeated, unsolicited, threatening behaviour by a person or group using mobile or Internet technology with the intent to bother, terrify, intimidate, humiliate, threaten, harass or stalk someone else

-The harassment can take place in any electronic environment where communication with others is possible such as on social networking sites, on message boards, in chat rooms or through email. Just posting a general opinion on a discussion board or in a forum is not considered harassment.

  • Various kinds of harassment do occur in cyberspace. Harassment can be sexual, racial, religious, etc.
A

Cyber Harassment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technologically based “attack” on one person who has been targeted specifically for the reasons of anger, revenge, control, flirting or love obsession, impersonating profile.

A

Cyber Stalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

exists when persons, usually minors, use the internet, cell phones, or other technological devices to send or post text or images intended to hurt, embarrass, threaten, torment, humiliate, or intimidate their victim

A

Cyber Bullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The insults, comments or images can be preserved by the person who has bullied or by others so that the victim may read or view them over and over again and the harm is re-inflicted with each reading or viewing.

A

Permanence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The size of the audience that is able to view or access the damaging material increases the victims humiliation.

A

Audience size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

harmful messages can reach large audiences also plays a major part in making cyber bullying so damaging to the targets.

A

Speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

deliberately excluding someone from an online group

A

Exclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

repeatedly posting or sending offensive, rude, and insulting messages or post

A

Harassment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

posting or sending unwanted or intimidating messages which may include threats.

A
  1. Cyber stalking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

tricking someone into revealing secrets or embarrassing information which is then shared online.

A

Trickery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

remarks on the internet threatening or implying violent behavior displaying suicidal tendencies.

A
  1. Cyber Threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

creations of the mind used in commerce (inventions, literary and artistic works, designs, symbols)

A

Intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

rights that creators have over their literary and artistic works

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a legal document that gives the inventor the right to prevent others from making, using, selling, or importing

A

Patent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

any confidential business information which provides an enterprise a competitive edge and is kept secret

A

Trade Secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a sign capable of distinguishing the goods or services of one enterprise from those of other enterprises

A

Trademarks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

the act of illegally using, copying or distributing software without ownership or legal rights or could also be the act of installing and using commercial software without paying for the program

A

Software Piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Main Types of Software Piracy:

A
  1. Counterfeiting
  2. Internet Piracy
  3. End User Piracy/Consumer Piracy
  4. Client-Server Overuse
  5. Hard-disk Loading
  6. Film Piracy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • illegal duplication, distribution and/or sale of copyrighted material with the intent of imitating the copyrighted product
A

Counterfeiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  • unauthorized copying, distribution, or downloading of copyrighted materials from the internet
A

Internet Piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  • occurs when an individual reproduces copies of software without authorization. Using one licensed copy to install a program on multiple computers:
  • act of individuals illegally obtaining and using copyrighted materials for personal use
  • includes using cracked versions of software
A

End User Piracy/Consumer Piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

too many users (> than allowed by the license) on a network are using a central copy of a program at the same time

A

Client-Server Overuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

occurs when a business sells new computers with illegal copies of software loaded onto the hard disks to make the purchase of the machines more attractive.

A

Hard-disk Loading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

illegal copying and distribution of movies in print, videos, DVDs or electronic files

A

Film Piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

takes place when a film is produced in the form of a videocassette without proper authorization from the rights holder i.e. the producer

A

Video Piracy

28
Q

unauthorized transmission of films through cable network

A

Cable Piracy

29
Q

usually happens in the international markets.

A

DVD/CD piracy

30
Q

The scammer, disguised as an interested buyer or renter, agrees with the seller or landlord on a specific price. At this point, the scammer backs out of the deal and ask for a full refund. After sending the scammer the amount refunded, the seller or landlord finds out that the check was a counterfeit. Not only has the individual lost the money he or she forwarded to the scammer but also, has to pay the bank the same amount because the check was a counterfeit.

A

Online Rental and Real Estate Scams.

31
Q

User browsing the Internet may receive pop-up security warnings falsely informing them that their computer has been infected with numerous computer viruses. This type of scam is known as scareware and the goal is to persuade the user to buy fake software and/or to download malicious software on the user’s computer.NEW CRIMES,

A

Virus Protection Scams

32
Q

This involves stealing small amounts of assets from a large number of sources without noticeably reducing the whole.
Example: In the “round down” fraud, the processing of bank interest calculations is altered. Typically, interest calculations are rounded to the nearest cent and distributed among all accounts involved. The perpetrator modifies the program so that the remainder of all accounts rounded down are funneled to an account over which he or she has control. Supposedly such a technique is virtually undiscoverable, since customers would not notice the absence of fractions of a cent and auditors would not delve too deeply into such a program. Although the return is not great, this crime might accumulate a tidy profit over time

A

Salami Attack / Salami Slicing

33
Q

designed to reproduce itself through legitimate processes in computer programs and operating systems
- requires a host in order to replicate.

A

Viruses

34
Q
  • where they reproduce as widely as possible without being detected.
A

Infection phase

35
Q
  • where they attempt to carry out whatever damages they were designed to inflict
A

Attack phase

36
Q

occurred in the spring of 1999, wreaked havoc on computer systems across the world. This virus spread in Microsoft Word Documents sent via e-mails.

  • by David Smith - named after a stripper
A

The Melissa virus

37
Q

comes in an e-mail note with “I LOVE YOU” in the subject line and contains an attachment that, when opened, results in the message being re- sent to everyone in the recipient’s Microsoft Outlook address book and, perhaps more seriously, the loss of every JPEG, MP3, and certain other files on the recipient’s hard disk. On May 4, 2000, the virus spread so quickly that e-mail had to be shut down in a number of major enterprises such as the Ford Motor Company. The virus reached an estimated 45 million users in a single day. The virus was created by a Filipino, Onel De Guzman. It is also called lovebug worm and the love letter virus

A

I Love You Virus

38
Q
  • a self-replicating computer program that penetrates an operating system with the intent of spreading malicious code
  • utilize networks to send copies of the original code to other computers, causing harm by consuming bandwidth or possibly deleting files or sending documents via email and install backdoors on computers.
A

Worm

39
Q

-is a malicious computer worm believed to be a jointly built American-Israeli cyber weapon

  • allow the automation of electromechanical processes such as those used to control machinery on factory assembly lines, amusement rides, or centrifuges for separating nuclear material
A

Stuxnet

40
Q
  • One of the most damaging email worms ever released in 2004 and is primarily transmitted through e-mail, appearing as a transmission error, with subject lines including “Error”, “Mail Delivery System”, “Test” or “Mail Transaction Failed” in different languages, including English and French. The mail contains an attachment that, if executed, resends the worm to e-mail addresses found in local files such as a user’s address book. It also copies itself to the “shared folder” of peer-to-peer file-sharing application.
A

My Doom/Novarg, Mimail.R and Shimgapi

41
Q

a “malicious, security-breaking program that is disguised as something benign”. For example, you download what appears to be a movie or music file, but when you click on it, you unleash a dangerous program that erases your disk, sends your credit card numbers and passwords to a stranger, or lets that stranger hijack your computer to commit illegal denial of service attacks.

A

Trojan Horse

42
Q

A simple example of a Trojan horse would be a program named

A

waterfalls.scr”

43
Q

(also known as Zbot) is a Trojan horse made to infect Windows computers to carry out malicious and various criminal tasks. It is created to steal private data from the infected systems, such as system information, online credentials, and banking details.

A

Zeus

44
Q
  • a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner’s private information
  • When the desired software is installed, the spyware will piggyback on the installation and start collecting data from the user’s activities
A

SPYWARE

45
Q
  • Computer Hijacking occurs when an individual takes control over a computer(s), with malicious code known as “bot code”
  • allows for the remote control of computers that are infected by it without the knowledge of the computer user
A

BOTNETS

46
Q

This occurs when a perpetrator seeks to gain control over multiple computers and then uses these computers to launch an attack against a specific target or targets. Although system has high tolerance…massive traffic can slow processing…if it’s too much…system can crash.

A

Distributed Denial of Service (DOS)

47
Q

-refers to the prevention of unauthorized disclosure of information

-keeping information secret or private

-important for military, business or personal reasons

A

Confidentiality

48
Q

This refers to the accessibility and usefulness of information upon appropriate demand by an authorized user

A

Availability

49
Q

The State recognizes the vital role of information and communications industries such as content production, telecommunications, broadcasting electronic commerce, and data processing, in the nation’s overall social and economic development. The State also recognizes the importance of providing an environment conducive to the development, acceleration, and rational application and exploitation of information and communications technology (ICT) to attain free, easy, and intelligible access to exchange and/or delivery of information; and the need to protect and safeguard the integrity of computer, computer and communications systems, networks, and databases, and the confidentiality, integrity, and availability of information and data stored therein, from all forms of misuse, abuse, and illegal access by making punishable under the law such conduct or conducts.

A

REPUBLIC ACT 10175 CYBERCRIME PREVENTION ACT OF 2012

50
Q

The access to the whole or any part of a computer system without right.

A

Illegal Access

51
Q

The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.

A

Illegal Interception

52
Q

The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.

A

Data Interference

53
Q

The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses.

A

System Interference

54
Q

The use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of:
A device, including a computer program, designed or adapted primarily for the purpose of committing any of the offenses under this Act; or
A computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed with intent that it be used for the purpose of committing any of the offenses under this Act.
The possession of an item referred to in paragraphs 5(i)(aa) or (bb) above with intent to use said devices for the purpose of committing any of the oaffenses under this section.

A

Misuse of Devices.

55
Q

The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same,

A

Cyber-squatting

56
Q

The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent: Provided, That if no damage has yet been caused, the penalty imposable shall be one (1) degree lower.

A

Computer-related Fraud

57
Q

The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right: Provided, That if no damage has yet been caused, the penalty imposable shall be one (1) degree lower.

A

Computer-related Identity Theft

58
Q

The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.

A

Cybersex

59
Q

The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system: Provided, That the penalty to be imposed shall be (1) one degree higher than that provided for in Republic Act No. 9775.

A

Child Pornography

60
Q

— The transmission of commercial electronic communication with the use of computer system which seek to advertise, sell, or offer for sale products and services are prohibited

A

Unsolicited Commercial Communications.

61
Q

or any other similar means which may be devised in the future.

A

Libel

62
Q

Law enforcement authorities, upon securing a court warrant, shall issue an order requiring any person or service provider to disclose or submit subscriber’s information, traffic data or relevant data in his/its possession or control within _________ from receipt of the order in relation to a valid complaint officially docketed and assigned for investigation and the disclosure is necessary and relevant for the purpose of investigation.

A

seventy-two (72) hours

63
Q

All computer data, including content and traffic data, examined under a proper warrant shall, within __________ after the expiration of the period fixed therein, be deposited with the court in a sealed package, and shall be accompanied by an affidavit of the law enforcement authority executing it stating the dates and times covered by the examination, and the law enforcement authority who may access the deposit, among other relevant data.

A

forty-eight (48) hours

64
Q

Cybercrime Investigation and Coordinating Center. — There is hereby created, within ________ from the effectivity of this Act, an inter-agency body to be known as the Cybercrime Investigation and Coordinating Center (CICC), under the administrative supervision of the Office of the President, for policy coordination among concerned agencies and for the formulation and enforcement of the national cybersecurity plan.

A

thirty (30) days

65
Q

(i) The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible; or

	(ii) The act of knowingly using computer data which is the product of computer-related forgery as defined herein, for the purpose of perpetuating a fraudulent or dishonest design.
A

Computer-related Forgery.

66
Q

use bots to boost Web advertising billings by automatically clicking on Internet ads.

A

Fraudsters