GEE5 Notes
GEE5 Notes
Cyberstalking is the use of electronic communication by a Trojan horse is not a virus. It is a destructive program that looks
person to follow a person or attempts to contact a person to like a genuine application. It gives malicious users/programs
foster personal interaction repeatedly despite a clear indication access to your system, allowing confidential and personal
of disinterest by such person; or monitors the internet, email or information to be theft.
any other form of electronic communication commits the offence
of stalking.
Worms, Virus, and Trojan Horse are threats for electronic 3. Data Interference - Unauthorized alteration, damaging,
payment system. deletion or deterioration of computer data, electronic document,
or electronic data message, and including the introduction or
transmission of viruses.
Data breach is an incident in which information is accessed 4. System Interference - Unauthorized hindering or
without authorization. 18. Denial of Services (DoS) attack interference with the functioning of a computer or computer
network by inputting, transmitting, damaging, deleting,
Denial of Services (DoS) attack is an attack intended for
deteriorating, altering or suppressing computer data or program,
denying access to computer resources without the permission
electronic document, or electronic data messages, and including
of the owner or any other person who is in charge of a computer,
the introduction or transmission of viruses.
computer system or computer network.
5. Misuse of Device - The unauthorized use, possession,
Website Defacement is an attack intended to change the visual
production, sale, procurement, importation, distribution, or
appearance of a website and/ or make it dysfunctional. The
otherwise making available, of devices, computer program
attacker may post indecent, hostile and obscene images,
designed or adapted for the purpose of committing any of the
messages, videos, etc.
offenses stated in Republic Act 10175.
Cyber-Squatting is an act of registering, trafficking in or using
6. Cyber-squatting - Acquisition of domain name over the
a domain name with an intent to profit from the goodwill of a
Internet in bad faith to profit, mislead, destroy reputation, and
trademark belonging to someone else.
deprive others from the registering the same.
Pharming is a cyber-attack aiming to redirect a website’s traffic
7. Computer-related Forgery - Unauthorized input, alteration,
to another, bogus website.
or deletion of computer data resulting to inauthentic data with
Cryptojacking is the unauthorized use of computing resources the intent that it be considered or acted upon for legal purposes
to mine cryptocurrencies. as if it were authentic, regardless whether the data is directly
readable and intelligible.
Online Drug Trafficking is a crime of selling, transporting, or
illegally importing unlawful controlled substances, such as 8. Computer-related Fraud - Unauthorized input, alteration, or
heroin, cocaine, marijuana, or other illegal drugs using electronic deletion of computer data or program or interference in the
means. functioning of a computer system, causing damage thereby with
fraudulent intent.
Espionage is the act or practice of obtaining data and
information without the permission and knowledge of the owner. 9. Computer-related Identity Theft - Unauthorized acquisition,
use, misuse, transfer, possession, alteration or deletion of
CYBERCRIME LAWS IN THE PHILIPPINES identifying information belonging to another, whether natural or
juridical.
The country has passed several laws to regulate e-commerce
and other online activities. 10. Cybersex - Willful engagement, maintenance, control, or
operation, directly or indirectly, of any lascivious exhibition of
Republic Act 8484 or the Access Devices Regulation Act of
sexual organs or sexual activity, with the aid of a computer
1998
system, for favor or consideration
• An act regulating the issuance and use of access devices,
prohibiting fraudulent acts committed relative thereto, 11. Child Pornography - Unlawful or prohibited acts defined
providing penalties and for other purposes and punishable by Republic Act No. 9775 or the Anti-Child
Pornography Act of 2009, committed through a computer
Republic Act 8792 or the Electronic Commerce Act of 2000 system.
• An Act Providing For The Recognition And Use of Electronic
Commercial And Non-Commercial Transactions, Penalties 12. Libel - A published false statement that is damaging to a
For Unlawful Use Thereof, And Other Purposes, also known person's reputation; a written defamation.
as the "Electronic Commerce Act."
13. Aiding or Abetting in the commission of cybercrime -
Any person who willfully abets or aids in the commission of any
Republic Act 10175 or The Cybercrime Prevention Act Of
of the offenses enumerated in this Act shall be held liable
2012.
• An Act Defining Cybercrime, Providing for The Prevention, 14. Attempt in the commission of cybercrime - Any person
Investigation, Suppression and The Imposition of Penalties who willfully attempts to commit any of the offenses enumerated
Therefor and For Other Purposes. in this Act shall be held liable.
• In Philippine law, the concept of privacy is enshrined in the KEY RIGHTS THAT SUMMARIZE THE DATA PRIVACY ACT
Constitution and is regarded as the right to be free from FOR THE PHILIPPINES
unwarranted exploitation of one’s person or from intrusion
into one’s private activities in such a way as to cause 1. The Right to be Informed
humiliation to a person’s ordinary sensibilities (Hing v. • The foundation for the Data Privacy law is consent.
Choachuy, 2013). Which means the willingness of data subjects to hand
• It has been described as the most comprehensive of rights over their data. Data can be accessed and used by
and the right most valued by civilized men (Morfe v. Mutuc, marketers so long as users give their permission to do
1968). so.
2. The Right to Object
Republic Act 10173 or Data Privacy Act of 2012 • At the opposite end of consent is the right of any person
to object to the collection and processing of their
• It is a law that seeks to protect all forms of information, be it personal data. While agreeing to the terms of use may
private, personal, or sensitive. It is meant to cover both be mandatory to use a service, data subjects have the
natural and juridical. It is an act protecting individual right to refuse to accept the terms at anytime.
personal information in information and communications 3. The Right to Access and Data Portability
systems in the government and the private sector, creating • Once someone has given you their consent to use their
for this purpose a national privacy commission, and for personal data, they also have the right to access it.
other purposes. These data subjects must have reasonable access to
• It was passed in accordance with the Philippines the data they have given. Access should be easy as
agreements under ASEAN Vision 2020 and at the urging of well as “data portable” meaning their personal data can
the growing business process outsourcing industry. The law be electronically stored and copied at anytime.
was modeled after the Data Protection Directive (95/46/EC) 4. The Right to Rectify
with many of its terminologies and provisions similar to • Access to their collected personal data entitles the data
privacy laws in other jurisdictions. subject to correct any mistakes or misrepresentation.
5. The Right to Erasure or Blocking
The National Privacy Commission (NPC) is in charge of
administering and implementing the DPA. It is also tasked to • Consent means permission but data subjects also have
monitor and ensure compliance of the Philippines with the right to withdraw their consent at anytime. This can
international standards for personal data protection. be addressed through unsubscription to email services
for example, or by directly emailing the company’s Data
The major functions of the NPC are as follows: Protection Officer.
6. The Right to Damages and to file a Complaint with the
• Rule making NPC
• Advisory. The NPC is the advisory body on matters related • At the extreme end of the spectrum, if damages are
to personal data protection. done to the data subject, he has the right to file for
• Public education. The NPC shall launch initiatives to damages as well as escalate matters with the National
educate the public about data privacy, data protection and Privacy Commission.
fair information rights and responsibilities.
• Compliance and monitoring. The body has compliance THREATS TO SECURITY AND PRIVACY
and monitoring functions to ensure personal information
controllers comply with the law. It is also tasked to manage Undetected intrusions on our privacy
the registration of personal data processing systems. • Identity thieves, hackers, unethical marketers, and other
• Complaints and investigations. nefarious actors usually attack in one of several ways.
• Enforcement. • One of the most effective methods to arm and protect
ourselves against these attacks is to become familiar with
Personal information refers to any information whether recorded these forms.
in a material form or not, from which the identity of an individual Data
is apparent or can be reasonably and directly ascertained by the • Data is valuable, which is one of the main reasons why your
entity holding the information, or when put together with other online privacy is at risk.
information would directly and certainly identify an individual.
• A hacker has struck gold if they can gain illegal access to
Personal data refers to all types of personal information. an airline's reservation system or an e-commerce site's
customer database.
Processing is any operation/s performed upon personal data. • Any information you post on the internet could be misused.
These operations include, but are not limited to the collection, As a result, you must exercise caution when it comes to
recording, organization, storage, updating or modification, your online privacy.
Digital data
• Transactional data, location data, electronic medical PROTECTING PRIVACY
records, e-commerce data, insurance data, images and Privacy policies or privacy codes
videos, thoughts and views, and other types of personal • The instructions for protecting the privacy of an
data are all examples of digital data. organization's customers, clients, and workers
• All of these data pieces are personal and sensitive • Senior management in many companies has realized
information that should not be shared without the data that when they collect large volumes of personal data,
owner's permission. they must secure it. Furthermore, many businesses
give their customers a say in how their information is
Privacy breaches can occur at several phases of data utilized by providing either opt-out or opt-in options.
processing (Ram, Murali, & Kumar, 2021).
Opt-in
Data breach • Opting-in means a user, acknowledging interest in a
• This can an happen at any point along the data product or service and authorizing a third party to contact
processing process, with different types of employees them with further information.
operating at different levels. • Subscribing to email and newsletter mailing lists, permitting
• Top-level management should ensure that no data cookie use, and consenting to legal terms are all examples
breaches occur at any point, necessitating the of circumstances when opting in is appropriate.
establishment of a policy and an ethical code of • When a user registers for an account, they have the
behavior for all firm personnel. opportunity to opt in to receiving emails as well as to agree
• Policies alone, however, are insufficient; a regulating to the terms of use and privacy policy. When users first
agency is required to ensure that the policies are arrive on this page, both boxes are unchecked, allowing
followed. them to take direct action to indicate their preferences.
• Individuals are also contributing to data leakage • It’s not only your privacy policy that you should ask users to
through irresponsible usage of social media and mobile opt in to. After you create terms and conditions, you should
devices. also host these on a banner or form, and request user
consent to agreement.
Threats to data security and privacy:
Data aggregators, digital dossiers, and profiling Opt-out
• Data aggregators companies that collect public • The opt-out model of informed consent allows the company
data (e.g., real estate records, telephone to collect personal information until the client expressly
numbers) and nonpublic data (e.g., social security requests that it be removed.
numbers, financial data, police records, motor • Opting out means a user takes action to withdraw their
vehicle records) and integrate them to produce consent.
digital dossiers.
• Digital dossier is an electronic description of you There are two main ways to offer opt-outs to users.
and your habits. 1. Unchecking boxes
• Profiling is the process of creating a digital dossier. • The user then has the opportunity to opt out,
Electronic Surveillance meaning they uncheck the boxes in order to
• The tracking of people ‘s activities, online or withdraw their consent.
offline, with the aid of computers. 2. Consent withdrawal
• Many people are blissfully unaware that they can • When you offer users a way to withdraw their
be under electronic surveillance while they are permission or change their preferences after the
using their computers. original point of consent.
Personal Information • The company notifies users that they may opt out
• information about individuals is being kept in many of receiving future marketing contact by directing
databases like banks, utility companies, them to a preference manager via the opt-out link.
government agencies, and the most visible
locations are credit-reporting agencies. “unsubscribe” link - more common method of opt out
Information on Internet Bulletin Boards, Newsgroups, o Unsubscribe links are often contained in the footer of
an email.
and Social Networking Sites
o They direct users to a page or form that allows them to
• Social Networking Sites often include electronic
opt out of receiving further outreach from the company.
discussions such as chat rooms. These sites
appear on the Internet, within corporate intranets, INFORMATION SECURITY
and on blogs. Key Information Security Terms
• A blog (Weblog) is an informal, personal journal • Threat is any danger to which a
that is frequently updated and intended for general system/information resource may be exposed.
public reading. • Exposure is the harm, loss or damage that can
• Social networking sites can cause you problems. result if a threat compromises an information
Anyone can post derogatory information about you resource.
anonymously. You can also hurt yourself. The best • Vulnerability is the possibility that the
thing to do is be careful what information you post system/information resource will suffer harm by a
on social networking sites. threat.
• Risk is the likelihood that a threat will occur. o gathering techniques. Espionage crosses the legal
• Information system controls ere the procedures, boundary.
devices, or software aimed at preventing a o Information extortion
compromise to a system. o Sabotage or vandalism
o Theft of equipment or information
Factors Increasing the Threats to Information Security ▪ For example, dumpster diving
• Today’s interconnected, interdependent, o Compromises to intellectual property
wirelessly- networked business environment ▪ Intellectual property. Property created by individuals or
• Government legislation Smaller, faster, cheaper corporations which is protected under trade secret, patent,
computers and storage devices and copyright laws.
• Decreasing skills necessary to be a computer • Trade secret. Intellectual work, such as a business plan,
hacker. that is a company secret and is not based on public
• International organized crime turning to information.
cybercrime • Patent. Document that grants the holder exclusive rights
• Downstream liability on an invention or process for 20 years.
• Copyright. Statutory grant that provides creators of
• Increased employee use of unmanaged devices
intellectual property with ownership of the property for life of
• Lack of management support
the creator plus 70 years.
▪ Piracy. Copying a software program without making
CATEGORIES OF THREATS TO INFORMATION SYSTEMS
payment to the owner.
o Software Attacks
- Unintentional acts
▪ Virus, Worm, Trojan horse, and Logic Bomb
▪ Human errors
▪ Phishing attacks
- Tailgating
▪ Distributed denial-of-service attacks
• To deter tailgating, many companies have anti-
o Alien Software
tailgating doors protecting the entrance into high-
▪ Spyware
security areas. Note that only one person at a time
▪ Spamware
can go through this door.
▪ Cookies
- Shoulder surfing
o Supervisory control and data acquisition (SCADA)
• Shoulder surfing occurs when the attacker
attacks
watches another person’s computer screen over
that person’s shoulder. Particularly dangerous in
public areas such as airports, commuter trains,
and on airplanes.
- Carelessness with laptops and portable computing
devices
• Opening questionable sites
• Careless Internet surfing
▪ Poor password selection and use
▪ Deviations in quality of service-by-service providers
(e.g., utilities)
▪ Environmental hazards (e.g., dirt, dust, humidity)
• We should note that the biggest threat to the security of an
organization’s information assets are the company’s
employees.
• In fact, the most dangerous employees are those in human
resources and IT. HR employees have access to sensitive
personal data on all employees. IT employees not only have
access to sensitive personal data, but control the means to
create, store, transmit, and modify these data.
- Natural disasters
- Technical failures
- Management failures
- Deliberate acts (Whitman and Mattord, 2003)
o Espionage or trespass is the competitive intelligence
consists of legal information-