Introduction To Cybercrime
Introduction To Cybercrime
and Protection
The major objectives in the study of Cyber-
crimes and Environmental Laws and Protection in
relation to the new curriculum for the Bachelor of
Science of Criminology as stipulated in CHED Memo
# 05 are enumerated:
ü To become a familiar with various definition and typologies of
cybercrime and environmental laws and protection
A computer is a machine or
device that performs processes,
calculations and operations based
on instructions provided by a
software or hardware program. It
is designed to execute
applications and provides a
variety of solutions by combining
integrated hardware and software
components.
Two primary categories of a computer:
1. Hardware: Physical structure that houses a computer’s
processor, memory, storage, communication ports and
peripheral devices
2. Software: Includes operating system (OS) and software applications
A computer works with software programs that
are sent to its underlaying hardware architecture
for reading, interpretation and execution.
Computers are classified according to computing
power, capacity, size, mobility and other factors,
as a personal computers (PC), desktop computers,
laptop computers, minicomputers, handheld
computers and devices, mainframes or super
computers.
Computer Fundamental
A computer is an electronic machine that accepts data, stores
and processes data information. The computer is able to work
because there are instructions in its memory directing it. The parts of
the computer that you can see and touch, such as the keyboard,
monitor and the mouse are called hardware. The instructions that
direct the computer are called software or computer program. Data
which is raw facts that the user into the computer is called input.
These includes; words, numbers, sounds and pictures. When data is
entered into the computer, the computer processes the data produce
information which is output. For example, you enter 2+2 into the
computer as data, the computer processes it and the result is 4
which is information.
Data which is raw facts that the user into
the computer is called input. These includes;
words, numbers, sounds and pictures. When
data is entered into the computer, the computer
processes the data produce information which is
output. For example, you enter 2+2 into the
computer as data, the computer processes it
and the result is 4 which is information.
Three general categories of Computer:
1. Supercomputer – The fastest, largest, most powerful and most
expensive computer
2. Mainframe Computer - This is a little smaller and less powerful than the
supercomputer, but like the super computer it is so expensive.
3. Personal Computer (PC) – This is the computer that most people use in their
daily lives. This computer must smaller, less powerful and less expensive than
the super computer and the main frame computer..
Computer Hardware
You learned earlier that a computer has electronic and
mechanical parts known as hardware. Hardware also
includes input devices, output devices, system unit,
storages devices and communication devices. Without
these components we would not be able to use the
computer.
1. Computer
2. Crime
(1) Illegal Access. – The access to the whole or any part of a computer system
without right.
(2) Illegal Interception. – The interception made by technical means without right of
any non-public transmission of computer data to, from, or within a computer system
including electromagnetic emissions from a computer system carrying such
computer data.
(a) Offenses against the confidentiality, integrity and availability of computer data and
systems (CONT...)
(bb) A computer password, access code, or similar data by which the whole
or any part of a computer system is capable of being accessed with intent that it be
used for the purpose of committing any of the offenses under this Act.
(6) Cyber-squatting. – The acquisition of a domain name over the internet in bad faith
to profit, mislead, destroy reputation, and deprive others from registering the same, if
such a domain name is:
(ii) Identical or in any way similar with the name of a person other than the
registrant, in case of a personal name; and
(i) The input, alteration, or deletion of any computer data without right
resulting in inauthentic data with the intent that it be considered or acted upon for legal
purposes as if it were authentic, regardless whether or not the data is directly readable
and intelligible; or
(ii) The act of knowingly using computer data which is the product of computer-
related forgery as defined herein, for the purpose of perpetuating a fraudulent or
dishonest design.