MIDTERMS
MIDTERMS
- read the information from a punch card - The instructions were written using the
and process it electronically. assembly language. High level
programming languages, such as early
- Herman Hollerith versions of COBOL and FORTRAN were
GENERATIONS OF COMPUTER also developed during this period.
CYBERCRIME
Republic Act No. 10173
“ONE OF THE MAIN CYBER_RISKS IS
TO THINK THEY DON’T EXIST. THE Data Privacy Act of 2012
OTHER IS TO TRY TO TREAT ALL
-It is an act protecting individual personal
POTENTIAL RISKS”
information in Information and
- Stephanie Nappo Communication System in the
Government and Private Sector, creating
Cyber
for this purpose a National Privacy
- is a prefix that denotes a relationship with Commission and for other purposes.
information technology (IT). Anything
COMMON FORMS OF CYBERCRIMES
relating to computing, such as the internet,
falls under the cyber category. It’ s worth 1. Phishing Attack
noting cyber carries a connotation of a
- use email or malicious websites to solicit
relationship with modern computing and
personal information from an individual or
technology.
company by posing as a trustworthy
Cybercrime organization.
- is defined as a crime in which a computer 2. Malware attack
is the object of the crime (hacking,
- Malware – or malicious software – is one
phishing, spamming and child
of the most popular types of cybercrime
pornography) is used as a tool to commit
because it can manifest itself into
an offense.
numerous formats.
Cybercriminals
3. Online Credential Breach
- are the people who uses computer
- occur in various ways – malware,
technology to access personal information,
phishing attack, credential stuffing, etc. –
business trade secrets or use the internet
but the end result is always the same:
for exploitative or malicious purposes.
cybercriminals have access to employees’
Cybersecurity or customers’ personal online credentials
(user name and password).
- are the technologies and processes
designed to protect computers, networks, 4. Debit or Credit Card Fraud
and data from unauthorized access,
- Theft and fraud committed using a credit
vulnerabilities, and attacks delivered via
or debit card to either obtain goods without
the internet by cybercriminals.
paying or to obtain unauthorized funds
Republic Act No. 10175 from an account is not a new phenomenon.
However, online shopping coupled with
Cybercrime Prevention Act of 2012
the rise in cybercrime has increased the
-is a law in the Philippines approved on amount of cyber fraud seen today.
September 12,2012 which aims to address
Basically, this cybercrime involves the
exploitation of children in the porn
industry.
5. Identity Theft
10. Cyberbullying
- Due to the increasing use of computer
- Cyberbullying is one of the most rampant
networks and electronic data sharing,
crimes committed in the virtual world. It is
accessing consumers’ personally
a form of bullying carried over to the
identifiable information is getting easier
internet. On the other hand, global leaders
for cybercriminals.
are aware of this crime and pass laws and
6. Online Scams acts that prohibit the proliferation of
cyberbullying.
-These are usually in the form of ads or
spam emails that include promises of Internet Threats
rewards or offers of unrealistic amounts of
-An Internet threat or Cyber threat is a
money. Online scams include enticing
malicious act that seeks to damage data,
offers that are “too good to be true” and
steal data, or disrupt digital life in general.
when clicked on can cause malware to
interfere and compromise information. It can also refer to the possibility of a
successful cyberattack that aims to gain
7. Cyber stalking
unauthorized access, damage, disrupt, or
- Cyber stalking is a new form of internet steal an information technology asset,
crime in our society when a person is computer network, intellectual proper ty or
pursued or followed online. A cyber any other form of sensitive data.
stalker doesn’t physically follow his
Hacking
victim; he does it virtually by following
his online activity to harvest information - is a term used to describe actions taken
by someone to gain unauthorized access to
8. Software Piracy
a computer. The availability of information
- Thanks to the internet and torrents, you online on the tools, techniques, and
can find almost any movie, software or malware makes it easier for even non-
song from any origin for free. Internet technical people to undertake malicious
piracy is an integral part of our lives which activities.
knowingly or unknowingly we all
- Find weaknesses (or pre-existing bugs) in
contribute to. This way, the profits of the
your security settings and exploit them in
resource developers are being cut down.
order to access your information.
It’s not just about using someone else’s
intellectual property illegally but also - Install a spyware, providing a back door
passing it on to your friends further for hackers to enter and search for your
reducing the revenue they deserve. information.
9. Child Pornography Malware
- Porn content is very accessible now - is one of the more common ways to
because of the internet. Most countries infiltrate or damage your computer.
have laws that penalize child pornography. Malicious software that infects your
computer, such as computer viruses, been locked and demanding a payment be
worms, Trojan horses, spyware, and made for you to regain access.
adware
- common type of online fraud. A means to -Annoy you with unwanted junk mail.
point you to a malicious and illegitimate
- Create a burden for communications
website by redirecting the legitimate URL.
service providers and businesses to filter
- Convince you that the site is real and electronic messages.
legitimate by spoofing or looking almost
- Phish for your information by tricking
identical to the actual site down to the
you into following links or entering details
smallest details.
with too-good-to-be-true offers and
Phishing promotions.
- used most often by cyber criminals - Provide a vehicle for malware, scams,
because it's easy to execute and can fraud and threats to your privacy.
produce the results they're looking for with
Wi-Fi Eavesdropping
very little effort. Fake emails, text
messages and websites created to look like - another method used by cyber criminals
they're from authentic companies. to capture personal information. Virtual
“listening in” on information that's shared
- Trick you into giving them information
over an unsecure (not encrypted) WiFi
by asking you to update, validate or
network.
confirm your account. It is often presented
in a manner than seems official and - Potentially access your computer with the
intimidating, to encourage you to take right equipment.
action.
- Steal your personal information including
Ransomware logins and passwords.
- type of malware that restricts access to How will you know if your computer is
your computer or your files and displays a infected?
message that demands payment in order
*It takes longer than usual for your
for the restriction to be removed.
computer to start up, it restarts on its own
- Ransomware will display a notification or doesn't start up at all.
stating that your computer or data have
* It takes a long time to launch a program.
* Files and data have disappeared.
* Your system and programs crash
constantly.