Torrecampo 34

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

ALLAN TORRECAMPO BSME 2-A

GEE303 Living in the era


QUIZ No. 2 Midterm Period

Question No. 1

What is the Cybercrime Prevention Act of 2012? Enumerate the crimes under this act and its
corresponding penalties?

• The Philippine Congress enacted Republic Act No. 10175 or “Cybercrime Prevention Act of 2012”
which addresses crimes committed against and through computer systems on 12 September
2012. It includes penal substantive rules, procedural rules and also rules on international
cooperation.

• Among the cybercrime offenses included in the bill are cybersquatting, cybersex, child
pornography, identity theft, illegal access to data and libel. The corresponding penalties can be
varied according to the crime being committed. Any person found guilty of any of the
punishable acts enumerated shall be punished with imprisonment of prison mayor or a fine of at
least Two hundred thousand pesos (PhP200,000.00) up to a maximum amount commensurate
to the damage incurred or both.

Question No. 2

What is Cyberlife? Being a student how we can avoid committing this kind of crime? Explain
your answer very well.

• Cyber libel is defined as to make and publish a false and malicious statement online about
someone in any of the social media platforms that could damages the person's reputation. In
order to avoid this kind of crime, being a student, we should always think carefully before we
conclude ideas in our mind. We must be aware about the possible result of our actions. We
should not listen in any issues we heard instead used your knowledge to understand the real
situation. In these times, as one of the millennials who likes using social media, I noticed that
internet became more toxic. Full of fake news and accusation and being a student, we should
help others how to know if it based on truth or not.

Question No. 3
What is Identity Theft? Explain how identity theft being perform by cybercriminals? What are the ways
we can follow to avoid becoming a victim of identity theft?
• Identity theft occurs when someone uses another's personal identifiable information, like their
name, identifying number, or credit card number, without their permission, to commit fraud or
other crimes. They usually use your identity to scam others. When the criminals used other
identity, they could hide their selves behind the person's identity that they are using. In this
technique they can gain the trust of the person they want to scam. In order to avoid being a
victim of this crime we should responsible enough in any information about ours elves that we
upload online. Sensitive information like credit cards, certificates, etc. must be kept in private.
Also avoid clicking any links send to you by unknown users.

Question No. 4
What is Phishing? Discuss how we can protect ourselves against phishing.

• Phishing is the fraudulent use of electronic communications to deceive and take advantage of
users. Phishing attacks attempt to gain sensitive, confidential information such as usernames,
passwords, credit card information, network credentials, and more. In avoiding phishing
incidents, there are software’s used to avoid phishing and add security to your electronic
gadgets like spyware and firewall. Also, it’s generally not advisable to click on a link in an email
or instant message, even if you know the sender. The bare minimum you should be doing is
hovering over the link to see if the destination is the correct one. Some phishing attacks are
fairly sophisticated, and the destination URL can look like a carbon copy of the genuine site, set
up to record keystrokes or steal login/credit card information. If it’s possible for you to go
straight to the site through your search engine, rather than click on the link, then you should do
so. Lastly, do not enter any sensitive information or download files from that site. Sites without
security certificates may not be intended for phishing scams, but it’s better to be safe than
sorry.

Question No. 5
What is Malware? Differentiate the difference between malware and computer viruses?

• Malware is a file or code, typically delivered over a network, that infects, explores, steals or
conducts virtually any behavior an attacker wants. And because malware comes in so many
variants, there are numerous methods to infect computer systems. Virus and malware is
somehow. The difference between malware and viruses is, in short, that viruses are a
subcategory of malware. Malware is any type of computer code written deliberately to cause
damage to a device, like a laptop, smartphone, or server, and viruses certainly fit the bill. Like
biological viruses, computer viruses seek to spread and replicate themselves.

Question No. 6
Explain what is unauthorized system access in a computer system?
• Unauthorized access is when a person gains entry to a computer network, system, application
software, data, or other resources without permission. Any access to an information system or
network that violates the owner or operator's stated security policy is considered unauthorized
access.

Question No. 7
What is Password? What are the rules to follow to have a good password?

• A password is a string of characters used to verify the identity of a user during the
authentication process. Passwords are typically used in tandem with a username; they are
designed to be known only to the user and allow that user to gain access to a device, application
or website.

• Passwords must atleast 8 characters—the more characters, the better


• It shoud be a mixture of both uppercase and lowercase letters
• A mixture of letters and numbers
• Inclusion of at least one special character, e.g., ! @ # ? ] Note: do not use < or > in your
password, as both can cause problems in Web browsers

Question No. 8
Discuss what is online impersonation and provide some examples?

• Online impersonation refers to those cases when a malicious actor is using someone’s online
identity in order to gain financial benefits (such as obtaining a loan in their name or asking their
family and friends for money), or with the purpose of harassing, intimidating, or threatening
their victim. Developing a social media profile by using another person’s name
• Creating a website under the name of someone else
• Uploading messages under another person’s name
• Sending emails or other types of electronic communication by falsely attributing the messages
sent to someone else

Question No. 9
What is computer hacking? Discuss the brief history of computer hacking?
What are the ways we can protect our computer system?

• Computer hacking, on one hand, describes the activities practiced by individuals, organizations,
and nations, in order to gain unauthorized access to computer and technology dependent
systems. These activities may involve the modification or alteration of system's software and
hardware in order to perform activities neither purposed by the creator nor in line with the
creator's original intentions.

• When hacking first started it was not thought of as that serious. The hackers were not even
known as hackers but as practical jokers. The very first hack came in 1878 when the phone
company, Bell Telephone, was started. A group of teenage boys, hired to run the switchboards,
would disconnect or misdirect calls. first authentic computer hackers came in the 1960s.

Here are the ways to protect our computer system:


• Updates
To prevent hacking, it's important to update applications and devices as soon as the updates are
available. Updates not only enhance and improve the user's experience with the application, but also
they constantly improve and rectify security weaknesses and loopholes in it. If 3 doors of the car are
locked but the 4th is not, your car's safety is measured by the open 4th door!

• Password Security
Keeping passwords secret is important, but ensuring they are not accessed or revealed is better. Most
secure platforms today demand complex passwords for login. This may include capitals, numbers, an d
characters. Passwords are safest if they are not shared with anyone - not even IT administrators and so-
called organizational representatives - or written down. It's also important to change them often.

• Vetting Websites and Web Sources


It's amazing how careful we are when we use our credit and debit cards in public yet an even more
menacing threat exists right under our thumbs: downloading. There is an app for everything these days,
and everything is at the tip of our thumbs with the download button. Failing to ensure that we access,
sign up, download, and interact with reputable sites can open ourselves up for trouble. Secure websites
are denoted by a padlock icon, which is positioned to the left of the URL address.

• Wireless Network Access


It's also important to be security conscious of the networks we access in addition to securing our
devices. Secure wireless access connections always require a password. We all welcome free services,
but we must remember they could be the source of our future woes. Open wireless connections are
known to be very vulnerable, and communication over such unsecured networks could expose every key
you stroke.

• Protection Against Phishing scams


We have spoken about vetting web sources, but phishing scams are another serious threat. They are
fictitious emails that mimic the contents of your banking website; for example, they may include
instructions to follow a link that leads you to a hoax site. The goal of this malicious threat is to steal your
sensitive data like login details, passwords, and pin numbers.

Question No.10.
What is Social Network Fraud and explain how to avoid this social network fraud?
• Internet fraud is a type of cybercrime fraud or deception which makes use of the Internet and
could involve hiding of information or providing incorrect information for the purpose of tricking
victims out of money, property, and inheritance. To avoid this social media fraud, never give
your passwords, PIN numbers or bank account numbers -legitimate companies and banks will
never ask you for these details by email or over the phone. Avoid social networking content that
asks you for personal information. Do not download any apps, take any quizzes or sign up for
any coupons that ask for information such as your date of birth, social security number, or home
address. Always assume that these kinds of attempts to get your information are scams.

REFERENCES:

Access Denied. (n.d.). Retrieved October 12, 2022, from https://www.cyber.gov.au/acsc/viewall-


content/threats/identity-theft

Al Hilal Bank | Social Network Fraud. (n.d.). Retrieved October 13, 2022, from
https://www.alhilalbank.ae/en/security-tips/social-network-fraud.aspx

Defense if Charged with Online Impersonation. (2019, November 4). Capetillo Law Firm.
Retrieved October 12, 2022, from https://capetillolaw.com/defense-if-charged-withonline-
impersonation/

Houston Police Department. (n.d.). 10 Ways to Protect Yourself From Identity Theft. Houston, Texas.
Retrieved October 13, 2022, from https://www.houstontx.gov/police/crime_prevention/id_theft.htm

Kaspersky. (2022, March 9). All About Phishing Scams & Prevention: What You Need to Know.
www.kaspersky.com. Retrieved October 13, 2022, from https://www.kaspersky.com/resource -
center/preemptive-safety/phishing-preventiontips

Maryclarevillanueva, V. A. P. B. (2021, December 5). R.A. No. 10175: The Cybercrime Prevention Act: The
Net Commandments. Philippine Legal Research. Retrieved October 12, 2022, from
https://legalresearchph.com/2021/12/05/r-a-no-10175-the-cybercrimeprevention-act-the-net-
commandments/

Morgan & Morgan. (2021, February 5). What Are Some Examples of Online Impersonation Cases?
Retrieved October 12, 2022, from https://www.forthepeople.com/identity-theft/whatare-some-
examples-of-online-impersonation-cases/

You might also like