Cyberspace PosturingResilient Philippines
Cyberspace PosturingResilient Philippines
The Budapest Convention is more than a legal document; it is a framework that permits hundreds of
practitioners from Parties to share experience and create relationships that facilitate cooperation in
specific cases, including in emergency situations, beyond the specific provisions foreseen in this
Convention.
The Budapest Convention came into force in 2004. It was drawn up by the Council of Europe in
Strasbourg, France, with the active participation of the Council of Europe's observer states Canada,
Japan, Philippines, South Africa and the United States. Sixty-five countries have ratified the convention,
while a further four countries have signed the convention but not ratified it
Cybercrime:
- refers to any of the incidences or occurrence of the criminal act or offenses as defined
under RA 10175 also known as Cybercrime Prevention Act of 2012 and under special
laws and the Revised Penal Code in relations to RA 10175.
5
Cybercrime as defined by RA 10175
A. Offense against the confidentiality, integrity, and availability of computer data and systems:
o Illegal Access
o Illegal Interception
o Data Interference
o Misuse of Devices
o Cyber-squatting
B. Computer-related Offenses
o Computer-related Forgery
o Computer-related Fraud
o Computer-related Identity Theft
C. Content-related Offenses
o Cybersex (or known as Online Sex Exploitation and Abuse – OSAEC as per RA 11930)
o Child Pornography
o Libel
o Crimes under RPC if done through cyber.
<Why do HACKERS hack?
{://. . . }
This organizational measure is consistent with the National Cybersecurity Plan (NCSP) 2022
which is intended to shape the policy of the government on cybersecurity and the crafting of guidelines
that will be adapted down to the smallest unit of the government. It is also expected to provide a
coherent set of implementation plans, programs, and activities to be shared with all stakeholders. The
primary goals of NCSP 2022 include:
1. Assuring the continuous operation of the Philippines’ critical infostructure (CII), and public and
military networks;
2. Implementing cyber resiliency measures to enhance ability to respond to threats before,
during, and after attacks;
3. Effective coordination with law enforcement agencies; and
4. A cybersecurity-educated society.
National Cybersecurity Plan (NCSP) 2022
Four (4) Key Imperatives :
National Cybersecurity Plan (NCSP) 2022
Four (4) Key Imperatives :
Figure 1. Organization for Economic Cooperation and Development
(OECD) Framework for Digital, Social and Economic Aspects of
Cybersecurity (excerpt from the proposed NCSP2028) The National Economic Development Authority (NEDA)
monitors the country’s KPIs as indicated in the PDP 2023-
2028, which includes cybersecurity-related KPIs. The
Economic and Social Prosperity strategic area is important.
Proper funding for this strategy must be approved and
coordinated through the Development Budget Coordinating
The Technology strategic area in
Council (DBCC).
cybersecurity shall be led by DICT,
along with DOST and other NGAs
that design, secure, maintain, National and International Security is the
optimize, configure, and fourth strategic area and shall be
decommission technologies used spearheaded by the defense establishment
in cybersecurity. led by the Department of National Defense
and jointly with the Department of Foreign
Affairs (DFA). The priority of NGAs in charge
of this strategic area is to create confidence-
building measures for proper and
responsible conduct of state actors in
cyberspace.
The NCIAC [23] shall be the convergence point for all government
By law, cybercrime coordination is through the
agencies in implementing this strategy and shall be the main forum
Cybercrime Investigation and Coordinating
for information sharing, policy coordination, and harmonization of
Center chaired by the DICT Secretary with
different cybersecurity plans of different NGAs. By coordinating all
members from the DOJ, NBI, and PNP, among
cybersecurity programs. National Cybersecurity Inter-Agency
others. The CICC Secretariat is headed by an
Council (NCIAC) chaired by the Executive Secretary and co-chaired
Executive Director who manages the daily
the by DICT and the National Security Council (NSC) Director-
activities of the Center
General.
CYBERCRIME TRENDS AND
The Three (3) Layers where Cybercrime
LANDSCAPE happens
Re R
BA 1
Re A
Re A
Re 3
Re 7
Re 2
Re 6
Re n 5
Re M
CA 9
8
Re 10
m
Re B
n1
NC
4
CA
G
n
n
r
RM
te
RA
n
n
n
gio
gio
gio
gio
gio
gio
gio
gio
Complainants did not disclose there location
gio
gio
gio
gio
de
Re
Un
CYBERCRIME TRENDS AND
LANDSCAPE
According to the
aforementioned graph,
females older than the age
of 18 contacted reporting
occurrences of cybercrime
or cybersecurity.
CYBERCRIME TRENDS AND
LANDSCAPE
Voyeurism 2
2 The data collected from
Sexual Harassment 1
2 late December 2022 to
On-line Libel 7
18
I-ARC analysis on the impact of mid-March 2023
information and communication security
Illegal Access 16 and cybercrime in relation to Gender and resulted in a total of 99
10 Development (GAD)
Male Women being shown
Identity Theft 1
3 Female on the graph Estafa
Grave Threat 4
7 had the highest
Estafa 20
47
reported rate of
E-Commerce 3
cybercrime (over 47 out
2
of 99),
Data Privacy 9
9
DISASTER RISKS (DR) KEY CONCEPTS :
q Hazard is a process, phenomenon or human activity that may cause loss of life, injury or other health
impacts, property damage, social and economic disruption or environmental degradation. Hazards may be
natural, anthropogenic or socionatural in origin - UNDRR Terminology (2017)
q Hazards can occur individually, sequentially or in combination with each other. A primary hazard can be
followed by secondary hazards, as seen with the earthquake, tsunami, and radiological hazards in the 2011
East Japan disaster.
• Timing, severity, geographic location, and frequency are important characteristics of hazards. Hazards
can have a short or long duration, and can have different impacts depending on the time of day, week or
month when they happen.
• They can be sudden onset, like an avalanche, or develop slowly over time as the result of a
combination of factors.
World Health Organization. (2021). WHO guidance on research methods for health emergency and disaster risk
management. World Health Organization. https://apps.who.int/iris/handle/10665/345591. License: CC BY-NC-SA 3.0 IGO
DISASTER RISKS (DR) KEY CONCEPTS :
Exposures:
1. Direct effects include injury, illness, other health effects, evacuation and
displacement, financial and economic, social, cultural, and environmental
damages.
2. Indirect effects refer to additional consequences over time that cause unsafe or
unhealthy conditions from economic, infrastructure, social, or health and
psychological disruptions and changes.
World Health Organization. (2021). WHO guidance on research methods for health emergency and disaster risk management. World Health
Organization. https://apps.who.int/iris/handle/10665/345591. License: CC BY-NC-SA 3.0 IGO
DISASTER RISKS (DR) KEY CONCEPTS :
Vulnerability is highly dependent on the context of the hazard, since it is shaped by the context’s
individual factors and behaviors, history, politics, culture, geography, institutions, and natural processes.
q This can include things such as land use, public infrastructure, the burden of disease in the
population and previous exposure to hazards.
q What makes people vulnerable is complex, and vulnerability can be both a risk factor for and an
outcome of disasters
Groups that are commonly thought of as having higher levels of vulnerability are;
World Health Organization. (2021). WHO guidance on research methods for health emergency and disaster risk management. World Health
Organization. https://apps.who.int/iris/handle/10665/345591. License: CC BY-NC-SA 3.0 IGO
DISASTER RISKS (DR) KEY CONCEPTS :
Governance:
- refers to the different ways in which governments, the private sector and in general all individuals
and institutions in a society organize themselves to manage their common affairs.
Risk-Governance:
- refers to the various ways in which many individuals and institutions – public and private deal
with risks surrounded by volatility, uncertainty, complexity and/or ambiguity or VUCA !
https://www.preventionweb.net/understanding-disaster-risk/risk-drivers/weak-governance
RISK-GOVERNANCE AND CAPACITY-BUILDING
Where;
Cybercrime Risk = Cyberthreat x Vulnerability x Exposure x K Factor
Cyber Resiliency (Capacity/Governance)
- to resist,
- to absorb (or to buffer),
- to accommodate to (or adapt to) and,
- to recover from
1. In 1990, Berners-Lee developed Hypertext Transfer Protocol (HTTP) and designed the Universal Resource
Identifier (URI) system. Berners-Lee also created a piece of software that could present HTML
documents in an easy-to-read format. He called this ‘browser’ the ‘WorldWideWeb’.
a. True b. False
2. Budapest Convention and its Protocols is the only guideline for any country developing comprehensive
national legislation against Cybercrime and as a framework for international cooperation between State
Parties to this treaty.
a. True b. False
3. Philippine cybercrime refers to any of the incidences or occurrence of the criminal act or offenses as
defined under RA 10175 also known as Cybercrime Prevention Act of 2012 and under special laws and
the Revised Penal Code in relations to RA 10175, that includes the following general categories;
4. Data Interference is punishable by imprisonment for 6 to 12 years and a minimum fine of not less that P
200,000.00, pursuant to what Law;
5. The primary goals of National Cybersecurity Plan (NCSP) 2022 (NCSP 2022) include the
following;
a. Continuous operation of the Philippines’ critical infostructure (CII), and public and military
networks;
b. Implementing cyber resiliency measures to enhance ability to respond to threats
before, during, and after attacks;
c. Effective coordination with law enforcement agencies; and
d. A cybersecurity-educated society.
e. All of the above
Exam : Single Response
a. to resist,
b. to absorb (or to buffer),
c. to accommodate to (or adapt to) and,
d. to recover from
e. All of the above
7. Inter-Agency Response Center (I-ARC) of the DICT aims to be the leading resource of
cybercrime information by analyzing complaints, its pattern, commonality, and level of threat.
a. True b. False
8. As per later report of IARC, DICT there is an indication of pattern and commonality on some of
the reported incidents like the use of social media Apps (Facebook and Facebook Messenger) and
GCASH for the transfer of collected money.
a. True b. False
Exam : Single Response
9. The IARC, DICT received a total of 198 reports regarding Cybercrime/Cybersecurity, based on
the location provided by the Caller/Complainant during the 1st Qtr, 2023 data. National Capital
Region is the most known location with a total of 49 inputs equivalent to 24.75%,
a. True b. False
10 The data collected IARC, DICT from late December 2022 to mid-March 2023 resulted in a total
of 99 where Estafa had the highest reported rate of cybercrime (over 47 out of 99).
a. True b. False