You are on page 1of 2

CYBERCRIME Three generic types of cybercrime

1. Crimes against the machine (integrity related


WHAT MAKES CYBERCRIME ATTRACTIVE? cybercrime) – e.g. Hacking, DDOS
 Lower Cost 2. Crimes using the machine (Computer assisted
 Force Multiplier cybercrime) – e.g. Fraud, Deception
 Low Risk of Detection 3. Crimes in the machine (Content-related
 Lack of Laws cybercrime) – e.g. Obscenity/Violent or Abusive
Speech/ Grooming, Information
A computer is a machine that is made up of various Leakage/Espionage
parts or components which help it in carrying out
instructions which are in the form of arithmetic
commands or different algorithms for it to process. THREE CONTEMPORARY EXAMPLES OF
A computer is any machine that can be programmed GLOBALIZED CYBERCRIME BY CRIME TYPE
to carry out a set of algorithms and arithmetic
instructions. Zeus Trojan is a form of crimeware/ malware
A computer is a digital electronic machine that can be Stills key information
programmed to carry out sequences of arithmetic or
logical operations automatically. Modern computers Scareware – a crime using the machine
can perform generic sets of operations known as malicious software that defrauds victims by scaring
programs. These programs enable computers to them into paying for fake anti-virus packages that
perform a wide range of tasks. purport to fix their computer

Wikileaks – a crime in the machine


a global non-profit organization that publishes secret
and classified material from anonymous sources on
its website in order to ‘expose oppressive regimes’

SEC. 4. Cybercrime Offenses.


(1) Illegal Access. – The access to the whole or any
part of a computer system without right.
Illegal Interception. – The interception made by
technical means without right of any non-public
transmission of computer data to, from, or within a
computer system including electromagnetic emissions
from a computer system carrying such computer data.

(3) Data Interference. — The intentional or reckless


alteration, damaging, deletion or deterioration of
computer data, electronic document, or electronic
data message, without right, including the introduction
or transmission of viruses.

(4) System Interference. — The intentional alteration


What is computer network? or reckless hindering or interference with the
functioning of a computer or computer network by
Computer network refers to interconnected computing inputting, transmitting, damaging, deleting,
devices that can exchange data and share resources deteriorating, altering or suppressing computer data
with each other. These networked devices use a or program, electronic document, or electronic data
system of rules, called communications protocols, to message, without right or authority, including the
transmit information over physical or wireless introduction or transmission of viruses.
technologies.
) Cyber-squatting. – The acquisition of a domain
Cybercrime does not require physical proximity name over the internet in bad faith to profit, mislead,
between victim and perpetrator for the consummation destroy reputation, and deprive others from
of an offense. registering the same, if such a domain name is:
 A perpetrator needs a computer linked to the (i) Similar, identical, or confusingly similar to
Internet. an existing trademark registered with the appropriate
 One-to-one victimization is not typical of government agency at the time of the domain name
cybercrime because, unlike real-world crime, it registration:
can be automated. (ii) Identical or in any way similar with the
 This crime can be instituted or filed before the name of a person other than the registrant, in case of
RTC court. a personal name; and
(iii) Acquired without right or with intellectual  Keep the Computer System Up-to-Date
property interests in it.  Protect your personal information
 Install or update your Antivirus Software
omputer-related Identity Theft. – The intentional  Keep your firewall turned on
acquisition, use, misuse, transfer, possession,  Read the fine print on website privacy policies
alteration or deletion of identifying information  Review financial statement regularly
belonging to another, whether natural or juridical,  Secure configuration of the system
without right:  If it seems too good to be true, it is not true
 Choose a strong password and protect it
Cybersex. — The willful engagement, maintenance,  Turn off your computer
control, or operation, directly or indirectly, of any
lascivious exhibition of sexual organs or sexual CHALLENGES
activity, with the aid of a computer system, for favor  Anonymity
or consideration.  Attribution
 Trace back can be time consuming
Unsolicited Commercial Communications. — The  The lack of harmonized national cybercrime laws,
transmission of commercial electronic communication international standardization of evidentiary
with the use of computer system which seek to requirements (both in terms of admissibility in a
advertise, sell, or offer for sale products and services court of law, and in terms of international state
responsibility), mutual legal assistance on
Libel. — The unlawful or prohibited acts of libel as cybercrime matters, and timely collection,
defined in Article 355 of the Revised Penal Code, as preservation, and sharing of digital evidence
amended, committed through a computer system or between countries
any other similar means which may be devised in the  Technical Challenges
future.  Existing limited abilities of law enforcement
agencies to conduct these investigations
CYBERTRESPASS
Crossing boundaries into other people’s property
and/or causing damage (e.g., hacking, defacement,
viruses)

CYBERDECEPTIONS AND THEFTS


Stealing money, property (e.g., credit card fraud,
intellectual property violations, aka “piracy”)

CYBER PORNOGRAPHY
Breaching laws on obscenity and decency

CYBERVIOLENCE
Doing psychological harm to or inciting physical harm
against others, thereby breaching laws relating to the
protection of the person (e.g., hate speech, stalking;
pp. 3–7)

Types of Cyber Criminals


 Individuals and small criminal groups
 Insiders
 Organized Criminal Organization
 State and State Affiliated Agents
 Hacktivist
 Cyber terrorist
 Script Kiddies

THE TOOLS OF THE CYBER CRIMINALS


While there is a technical aspect of hacking (such as
creating malware or breaking into networks),
psychology also plays a role in this illegal activity.
Social engineering, where hackers use psychology to
trick unsuspecting victims into complying with their
requests, plays a vital role in many cybersecurity
attacks.

Preventive Measures Against Cybercrimes

You might also like