You are on page 1of 15

WEEK 9

Cyber Crime

ITE-6202 Social Issues and Professional Practice


Week 9: Cyber Crime
Course Learning Outcomes:

By the end of this module, a student is able to:


1. Define Cyber Crime and other terms connected to it.
2. Determine the categories of Cyber Crime
3. Understand the conditions and penalties of the Cyber Crime Law of
the Philippines.
4. Understand the aspects of Cyber Crime and its social consequences
Topics Covered

• Cyber Crime
• The Computer Crime Law in the
Philippines
• Categories of Cyber Crime
• Computer System Attacks
CYBER CRIME
• Motives of Computer Crimes
• Social and Ethical Consequences
I. Cyber Crime
Definition:
Computer crime involves a computer system either as
an object of a crime, an instrument used to commit a
crime, or a repository of evidence related to a crime.
II. The Computer Crime Law
• Republic Act No. 10175
• Cybercrime Prevention Act of 2012
• signed into law by President Aquino on Sept. 12, 2012
• Its original goal was to penalize acts like cybersex,
child pornography, identity theft and unsolicited
electronic communication in the country
II. The Computer Crime Law
Charges:
• Cybersex - prision mayor (6 years and one day to
12 years) or a fine of at least P200,000 but not
exceeding P1 million.
• Child pornography - fined from P50,000 to P5
million, and maximum jail term of reclusion
perpetua (20 to 40 years)
• Unsolicited Communication - arresto mayor
(imprisonment for 1 month and 1 day to 6 months)
or a fine of at least P50,000 but not more than
P250,000, or both.
II. The Computer Crime Law
The law also penalizes offenses against the
confidentiality, integrity and availability of computer data
and system, such as:
• Illegal Access
• Illegal Interception
• Data Interference
• System Interference
• Misuse of Devices
• Cybersquatting
III. Categories of Cybercrime
Three Categories of Cybercrime
1. Cyberpiracy - using cybertechnology in
unauthorized ways to:
a) Reproduce copies of proprietary
information, or
b) Distribute proprietary information (in
digital form) across a computer
network.
III. Categories of Cybercrime
Three Categories of Cybercrime
2. Cybertrespass - using cybertechnology to gain
unauthorized access to:
a) An individual’s or an organization’s
computer system,
b) A password-protected Web site.
III. Categories of Cybercrime
Three Categories of Cybercrime
3. Cybervandalism - using cybertechnology to
unleash one or more programs that:
a) Disrupt the transmission of electronic
information across one or more
computer networks, including the
Internet, or
b) Destroy data resident in a computer or
damage a computer system’s
resources, or both.
IV. Computer System Attacks
Major computer attacks fall into two categories:
• Penetration
- breaking into a computer system using known
security vulnerabilities to gain access to a
cyberspace resource. Penetration attacks originate
from many sources including:
• Insider Threat
• Hackers
• Criminal Groups
• Hacktivists and Cyberterrorists
IV. Computer System Attacks
Major computer attacks fall into two categories:
• Denial of Service
- distributed denial of service (DDoS)
- aim to exhaust the network bandwidth, its
router processing capacity, or network stack
resources, thus eventually breaking the
network connectivity to the victims.
V. Motives of Computer Crimes
Some Motives are:
• Political Activism.
• Vendetta.
• Joke/Hoax.
• The Hacker’s Ethics.
• Terrorism/Extortion.
• Hate.
• Personal Gain/Fame/Fun.
VI. Social and Ethical Consequences
Some Social and Ethical Consequences are:
1. Psychological Effects.
2. Moral decay.
3. Loss of privacy.
4. Trust.
END

You might also like