You are on page 1of 21

MALWARE

Malware - is a program or code that is designated to infiltrate a system and execute malicious
operations and controls. Computer viruses, worms, and Trojan horses are classified as malware, which are
programs that act without a user’s knowledge and deliberately alter the computer’s operations.
A computer infected by a virus, worm, or Trojan horse often has one or more of the following symptoms:
● Screen displays unusual message or image
● Music or unusual sound plays randomly
● Available memory is less than expected
● Existing programs and files disappear
● Files become corrupted
● Programs or files do not work properly
● Unknown programs or files
● System properties change mysteriously appear

COMMON TYPES OF CYBER ATTACKS/MALWARES


1. Denial-of-Service Attacks - consists of making repeated requests of a computer system or
network, thereby overloading it and denying legitimate users access to it.
2. Worms - is a program that copies itself repeatedly into a computer’s memory or onto a disk drive.
3. Viruses - is a “deviant” program, stored on a computer floppy disk, hard drive, or CD, that can
cause unexpected and often undesirable effects, such as destroying or corrupting data.
4. Trojan Horses - is a program that pretends to be a useful program, usually free, such as a game or
screen saver, but carries viruses, or destructive instructions, that perpetrate mischief without your
knowledge.
How malware is spread?
● By infected floppies or CDs: The first way is via an infected floppy disk or CD, perhaps from a
friend or a repair person.
● By opening unknown email attachments: The second way is from an email attachment. This is why
a basic rule of using the internet is: Never click on an email attachment that comes from someone
you don’t know.
● By clicking on infiltrated websites: Some crackers “seed” web pages with contagious malware
that enables them to steal personal data, so that by simply clicking on a website you can
unwittingly compromise your PC.
● Through infiltrated Wi-Fi hot spots: As mentioned earlier, if you’re a user of Wi-Fi wireless access
points, or hot spots, you have to be aware that your laptop or PDA could be exposed to wireless
transmitted diseases from illegal users.
WAYS TO MINIMIZE VIRUS
● Buying a new computer with antivirus software on it does not mean you are automatically
protected. The software could be six months old and not cover new viruses. You have to register it
with the designer company, and you need to receive antivirus updates.
● Scan your entire system with antivirus software the first time it’s installed; then scan it regularly
after that. Often the software can be set to scan each time the computer is rebooted or on a
periodic schedule. Also scan any new drives and the like before using them.
● Update your antivirus software regularly. There are virus and security alerts almost every day. Most
antivirus software is automatically linked to the internet and will add updated antivirus code to
your system whenever the software vendor discovers a new threat.
● If you discover you have a virus, you can ask McAfee or Norton to scan your computer online. Then
follow the company’s directions for cleaning or deleting it.
CYBER INTRUDERS
1. Cyber spies - is a type of cyberattack in which an unauthorized user attempts to access sensitive or
classified data or intellectual property (IP) for economic gain, competitive advantage or political
reasons.
● Signs Someone is Trolling
○ Off-topic remarks
○ Refusal to acknowledge evidence
○ Dismissive, condescending tone
○ Use of unrelated images or memes
○ Seeming obliviousness
Cyber spies most commonly attempt to access the following assets:
● Research & Development data and activity
● Academic research data
● IP, such as product formulas or blueprints
● Salaries, bonus structures and other sensitive information regarding organizational finances and
expenditures
● Client or customer lists and payment structures
● Business goals, strategic plans and marketing tactics
● Political strategies, affiliations and communications
● Military intelligence

2. Hackers - are defined (1) as computer enthusiasts, people who enjoy learning programming
languages and computer systems, but also (2) as people who gain unauthorized access to
computers or networks, often just for the challenge of it.
2 Types of Hackers
■ Thrill-seeker hackers
■ White-hat hackers

3. Cyber Thieves - is a person who uses his skills in technology to do malicious acts and illegal
activities known as cybercrimes.They can be individuals or teams. Cyberthieves and cybercriminals
are widely available in what is called the “Dark Web” where they mostly provide their illegal
services or products.
TYPES OF CYBER THIEVES
1. Phishing and Scam - targets the user and tricks them by sending fake messages and emails to get
sensitive information about the user or trying to download malicious software and exploit it on the
target system.
2. Identity Theft - when a cybercriminal uses another person’s personal data like credit card numbers
or personal pictures without their permission to commit a fraud or a crime.
3. Ransomware Attack - are a very common type of cybertheft/cybercrime. It is a type of malware
that has the capability to prevent users from accessing all of their personal data.
4. Hacking/Misusing Computer Networks - This term refers to the crime of unauthorized access to
private computers or networks and misuse of it either by shutting it down or tampering with the
data stored or other illegal approaches.
5. Internet Fraud - it can be considered a general term that groups all of the crimes that happen over
the internet like spam, banking frauds, theft of service, etc.
ONLINE SAFETY
1. Antivirus Software - scans a computer’s hard disk, CDs, and main memory to detect viruses and,
sometimes, to destroy them. Such virus watchdogs operate in two ways. First, they scan disk drives
for “signatures,” characteristic strings of 1s and 0s in the virus that uniquely identify it. Second,
they look for suspicious virus-like behavior, such as attempts to erase or change areas on your
disks.
2. Firewalls - is a system of hardware and/or software that protects a computer or a network from
intruders. The firewall software monitors all internet and other network activity, looking for
suspicious data and preventing unauthorized access. Always-on internet connections such as cable
modem, satellite, and DSL, as well as some wireless devices, are particularly susceptible to
unauthorized intrusion.
3. Passwords - is the special words, codes, or symbols required to access a computer system.
Protecting your internet access accounts and files with a password isn’t enough. Passwords (and
PINs, too) can be guessed, forgotten, or stolen.
4. Biometric Authentication - measuring individual body characteristics, tries to use these in security
devices. Biometric authentication devices authenticate a person’s identity by comparing his or her
physical or behavioral characteristics with digital code stored in a computer system.
5. Encryption - process of altering readable data into unreadable form to prevent unauthorized
access.
Encryption is able to use powerful mathematical concepts to create coded messages that are difficult or
even virtually impossible to break.
● Two basic forms of encryption
1. Private key (symmetric) encryption
- means that the same secret key is used by both sender receiver to encrypt and
decrypt a message.
2. Public key
- means that two keys are used—a public key, which the andreceiver has made known
beforehand to the sender, who uses it to encrypt the message, and a private key,
which only the receiver knows and which is required to decrypt the message.
ICT - SECURITY
Key threats to computer
1. Errors and accidents
○ Human Errors - Humans often are not good at assessing their own information needs,
emotions affect performance, act on their perceptions, which may not be fast enough to
keep up.
○ Procedural Errors - Some spectacular computer failures have occurred because someone
didn’t follow procedures.
○ Software Errors - A software bug is an error in a program that causes it not to work properly.
○ Dirty Data Problems - is incomplete, outdated, or otherwise inaccurate data.
○ Electrical Problems - power failures .
○ Voting Machine Breakdowns - printers jammed, servers crashed, poorly designed ballads.
2. Natural hazards
- This certainly includes natural disasters: fires, floods, earthquakes, tornadoes, hurricanes,
blizzards, and the like.
3. Computer crimes
A computer crime can be of two types:
(1) It can be an illegal act perpetrated against computers or telecommunications.
(2) It can be the use of computers or telecommunications to accomplish an illegal act.
THE FOLLOWING ARE CRIMES OF BOTH TYPES
THEFT OF HARDWARE
- Hardware theft can range from shoplifting an accessory in a computer store to removing a laptop
or cellular phone from someone’s car. Professional criminals may steal shipments of
microprocessor chips off a loading dock or even pry cash machines out of shopping-center walls.
THEFT OF SOFTWARE
- Pirated software is software obtained illegally, as when you make an illegal copy of a commercial
video game.
THEFT OF ONLINE MUSIC & MOVIES
- Many students may feel that illegally downloading music and movies is a victimless crime, but to
the entertainment industry it is just plain piracy or theft.
THEFT OF TIME & SERVICES
- The theft of computer time is more common than you might think. Probably the biggest instance is
people using their employer’s computer time to play games, do online shopping, or dip into web
pornography. Some people even operate sideline businesses.
THEFT OF INFORMATION
- Clearly, information thieves are having a field day. They have infiltrated the files of the Social
Security Administration, stolen confidential personal records, and sold the information.
INTERNET-RELATED FRAUD
- Internet or online service fraud is a runaway problem, accounting for 90% of all consumer fraud
complaints to the Federal Trade Commission in 2008. The most common complaints, according to
the Internet Crime Complaint Center, were non delivery of merchandise and/or payment (32.9%),
internet auction fraud (25.5%), and credit/debit card fraud (9.0%).
TAKING OVER YOUR PC: ZOMBIES, BOTNETS, & BLACKMAIL
- A zombie, or drone, a computer taken over covertly and programmed to respond to instructions
sent remotely, often by instant-messaging channels. Botnet, short for “robot network,” a network
of computers compromised by means of a Trojan horse that plants instructions within each PC to
wait for commands from the person controlling that network.
CRIMES OF MALICE: CRASHING ENTIRE SYSTEMS
- Sometimes criminals are more interested in abusing or vandalizing computers and
telecommunications systems than in profiting from them. For example, a student at a Wisconsin
campus deliberately and repeatedly shut down a university computer system, destroying final
projects for dozens of students; a judge sentenced him to a year’s probation, and he left the
campus.
4. Computer criminals
INDIVIDUALS OR SMALL GROUPS
- These include individuals or members of small groups who use fraudulent email and websites to
obtain personal information that can be exploited, either for monetary gain or sometimes simply to
show off their power and give them bragging rights with other members of the hacker/ cracker
community.
EMPLOYEES
- Workers may use information technology for personal profit or to steal hardware or information to
sell. They may also use it to seek revenge for real or imagined wrongs, such as being passed over
for promotion; indeed, the disgruntled employee is a principal source of computer crime.
OUTSIDE PARTNERS & SUPPLIERS
- Suppliers and clients may also gain access to a company’s information technology and use it to
commit crimes, especially since intranets and extranets have become more commonplace. Partners
and vendors also may be the inadvertent source of hacker mischief because their systems may not
be as well protected as the larger partner’s networks and computers, and so a third party may
penetrate their security.
CORPORATE SPIES
- Competing companies or individuals may break into a company’s computer system to conduct
industrial espionage—obtain trade secrets that they can use for competitive advantages.
ORGANIZED CRIME
- Members of organized crime rings not only steal hardware, software, and data; they also use spam,
phishing, and the like to commit identity theft and online fraud. Even street gangs now have their
own web sites, most of them perfectly legal, but some of them possibly used as chat rooms for drug
distribution. In addition, gangs use computers the way legal businesses do—as business tools—but
they use them for illegal purposes, such as keeping track of gambling debts and stolen goods.
CYBERWAR FIGHTERS
- Cyberwarfare, or cyberwar, is the use of computers and the internet to attack an enemy’s
information systems.
SECURITY: SAFEGUARDING COMPUTERS & COMMUNICATIONS
We consider five components of security
1. Deterrents to computer crime
What are some ways to deter computer crime?
ENFORCING LAWS
- Law enforcement agencies regularly cruise online bulletin boards and chat rooms looking for
pirated software, stolen trade secrets, child molesters, and child pornography.
Tools used to detect fraud are the following:
○ Rule-based-detection software
○ Predictive-statistical-model software
○ Employee internet management (EIM) software
○ Internet filtering software
○ Electronic surveillance
2. Identification and access
There are three ways a computer system can verify that you have legitimate right of access. Some security
systems use a mix of these techniques. The systems try to authenticate your identity by determining
(1) what you have. (CARDS, KEYS, SIGNATURES, & BADGES)
(2) what you know. (PINS & PASSWORDS)
(3) who you are. (PHYSICAL TRAITS)
3. Encryption
- is the process of altering readable data into unreadable form to prevent unauthorized access,
and it is what has given people confidence to do online shopping and banking. Encryption is
clearly useful for some organizations, especially those concerned with trade secrets, military
matters, and other sensitive data.
PROTECTION OF SOFTWARE & DATA
Control of Access - Access to online files is restricted to those who have a legitimate right to access
Audit Controls - a record of how a transaction was handled from input through processing and output.
People Controls - people are the greatest threat to a computer system.
4. Protection of software and data - is a method of restoring information-processing operations that
have been halted by destruction or accident.
Surveillance - implies an agent who accesses (whether through discovery tools, rules or physical/logistical
settings) personal data.
Privacy - is the right of people not to reveal information about themselves.
SPREADSHEET
Excel - a software program created by Microsoft that uses spreadsheets to organize numbers and data
with formulas and functions. Excel analysis is ubiquitous around the world and used by businesses of all
sizes to perform financial analysis.
What is excel used for?
Excel is typically used to organize data and perform financial analysis. It is used across all business
functions and at companies from small to large.
The main uses of Excel include:
● Data entry
● Data management
● Accounting
● Financial analysis
● Charting and graphing
● Programming
● Time management
● Task management
● Financial modeling
● Customer relationship management (CRM)
● Almost anything that needs to be organized!

Cell – The small blocks on the grid, which are the intersections between a row and a column.
Column – A vertical set of cells, and are labeled with letters.
Row - A horizontal set of cells, and are labeled with numbers.
Range – A selection of cells extending across a row, column or both.
Function – A built-in operation from the spreadsheet app. Which can be used to calculate cell, row,
column, or range values, manipulate data and more.
Formula – The combination of functions, cells, row, columns, and ranges used to obtain a specific result.
Worksheet – is represented by a grid, much like a graphing paper.
Spreadsheet – The entire document containing your worksheet.
Range of Cells. A way to declare a range of cells is to indicate the beginning cell and last cell separated by
a colon (:).
Common functions used in Excel:
● Sum (range) – used to compute the total of all items in the specified range.
● Average (range) – used to get the average of the items in a range.
● Count (range) – used to count the values found in the range.
● Max (range) – used to get the largest value within the range.
● Min (range) – used to get the smallest value within the range.

DATABASE MANAGEMENT SYSTEM


Definitions
❖Data: Raw, unprocessed facts

Ex: 25, Misha, Bangalore


❖Information: Processed data

Ex: The age of Misha is 25.


❖Database: Collection of related data

Ex: Online banking system, library management system


❖ Meta-data: The database definition
Database Management System - a collection of related information organized in a manner that provides
for rapid search a retrieval.
FUNCTIONALITIES
❑Define: Specifying the data type, structures and constraints for the data to be stored.

❑Construct: process of storing data on some storage medium.

❑Manipulate: Querying the database to retrieve specific data, updating database and generating reports.

❑Share: Allows multiple users and programs to access the database concurrently.

Database Structure
A table is composed of columns and rows, referred to as fields and records in Access.

Following is a description of the three table components identified in the above image:
The rows in the table are called records. Each record is a group of related fields, such as all of the
information regarding each member in a membership database or each customer in a customer table.
The columns in the table are called fields. Each field contains a specific piece of information within a
record within a record.
The primary key, which is assigned to a field, uniquely identifies each record in a table. It tells the
database program how your records will be sorted, and it prevents duplicate entries. In the image, the
primary key is the Contact ID field.
EXPLORE MS ACCESS ENVIRONMENT
MICROSOFT ACCESS
– a "relational" database application. Relational means we can link together sets of data, we can relate the
data.

In Access the data is saved in Tables. As the data in the Tables change, the rest of the Access database
will reflect the newest information (i.e. the Queries, Forms and Reports). Queries show the data in a Table
format.
A Query can pull from multiple Tables and allow you to limit the records (rows) display by using criteria
and showing only the fields (columns) you want.
Forms can be created to provide a "user‐friendly" side to your database. They are used to view and enter
your data in an interactive formatted structure. Forms are also used to make menus and search windows
that turn a simple data collection tool into a more interactive user‐friendly application.
Planning the Database
1. Input – What data do I already have for the database?
2. Output – What information do I want to get out of the database?
3. Process – What do I need to do to get there?
TABLES
Tables store data. The Tables are the true 'database' (base of data). These need to be created and
properly linked (related) in order to effectively use the other Access tools. Tables are the core of your
database, everything else in Access depends on the Tables.

QUERIES
Queries show a selection of data based on criteria (limitations) you provide. Queries can pull from one or
more related Tables and/or other Queries.
FORMS
Most Forms display one record at a time, in a formatted user‐friendly environment. You can build your
Form so it will display multiple records. As you develop Forms you can create navigation buttons, insert
graphics, and change the colors to display everything consistently. Forms have three basic views: Design
View, Layout View, and Form View. Your record source can be a Table or Query.
The data entered or modified in a Form is automatically saved to the Table. The Table is the true location
of the data; the Form is a "pretty" way to view/modify/create the data

Basic Access Objects Access consists of four main database objects:


REPORTS
Reports are designed to create an organized output of data from your database. With a Report, you can
group and summarize information. You can't edit the data in a Report, but if you make the modifications
in the Table, Query, or Form you will see the results when you open the Report again. Reports have four
basic views: Report View, Print Preview, Layout View, and Design View.
MANAGING DATA IN A TABLE
The Navigation Pane: The Navigation Pane is a
list containing every object in your database. For easier
viewing, the objects are organized into
groups by type. You can open, rename, and delete
objects using the Navigation Pane.
To Minimize and Maximize the Navigation Pane:
Click the double arrow in the upper-right corner of the of the
Navigation Pane to minimize and maximize.

Sorting the Objects in the Navigation Pane:


By default, objects are sorted by type, with the
tables in one group, the forms in another,
etc. However, you can change how the objects are sorted.
Click the drop-down arrow to the right of the
All Access Objects and click on a sort option from the list.

CREATING A DATABASE
1. Start access
2. Click on Blank desktop database

3.Under File Name type a name for the database


4. To change the location of where to store the database, click the folder icon and select a location
5.Click create
Access opens in a new table in Datasheet View.
❖ Understanding Views: There are multiple ways to view a database object. The two views for tables
are Design View and Datasheet View.
❖ Design View is used to set the data types, insert or delete fields, and set the Primary Key
❖ Datasheet View is used to enter and view the data for the records
❖ Switching Between Design View and Datasheet View: Click the View arrow on the Home tab and
click on either
Datasheet View or Design View

Creating a Table:
A table is a collection of data about a specific topic, such as employee information, products or customers.
The first step in creating a table is entering the fields and data types. This can be done in either Datasheet
View or Design View but it is recommended to set up the table in Design View.
To Create a Table in Design View:
1. Click on the Create tab
2. Click on Table
3. Switch over to Design View on the Home tab
4. If prompted to save the table, enter a name and click on OK
5. Type the field names and select the appropriate data type for each field
6. Continue until all fields are added Note: The order that you enter the field names is the order the
fields will appear in the table.

Setting a Primary Key:


The Primary Key is the unique identifier for each record in a table. Access will not allow duplicate entries
in a primary key field. When creating a new table, Access automatically creates a field “ID” with the
autonumber data type, and assigns this as the Primary Key.
To Set a Primary Key:
1. In Design View, position your cursor in the field you wish to set as the Primary Key
2. Click the Primary Key button on the toolbar
3. Save the table

Input Masks:
An input mask is used to pre-format a field to “look/act” a certain way when a user inputs data. Examples:
Social Security Number input mask automatically inserts the dashes; phone numbers automatically inserts
the parentheses and dashes. The input mask data can either be stored in the table or simply displayed
and not stored.
To Create an Input Mask for a Field:
1. In Design View, click in a field for which you’d like to apply an input mask
2. In the Field Properties section at the bottom of the screen, click in the Input Mask line and notice
the Build button that appears at the right end of the line
3. Click the Build button to start the Input Mask Wizard (shown below).

4. Select the appropriate input mask


5. Click Next
6. Click Next for additional screens on which you can set options for the input mask
7. Click Finish on the last screen of the input mask wizard
To save the table:
1. Click the Save icon on the toolbar
2. Enter a name for the table if you haven’t done so already
3. Click Ok
Entering Data in a Table:
1. In Datasheet View, start typing the data into the table by pressing the tab key to move to the next
cell
2. When you have completed the record (row), press Enter 3. You can also click on the New record
icon on the Home tab in the Records group

Navigating in a Table:
Use the arrows at the bottom of the table to navigate among records.
Sorting Records in a Table
1. Position your cursor in the field that you wish to sort by clicking on any record in the table
2. Click either the Sort Ascending or Sort Descending icon on the
Home tab in the Sort & Filter group

Create Form and Report


Creating a Form:
A form is a database object that is used to enter or display data in a database. To create a Form:
1. Open the table or query on which you are basing the form
2. Click on the Create tab.
3. Click on Form in the Forms group
A form is created and opens in Layout View.
Sample Form

Reports
Reports can be based on tables or queries. To Create a Report:
1. Open the table or query on which you are basing the report
2. Click on the create tab
3. Click on Report in the Reports group
A Report is created in Layout View
Sample Report

Printing Reports
To print a report
1. Switch to Print Preview from View on the Design tab under Report Layout Tools
2. Click the print icon
3. Click on OK

Different Views
Print Preview – allows you see what the report would look like on a printed piece of paper
Report View – allows you to see the data without having to display it in
Print Preview Layout View – allows you make design changes while browsing your data
Design View - gives you a more detailed view of the structure of your report
Queries: You use queries to view, change, and analyze data in different ways.
You can also use them as a source of records for forms and reports. To Create a Query:
1. Click on the Create tab
2. Click on Query Design in the Queries group
3. Select the table that you would like to base your query on
4. Click Add
5. Repeat steps 3 and 4 until all tables are added
6. Close the Show Table window
The table(s) will now be displayed in the upper part of the
Query Design Screen by boxes containing the tables’ fields

S l
7. Double-click on the field names in the field list window which you would like to include in the query

Defining Criteria in the Query: In order to control which records are displayed, you must define criteria in
a query. The most common type of query is the Select Records query which will be discussed below.
To Define Criteria for Your Query:
1. Position your cursor in the criteria row in the field for which you wish to define the criteria for 2. Type
the criteria
Example: To find all Excel courses:
3. Position your cursor in the criteria row of the Course ID field
4. Type Excel (Access adds the quote marks to the criteria automatically when you tab to the next
column)
5. Click the run query button
To Save the Query:
1. Click the Save icon
2. Enter a name for a query
3. Click OK
DIGITAL LAWS AND ETHICS AND BUSINESS
Computer and Internet Cyber Crimes
1. Phishing
Phishing is when criminals send fraudulent emails pretending to be from legitimate businesses, in an
attempt to collect sensitive, personal information. Often, any links in the email will redirect to a website
owned by the scammer, so always be careful about what information you give out on the Internet.
2. Harassment
Cyberstalkers use electronic communication, such as email, social media, or websites to stalk and harass
people. Forms of online harassment include slander, libel, false accusations, threats, or any other behavior
that demeans or embarrasses someone. Sentences for cyberstalking can include jail time and hefty fines.
3. Ransomware
Cyber criminals can install malicious software on your system that will essentially hold your important
information hostage until you meet their demands. A common ransomware attack will shut down a
victim’s computer or encrypt their files, agreeing to release them only if the victim pays a ransom. All too
often, however, the files are never recovered.
4. Prostitution
Many escorts will advertise their services in online classifieds, social media forums, or their own personal
websites, making it easy and discreet for people to find them. But since prostitution is illegal in the vast
majority of the United States, both the escort and the client are committing a crime.
5. Child Pornography & Solicitation
The National Center for Missing and Exploited Children received over 10 million reports of suspected child
sexual exploitation in the last year alone. Perpetrators will use the Internet to gain access to sexually
explicit images of children, and sometimes even arrange for a face-to-face meeting.
6. Intellectual Property Theft
More commonly known as piracy, the Internet abounds with books, music, movies, and more that have
been illegally obtained and made available for free download. Despite what some people say, piracy is not
a victimless crime. Not only do artists and creators lose out, but many illegal downloads also contain
hidden malware that can destroy your computer.
7. Account Hacking
We all know how important it is to guard our passwords – think about the damage someone could do if
they gained access to your email account containing all your most personal information. If someone logs
ainto your email, social media, or computer without authorization, they could potentially face jail time.
8. Drug Trafficking
With the rise of cryptocurrency, the online drug trade has increased significantly over the past few years.
Illegal drugs such as marijuana, cocaine, meth, ecstasy, and heroin are all just a few clicks away – and
according to research by the Rand Corporation, over 35% of worldwide revenues from online drug
trafficking are based in the United States.
9. Credit Card Fraud
Half of all credit card fraud begins with spyware, malicious software unknowingly installed on a victim’s
computer or handheld device. Spyware runs in the background, collecting your data and sending it back
to the criminal, who then uses your card to make fraudulent purchases.
Applicable Philippine Laws that Penalize Cybercrime
Cybercrime also called computer crime is the use of a computer as an instrument to further illegal ends
such as committing fraud, trafficking child pornography, intellectual property violations, stealing identities
or violation of privacy. The difference between traditional criminal offenses from cybercrime is the use of
the computer in committing such offenses. Majorlycybercrime is an attack on the information of
Individuals, governments or corporations.
To combat and prevent cybercrime, the government of the Philippines introduced the Republic Act
No.101175 or Cyber Prevention Act of 2012. This Act was signed by the President of the Philippines
Mr.Benigno Aquino on September 12th of 2012. The original goal of this Act was to penalize acts like
cybersex, child pornography, identity theft etc.
The key provisions of the Cybercrime Prevention Act of 2012 There are sixteen types of cybercrime
covered under the Cybercrime Prevention Act of 2012. They are:
Illegal Access: Access to a computer or any application without permission.
Illegal Interception: Interception of any non-public communication of computer data to, from, or within a
computer system by an unauthorized person.
Data Interference:.Unauthorized tampering with, destroying, deleting, or deteriorating computer data,
electronic documents, or electronic data messages, as well as the introduction or transmission of viruses.
This provision can also cover authorized activity if the person’s behavior went beyond the agreed-upon
scope and resulted in the damages listed in this provision.
System Interference: Unauthorized interference with the operation of a computer or computer network,
including the introduction or transmission of viruses, by inputting, transmitting, damaging, deleting,
deteriorating, altering, or suppressing computer data or programmes, electronic data messages, or by
deleting, deteriorating, altering, or suppressing them.
Misuse of devices: Unauthorized use, possession, production, sale, procurement, importation, distribution,
or otherwise making available of gadgets, computer programmes, or other materials developed or
adapted for committing any of the acts listed in Republic Act 10175. Unauthorized use of a computer
password, access code, or similar data that allows the entire or a portion of a computer system to be
accessed with the intent of using it to perpetrate any of the offences listed in Republic Act 10175.
Cybersquatting: Acquisition of a domain name in bad faith on the internet to profit, deceive, harm
reputation, and prevent others from registering it. This includes trademarks that were already registered
at the time of registration, names of people other than the registrant, and trademarks that were
purchased with intellectual property interests in them.
Computer Related Forgery: Unauthorized input, alteration, or deletion of computer data that results in
inauthentic data with the intent that it be considered or acted on for legal purposes as if it were authentic,
regardless of whether the data is directly readable and intelligible; or the act of knowingly using computer
data that is the product of computer-related forgery as defined here to perpetuate .
Computer-Related Fraud: Unauthorized access to, alteration of, or deletion of computer data or
programmes, or interference with the operation of a computer system, with the purpose to cause damage.
Computer-Related Identity Theft: Unauthorized acquisition, use, abuse, transfer, possession, change, or
deletion of an individual’s identifying information, whether natural or legal.
Cybersex: For favor or consideration, willful engagement, maintenance, control, or operation, directly or
indirectly, of any lascivious presentation of sexual organs or sexual activity via a computer system.
Child Pornography: Unlawful or banned activities conducted through a computer system, as defined and
punished by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009.
Libel: Acts of libel that are illegal or forbidden under Article 355 of the Revised Penal Code, as amended,
and are committed using a computer system or any other similar means that may be created in the future.
Penal Code Revision According to Article 355 Libel is defined as defamation of character by writings or
other means. Libel committed by writing, printing, lithography, engraving, radio, phonograph, painting,
theatrical exhibition, cinematographic exhibition, or any other similar means is punishable by prison
correctional for the minimum and medium periods, or a fine ranging from 200 to 6,000 pesos, or both, in
addition to any civil action that the offended party may bring.
Aiding or Abetting in the commission of cybercrime: Anyone who knowingly assists or abets the conduct
of any of the offenses listed in this Act will be held accountable.
Attempt in the commission of cybercrime: Any person who willfully attempts to commit any of the
offenses enumerated in this Act shall be held liable..All crimes defined and penalized by the Revised Penal
Code, as amended, and special laws, if committed by, through and with the use of information and
communications technologies shall be covered by the relevant provisions of this Act.
Corporate Liability: (Section 9): When any of the punishable acts herein defined are knowingly committed
on behalf of or for the benefit of a juridical person by a natural person acting either individually or as part
of an organ of the juridical person who has a leading position within, based on: (a) a power of
representation of the juridical person provided the act committed falls within the scope of such authority;
or (b) an authority to make decisions on behalf of the juridical person. It also includes the commission of
any of the penal acts made possible due to the lack of supervision, provided that the act committed falls
within the scope of such authority; or(c) an authority to exercise control inside the juridical person.
Intellectual Property Law: deals with laws to protect and enforce rights of the creators and owners of
inventions, writing, music, designs and other works, known as the "intellectual property."
There are several areas of intellectual property including copyright, trademarks, patents, and trade
secrets.
Copyright Law- protects the rights of creators in their works in fine arts, publishing, entertainment, and
computer software. The laws protect the owner of the work if others copy, present, or display the owner's
work without permission.
Trademark Law- protects a word, phrase, symbol or design that is used by an entity to identify its product
or service. Examples are Dunkin Donuts orange and pink sausage style lettering, Apple’s apple logo, and
Adidas’ three stripes.
Patent Law- grants protection for new inventions which can be products, processes or designs and
provides a mechanism for protection of the invention.The patent law promotes the sharing of new
developments with others to foster innovation.
Trade Secrets - are business practices, formulas, designs or processes used in a business, designed
specifically to provide a competitive advantage to a business.
Social Networking - refers to the use of internet-based social media sites to stay connected with friends,
family, colleagues, or customers. Social networking can have a social purpose, a business purpose, or both,
through sites like Facebook, Twitter, Instagram, and Pinterest.
Major Social Networking Platforms
❑ Facebook
a social network that offers users the opportunity to connect with people, businesses, and organizations.
They can post updates and respond to the posts of others. They can share photographs and links to
online content. Users can chat live, and upload and share video.
❑ Instagram
Instagram is a social network that focuses on sharing visual media like photos and videos. It's similar to
Facebook in that users create a profile and have a news feed. It allows users to upload media that can be
edited with filters and organized by hashtags and geographical tagging. Posts can be shared publicly or
with followers.
❑ Twitter
Twitter is a social network that allows people to communicate with short messages called tweets. Tweets
are limited by the social platform to 280 characters. Users post tweets that may be useful, interesting, or
even inflammatory for readers.
❑ Pinterest
Pinterest is a social networking site that promotes image saving and sharing using a virtual pinboard. It's
an innovative platform that facilitates the cataloging and organizing of meaningful information for
individuals.

You might also like