Professional Documents
Culture Documents
Categories of Cybercrime:
1. Crimes against CIA (Confidentiality, Integrity and Availability)
2. Computer Related Offenses
3. Content Related Offenses
4. Other Cybercrime Offenses
Crimes against CIA:
A. Illegal Access- the unauthorized access to the whole or any part of a computer
- access of any application without right.
A. Illegal Interception – the interception by technical means without any NON-public transmission of computer data
to from or within a computer system
- unauthorized intercepting of a non-public communication
“Man-in-the middle attack (MITM) the one who eavesdrop the communication between the sender and receiver.
B. Data Interference – the intentional or reckless alteration, damaging deletion or deterioration of computer data.
Electronic documents or electronic data message without right.
- including the introduction of transmission of viruses.
- tampering of data intentionally or recklessly.
C. System Interference – the intentional alteration or reckless, hindering or interference with the functioning of a
computer or computer network by: inputting, transmitting, damaging, deleting or deteriorating.
- altering or suppressing computer data or program electronic document or electronic data without right or authority.
D. Misuse of Device- it is the use, production, sale, procurement, importation and distribution of a device including
computer programs for the purpose of committing offenses specified in this act.
“Includes computer passwords, access code any similar Data.”
A. Computer Related Forgery:
The unauthorized input, alteration deletion of any computer data without resulting in inauthentic data, with the intent that
be acted upon for the purpose to appear authentic.
B. Computer- Related Fraud- the unauthorized input, alteration, deletion of any computer data or program
interference in the functioning of a computer system, causing damage. PURPOSE: perpetuate fraud (with fraudulent
intent)
C. Computer Related Identity theft- the intentional acquisition, use, misuses, transfer, possess, alteration or
deletion of identifying information belonging to another.
Other CC Offenses
A. Aiding or Abetting in the Commission of the Cybercrime.
- any person who willfully abets or aids the commission of any of the offenses enumerated in this act shall be held liable.
B. Attempt to the Commission of Cybercrime
- any person who willfully attempts to commit any of the offenses enumerated in this Act shall be held Liable.
Nigerian SCAM- also known as advance fee fraud or 419. The Nigerian Prince scam is a phishing attack when swindlers
reach out to potential victims and promise a large sum of money in return for some help.