Podcast
Questions and Answers
What type of software is used to monitor and analyze networks but can also be used to collect individuals' usernames and passwords?
What type of software is used to monitor and analyze networks but can also be used to collect individuals' usernames and passwords?
Which technique involves redirecting users' network traffic to undesired sites?
Which technique involves redirecting users' network traffic to undesired sites?
What is the term used for a type of scam where criminals pretend to be a legitimate business or another innocent party to obtain personal information?
What is the term used for a type of scam where criminals pretend to be a legitimate business or another innocent party to obtain personal information?
Which form of fraud involves victims being promised a financial windfall in return for divulging personal and financial information?
Which form of fraud involves victims being promised a financial windfall in return for divulging personal and financial information?
Signup and view all the answers
What technique involves the placement of floating windows over address bars in web browsers by phishers?
What technique involves the placement of floating windows over address bars in web browsers by phishers?
Signup and view all the answers
Which method is an advanced form of phishing that redirects connections between IP addresses and target servers?
Which method is an advanced form of phishing that redirects connections between IP addresses and target servers?
Signup and view all the answers
In the context of cybercrime, what are criminals attempting to achieve when they use a sniffer?
In the context of cybercrime, what are criminals attempting to achieve when they use a sniffer?
Signup and view all the answers
Which malicious programs are used to monitor and analyze networks for collecting personal information?
Which malicious programs are used to monitor and analyze networks for collecting personal information?
Signup and view all the answers
What is the primary goal of 'pharming' in cybercrimes?
What is the primary goal of 'pharming' in cybercrimes?
Signup and view all the answers
Study Notes
Offenses against Confidentiality, Integrity, and Availability of Computer Data and Systems
- Illegal access to a computer system, or any part of it, without right is a punishable offense.
- Interception of non-public transmission of computer data without right, including electromagnetic emissions, is a punishable offense.
- Data interference, including alteration, damaging, deletion, or deterioration of computer data, electronic documents, or electronic data messages, without right, is a punishable offense.
- System interference, including alteration, hindering, or interference with the functioning of a computer or computer network, without right, is a punishable offense.
- Misuse of devices, including the introduction or transmission of viruses, shall be punished with imprisonment of prision mayor or a fine of not more than Five Hundred Thousand Pesos (P500,000.00), or both.
Exceptions to Illegal Interception
- It is not unlawful for an officer, employee, or agent of a service provider to intercept, disclose, or use a communication in the normal course of employment, while engaged in activities necessary to the rendition of service or to the protection of the rights or property of the service provider.
Penalties for Offenses
- Illegal access, illegal interception, data interference, and system interference shall be punished with imprisonment of prision mayor or a fine of at least Two Hundred Thousand Pesos (P200,000.00) up to a maximum amount commensurate to the damage incurred, or both.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on offenses against the confidentiality, integrity, and availability of computer data, as well as data interference. Learn about the interception and intentional alteration of computer data without authorization.