Documente Academic
Documente Profesional
Documente Cultură
ETHICS IN BUSINESS
Prepared by:
Mrs. Gorgonia Lopez-Famadico
COMPUTER AND
INTERNET CRIMES
COMPUTER CRIME OR CYBERCRIME
- refers,more precisely, to
criminal exploitation of the
internet.
COMPUTER CRIME OR CYBERCRIME
- is an attack on an information
system that takes advantage of
a particular system
vulnerability.
TYPES OF EXPLOITS
1. Computer Viruses
2. Worms
3. Trojan Horses
4. Botnet
5. Distributed Denial-of-Service Attacks
6. Rootkit
7. E-mail Spam
8. Phishing
9. Computer Fraud
TYPES OF PERPETRATORS
1. Hackers
2. Malicious Insider
3. Industrial Spies
4. Cybercriminals
5. Hacktivism and Cyberterrorists
CYBER CRIME
LAW
Republic Act No. 10175
An act defining cybercrime, providing for
the prevention, investigation, supression
and the imposition of penalties thereof
and for other purposes.
Electronic Commerce Act of 2000
(RA No. 8792)
An act providing for the recognition
and use of electronic commercial and
non-commercial transactions and
documents, penalties for unlawful
use thereof and for other purposes.
Electronic Commerce Act of 2000
(RA No. 8792)
An act providing for the recognition
and use of electronic commercial and
non-commercial transactions and
documents, penalties for unlawful
use thereof and for other purposes.
ACCESS
Refers to the instruction, communication with, storing
data in, retrieving data from, or otherwise making use of
any resources of a computer system of communication
network
CYBER
Refers to a computer or a computer network,
the electronic medium in which online
communication takes place
INTERCEPTION
Refers to listening to, recording, monitoring
or surveillance of the content of
communications, including procurement of
the content of data, either directly, through
access and use of a computer system or
indirectly, through the use of electronic
eavesdropping or tapping devices, at the
same time that the communication is
occuring.
Offenses against the confidentiality,
integrity and availability of computer data
and systems
1. Illegal Access
2. Illegal Interception
3. Data Interference
4. System Interference
5. Misuse of Devices
6. Cyber-squatting
Computer-related Offenses
1. Computer Forgery
2. Compuiter-related Fraud
3. Computer-related Identity Theft
Content-related Offenses
1. Cybersex
2. Child Pornography
3. Unsolicited Commercial Communications
4. Libel
TEN COMMANDMENTS OF COMPUTER ETHICS
1. Messaging
2. News
3. Communities
4. Like Buttons
5. Games
6. Audio and Video Uploads