Digital Laws and Ethics in Business

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Digital Laws and Ethics in Business (ms word)

1. Alternatively known as cybercrime, e-crime, electronic crime, or hi-tech crime. Computer crime is an act performed by a
knowledgeable computer user, sometimes called a "hacker," that illegally browses or steals a company's or individuals private
information.
2. In most cases, someone commits a computer crime to obtain goods or money. Greed and desperation are powerful
motivators for some people to try stealing through computer crimes. Some people may also commit a computer crime
because they are pressured, or forced, to do so by another person.
3. Cybercrime is any criminal activity that involves a computer, networked device or a network.
4. While most cybercrimes are carried out in order to generate profit for the cybercriminals, some cybercrimes are carried out
against computers or devices directly to damage or disable them.
5. This theory suggests that individuals engage in computer crime because they believe it is a profitable and low-risk activity. In
other words, they weigh the potential benefits of committing a crime against the potential risks of getting caught and
punished.
6. This theory argues that individuals learn to engage in computer crime through observing the behaviors of others, particularly
those who are close to them. They may also be influenced by media portrayals of hackers as glamorous and successful.
7. This theory posits that individuals engage in computer crime when they experience strain or pressure in their lives, such as
economic hardship or social exclusion. Computer crime may provide a way for them to alleviate their stress or gain a sense of
power and control.
8. This theory suggests that computer crime occurs when there is a convergence of three factors: a motivated offender, a
suitable target (such as a vulnerable computer system), and the absence of capable guardians (such as effective cyber
security measures).
9. This theory proposes that individuals who engage in computer crime have low levels of self-control, which makes them more
likely to act impulsively and make decisions without considering the consequences.
10. Is a segment of code or a program that maliciously takes advantage of vulnerabilities or security flaws in software or
hardware to infiltrate and initiate a denial-of-service (DoS) attack or install malware, such as spyware, ransom ware, Trojan
horses, worms, or viruses.
11. A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular
vulnerability the system offers to intruders.
12. An exploit is a program, or piece of code, designed to find and take advantage of a security flaw or vulnerability in an
application or computer system, typically for malicious purposes such as installing malware.
13. An exploit is a code that takes advantage of a software vulnerability or security flaw. It is written either by security
researchers as a proof-of-concept threat or by malicious actors for use in their operations.
14. A computer program that can copy itself and infect a computer without permission or knowledge of the user.
15. A virus might corrupt or delete data on a computer, use e-mail programs to spread itself to other computers, or even erase
everything on a hard disk. See malicious code.
16. is a type of malicious software (malware) that replicates while moving across computers, leaving copies of itself in the
memory of each computer in its path.
17. is self-replicating malware that duplicates itself to spread to uninfected computers. Learn more about worms and how to
defend against them.
18. is a type of malware that downloads onto a computer disguised as a legitimate program.
19. is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious
20. a blend of "robot" and "network," is a network of computers infected by malware and under the control of a single attacking
party known as the "bot-herder."
21. are networks of hijacked computer devices used to carry out various scams and cyberattacks.
22. it is a cybercrime in which the attacker floods a server with internet traffic to prevent users from accessing connected online
services and sites.
23. the attacker enlists the help of (many) thousands of Internet users to each generate a small number of requests which,
added together, overload the target.
24. malware is a collection of software designed to give malicious actors control of a computer network or application.
25. is a type of malware designed to give hackers access to and control over a target device.
26. also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email. The name comes
from a Monty Python sketch in which the name of the canned pork product Spam is ubiquitous, unavoidable, and repetitive.
27. is the most common type of social engineering, the practice of deceiving, pressuring or manipulating people into sending
information or assets to the wrong people.
28. happens when a victim acts on a fraudulent email that demands urgent action
29. is defined in federal law in the Computer Fraud and Abuse Act (CFAA) as the access of a protected computer without
authorization or exceeding authorization.
30. is any kind of fraud that is committed by means of a computer system. It typically involves making illicit financial transfers
through computer commands.
31. an individual who uses computer, networking or other skills to overcome a technical problem. The term also may refer to
anyone who uses their abilities to gain unauthorized access to systems or networks in order to commit crimes.
32. are unauthorized users who break into computer systems in order to steal, change or destroy information,
33. previously known as white hat hackers -- strive to operate in the public's best interest rather than to create turmoil. Many
ethical hackers who work doing pen testing were hired to attempt to break into the company's networks to find and report
on security vulnerabilities.
34. previously known as black hat hackers –
35. intentionally gain unauthorized access to networks and systems with malicious intent. This includes stealing data, spreading
malware or profiting from ransomware, vandalizing or otherwise damaging systems, often in an attempt to gain notoriety.
Threat actors are criminals by definition because they violate laws against accessing systems without authorization, but they
may also engage in other illegal activity, including corporate espionage, identity theft and distributed denial-of-service
(DDoS) attacks
36. fall somewhere between ethical hackers and threat actors. While their motives may be similar to those two groups, gray hats
are more likely than ethical hackers to access systems without authorization; at the same time, they are more likely than
threat actors to avoid doing unnecessary damage to the systems they hack.
37. also called eagle-eyed or vigilante hackers, are similar to ethical hackers. Red hat hackers intend to stop unethical attacks by
threat actors. While red hat hackers may have a similar intent to ethical hackers, they differ in methodology, as red hat
hackers may use illegal or extreme courses of action.
38. also known as vengeful hackers, use hacking as a social weapon. Frequently, it is used as a means for revenge against a
person, employer or other organization. Hackers who post personal and confidential data online to ruin reputations or
attempt to gain unauthorized access to email and social media accounts are classified as blue hats.
39. are amateur, inexperienced hackers who attempt to use pre-written scripts in their hacking efforts. Often, these are fledgling
hacking enthusiasts who cause little damage.
40. are organizations of hackers that use cyber-attacks to affect politically motivated change. The purpose is to bring public
attention to something the hacktivist believes might be a violation of ethics or human rights. Hacktivism attacks may attempt
to reveal evidence of wrongdoing by publicizing private communications, images or information.
41. A malicious insider is an insider who intends to cause damage to the organization for personal gain.
42. A recently fired employee selling sensitive information to a competitor. A disgruntled employee exposing trade secrets to the
public. An employee that deletes important records and information to breach compliance regulation.
43. Industrial espionage is the illegal and unethical theft of business trade secrets for use by a competitor to achieve a
competitive advantage.
44. individuals or teams of people who use technology to commit malicious activities on digital systems or networks with the
intention of stealing sensitive company information or personal data, and generating profit.
45. Derived from combining the words 'Hack' and 'Activism', hacktivism is the act of hacking, or breaking into a computer
system, for politically or socially motivated purposes.
46. methods may include data theft, distributed denial of service (DDoS) attacks, website defacement, or the use of social media
to spread awareness about a cause.
47. is the convergence of cyberspace and terrorism. It refers to unlawful attacks and threats of attacks against computers,
networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of
political or social objectives.
48. is nonviolent use of illegal or legally ambiguous digital tools in pursuit of political ends. Cyberterrorism consists of politically
motivated illegal attacks against information, computer systems, programs and data resulting in violence against
noncombatant targets.
49. “Cybercrime Prevention Act of 2012” which addresses crimes committed against and through computer systems on 12
September 2012. It includes penal substantive rules, procedural rules and also rules on international cooperation.
50. The Cybercrime Prevention Act of 2012 sanctions content-related offenses performed using a computer system, such as
cybersex, child pornography, and libel. In addition, unsolicited commercial communications or content that advertises or sells
products or services is also punished.
51. Republic Act 8792 orThe Electronic Commerce Act of 2000 (the "Act") aims to facilitate domestic and international
transactions through the utilization of electronic mediums and technology to recognize the authenticity and reliability of
electronic documents.
52. Under the law, E-commerce Act applies to any kind of data message and electronic document used in the context of
commercial and non-commercial activities to include domestic and international dealings, transactions, arrangements,
agreements, contracts and exchanges and storage of information.
53. Access, in the context of security, is the privilege or assigned permission to use computer data or resources in some manner.
54. is a prefix that denotes a relationship with information technology (IT). Anything relating to computing, such as the internet,
falls under the cyber category. It's worth noting cyber carries a connotation of a relationship with modern computing and
technology.
55. The action of stopping and catching something or someone before that thing or person is able to reach a particular place.
56. allow unauthorized users to access our data, applications, or environments, and are primarily an attack against
confidentiality.
57. a malicious actor can access private or confidential information with no legitimate authorization.
58. A person gains logical or physical access without permission to a network, system, application, data, or other resource.
59. A person commits the criminal offense of illegal access to a computer system when he or she accesses the whole or any part
of a computer system without right.
60. The crime of “illegal interception” is the “interception made by technical means without right of any non-public transmission
of computer data to, from, or within a computer system including electromagnetic emissions from a computer system
carrying such computer data.”
61. The crime of “illegal interception” is the “interception made by technical means without right of any non-public transmission
of computer data to, from, or within a computer system including electromagnetic emissions from a computer system
carrying such computer data.”
62. Interference can include suppressing, modifying, adding, transmitting, editing, deleting or otherwise damaging data, systems,
and services.
63. When committed intentionally, the damaging, deleting, deterioration, alteration, or suppression of computer data without
right; includes inputting of malicious.
64. A person commits the criminal offense of interference with computer data when he or she damages, deletes, deteriorates,
alters, or suppresses com
65. Person may make available on the Internet information outlining security weaknesses in a computer system.
66. “Misuse of Devices,” intends to criminalize the intentional possession of or trafficking in “hacker tools” designed to facilitate
the commission of a crime.
67. The term cybersquatting refers to the unauthorized registration and use of Internet domain names that are identical or
similar to trademarks, service marks, company names, or personal names.
68. When a perpetrator alters documents stored in computerized form, the crime committed may be forgery. In this instance,
computer systems are the target of criminal activity.
69. Using someone else's computer to access personal information with the intent to use it fraudulently. Installing spyware or
malware to engage in data mining. Violating copyright laws by copying information with the intent to sell it.
70. Identity theft occurs when someone uses another person's private information to commit fraud. Identity thieves often apply
for loans or open bank accounts and credit cards in other people's names.
71. activities include not only viewing and/or downloading pornography along with masturbation,
72. also called computer sex, Internet sex, netsex and, colloquially, cyber or cybering, is a virtual sex encounter in which two or
more people have
73. trafficking, or online sexual exploitation, is a cybercrime and a form of modern slavery.
74. is pornography that unlawfully exploits children for sexual stimulation. It may be produced with the direct involvement or
sexual assault of a child or it may be simulated child pornography.
75. A common scenario is your mobile or office phone ringing for a few brief minutes from an unknown number. Upon
answering, the caller hangs up to try and get you to return the call.
76. Unsolicited communications or spam refers to emails or mobile messages that advertise products and services to a large
group of recipients without their prior request or consent.
77. refers to unlawful or prohibited acts of libel committed through a computer system or any other similar means that may be
devised in the future.
78. is a term used when someone has posted or emailed something that is untrue and damaging about someone else on the
Internet, including in message boards, bulletin boards, blogs, chat rooms, personal websites, social media, social networking
sites, or other published articles.
79. (4) Libel. – The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended,
committed through a computer system or any other similar means which may be devised in the future.”
80. If punishable acts in Section 4(a) are committed against critical infrastructure, the penalty of reclusion temporal or a fine of
at least Five hundred thousand pesos (PhP500,000.00) up to maximum amount commensurate to the damage incurred or
both, shall be imposed.
81. Intellectual Property law deals with laws to protect and enforce rights of the creators and owners of inventions, writing,
music, designs and other works, known as the "intellectual property." There are several areas of intellectual property
including copyright, trademarks, patents, and trade secrets.
82. It shall protect and secure the exclusive rights of scientists, inventors, artists and other gifted citizens to their intellectual
property and creations, particularly when beneficial to the people, for such periods as provided in this Act. The use of
intellectual property bears a social function.
83. Republic Act No. 8293 [An Act Prescribing the Intellectual Property Code and Establishing the Intellectual Property Office,
Providing for Its Powers and Functions, and for Other Purposes] otherwise known as the Intellectual Property Code of the
Philippines.
84. 8293, the “Intellectual Property Code of the Philippines”, which was signed into law on June 6, 1987 and took effect on
January 1, 1998. The said law abolished the Bureau of Patents, Trademarks and Technology Transfer (BPTT) of the
Department of Trade and Industry (DTI).
85. refers to using internet-based social media sites to stay connected with friends, family, colleagues, or customers. Social
networking can have a social purpose, a business purpose, or both through sites like Facebook, Twitter, Instagram, and
Pinterest.
86. are websites and apps that allow users and organizations to connect, communicate, share information and form
relationships. People can connect with others in the same area, families, friends, and those with the same interests.

You might also like