Vous êtes sur la page 1sur 4

DATO, VENICE B.

IT 6

COMPUTER FRAUD
Computer fraud is any dishonest misrepresentation of fact intended to let
another to do or refrain from doing something which causes loss.

COMPUTER FRAUD/ CRIMES


Altering in an unauthorized way. This requires little technical expertise and is
common form of theft by employees altering the data before entry or
entering false data, or by entering unauthorized instructions or using
unauthorized processes;
Altering, destroying, suppressing, or stealing output, usually to conceal
unauthorized transactions. This is difficult to detect;
Altering or deleting stored data;
Bank fraud - is the use of potentially illegal means to obtain money, assets,
or other property owned or held by a financial institution, or to obtain money
from depositors by fraudulently posing as a bank or other financial institution.
Carding - a term describing the trafficking of credit card, bank account and
other personal information online as well as related fraud services. Carding
activities also encompass procurement of details, and money laundering
techniques.
Identity theft - is the deliberate use of someone else's identity, usually as a
method to gain a financial advantage or obtain credit and other benefits in
the other person's name, and perhaps to the other person's disadvantage or
loss.
Extortion - (also called shakedown, outwrestling, and exaction) is a criminal
offense of obtaining money, property, or services from a person, entity,
individual or institution, through coercion.
Theft of classified information - Classified information is material that a
government body claims is sensitive information that requires protection of
confidentiality, integrity, or availability. Access is restricted by law or
regulation to particular groups of people, and mishandling can incur criminal
penalties and loss of respect.
Cyberterrorism - the act of Internet terrorism in terrorist activities, including
acts of deliberate, large-scale disruption of computer networks, especially of
personal computers attached to the Internet, by the means of tools such as
computer viruses.
Cyberextortion - occurs when a website, e-mail server, or computer system
is subjected to or threatened with repeated denial of service or other attacks
by malicious hackers. These hackers demand money in return for promising
to stop the attacks and to offer "protection".
Cyberwarfare - has been defined as "actions by a nation-state to penetrate
another nation's computers or networks for the purposes of causing damage
or disruption,"[1]:6 but other definitions also include non-state actors, such
as terrorist groups, companies, political or ideological extremist groups,
hacktivists, and transnational criminal organizations.
Denial-of-Service (DoS) - attack is an attempt to make a machine or
network resource unavailable to its intended users, such as to temporarily or
indefinitely interrupt or suspend services of a host connected to the Internet.
A distributed denial-of-service (DDoS) is where the attack source is more than
oneand often thousandsof unique IP addresses.
Malware - short for malicious software, is any software used to disrupt
computer operations, gather sensitive information, or gain access to private
computer systems. Malware is defined by its malicious intent, acting against
the requirements of the computer user, and does not include software that
causes unintentional harm due to some deficiency.
Spam - Email spam, also known as junk email or unsolicited bulk email
(UBE), is a subset of electronic spam involving nearly identical messages sent
to numerous recipients by email. The messages may contain disguised links
that appear to be for familiar websites but in fact lead to phishing web sites
or sites that are hosting malware.
Phishing scam - the attempt to acquire sensitive information such as
usernames, passwords, and credit card details (and sometimes, indirectly,
money), often for malicious reasons, by masquerading as a trustworthy entity
in an electronic communication.
Information warfare - is primarily a United States Military concept involving
the use and management of information and communication technology in
pursuit of a competitive advantage over an opponent. Information warfare
may involve collection of tactical information, assurance(s) that one's own
information is valid, spreading of propaganda or disinformation to demoralize
or manipulate the enemy and the public, undermining the quality of opposing
force information and denial of information-collection opportunities to
opposing forces. Information warfare is closely linked to psychological
warfare.

SOURCE: https://en.wikipedia.org/wiki/Computer_crime

PHILIPPINE E-COMMERCE ACT OF 2000


REPUBLIC ACT NO. 8792 OF PHILIPPINES ELECTRONIC COMMERCE ACT OF
2000 by the Senate and House of Representatives of the Republic of the
Philippines, An act providing for the recognition and use of electronic commercial
and non-commercial transactions and documents, penalties for unlawful use thereof
and for other purposes.

SOURCE: http://www.slideshare.net/RaiaR/ecommerce-law-in-the-philippines

PHILIPPINE ANTI CYBERCRIME LAW


The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No.
10175, is a law in the Philippines approved on September 12, 2012. It aims to
address legal issues concerning online interactions and the Internet in the
Philippines. Among the cybercrime offenses included in the bill are cybersquatting,
cybersex, child pornography, identity theft, illegal access to data and libel.

SARBANES-OXLEY ACT OF 2002


The SARBANES OXLEY ACT of 2002 (Pub.L. 107204, 116 Stat. 745, enacted
July 30, 2002), also known as the "Public Company Accounting Reform and Investor
Protection Act" (in the Senate) and "Corporate and Auditing Accountability and
Responsibility Act" (in the House) and more commonly called SarbanesOxley,
Sarbox or SOX, is a United States federal law that set new or expanded
requirements for all U.S. public company boards, management and public
accounting firms. There are also a number of provisions of the Act that also apply to
privately held companies, for example the willful destruction of evidence to impede
a Federal investigation.
The bill, which contains eleven sections, was enacted as a reaction to a
number of major corporate and accounting scandals, including Enron and
Worldcom. The sections of the bill cover responsibilities of a public corporations
board of directors, adds criminal penalties for certain misconduct, and required the
Securities and Exchange Commission to create regulations to define how public
corporations are to comply with the law.

SOURCE: https://en.wikipedia.org/wiki/Sarbanes%E2%80%93Oxley_Act

Vous aimerez peut-être aussi