Computer Ethics - Computer and Internet Crime 2016
Computer Ethics - Computer and Internet Crime 2016
COMPUTER AND
INTERNET CRIME
Atty. Ramon Antonio A. Ruperto
Other terms
COMPUTER CRIME
Crimes that
target
computers
directly
Crimes
facilitated by
computer
networks or
devices, the
primary target
of which is
independent of
the computer
network or
device
Computer viruses
Denial-of-service (DOS) attacks
Malware
Cyberstalking / cyberbullying
Internet fraud and identity theft
Information warfare
Phishing scams
1.
2.
3.
against
against
against
persons
property
the
1.
2.
3.
unauthorized access
damage to computer data or programs
sabotage to hinder the functioning of a
computer system or network
4. unauthorized interception of data to,
from and within a system or network
5. computer espionage
Cybercrimes
Unauthorized
access
(Hacking)
Theft: goods,
information or
money
Theft of
computer time
Computer
fraud
AREAS OF
COMPUTER
CRIME
Computer
espionage
Identity theft
Harassment
and sexuallyrelated
material
Forgery and
piracy
1. UNAUTHORIZED ACCESS
Hacking / Intrusions
Year
released
Worldwide economic
impact
Storm
2007
ILOVEYOU 2000
$ 8.75 10 billion
Code Red
2001
$ 2.62 billion
SirCam
2001
$ 1.15 billion
Melissa
1999
$ 1.10 billion
Spam
E-mail bombing
2. THEFT OF GOODS,
INFORMATION OR MONEY
Salami attacks
4. COMPUTER FRAUD
Computer Fraud
Phishing
5. CORPORATE ESPIONAGE
6. IDENTITY THEFT
8. HARASSMENT AND
SEXUALLY RELATED MATERIAL
Cyberterrorism
Cyberterrorism
Cyberterrorism
Cyber warfare
Other cybercrimes
Cybersquatting
Typosquatting
Copyright/Trademark infringement
Internet plagiarism
Internet libel/defamation
Bandwidth theft
Characteristics of Philippine
Criminal Law
1.
2.
3.
VBS_LOVELETTER
Punishable acts:
Hacker
Vandalism
(Defacement)
Public interest
Reveal
wrongdoing
THE
COMPUTER
HACKER
Financial gain
As a protest
The challenge
(fun)
Type of
perpetrator
Hacker
Typical motives
Cybercriminal
Hacktivist
Cyberterrorist
Destroy infrastructure
components of institutions
Cracker
Malicious insider
Industrial spy
Hacker Ethics
(established by the early hackers)
Punishable acts:
ORIGIN:
Senate Bill No. 2796: "AN ACT DEFINING
CYBERCRIME, PROVIDING FOR
PREVENTION, INVESTIGATION AND
IMPOSITION OF PENALTIES THEREFOR
AND FOR OTHER PURPOSES
Consolidation of SBNos. 14, 52, 134, 275,
665, 828, 983, 1081, 1475, 1963, 2214,
2451, 2534, 2674, and 2721, Taking Into
Consideration SRNos. 75, 164 and 254
Misuse of Device
Computer-related Offenses
1. Computer-related Forgery
(i) The input, alteration, or deletion of any computer data
without right resulting in inauthentic data with the intent
that it be considered or acted upon for legal purposes as if
it were authentic, regardless whether or not the data is
directly readable and intelligible; or
(ii) The act of knowingly using computer data which is the
product of computer-related forgery as defined herein, for
the purpose of perpetuating a fraudulent or dishonest
design.
2. Computer-related Fraud - The unauthorized input,
alteration, or deletion of computer data or program or
interference in the functioning of a computer system,
causing damage thereby with fraudulent intent:
Computer-related Offenses
3. Computer-related Identity Theft - The
intentional acquisition, use, misuse,
transfer, possession, alteration or deletion
of identifying information belonging to
another, whether natural or juridical,
without right: Provided, That if no
damage has yet been caused, the penalty
imposable shall be one (1) degree lower.
Content-related Offenses
Content-related Offenses
EXCEPTIONS:
(i) There is prior affirmative consent from
the recipient; or
(ii) The primary intent of the
communication is for service and/or
administrative announcements from the
sender to its existing users, subscribers or
customers;
Aiding or Abetting
ISSUES/PROBLEM AREAS
Not all forms of cybercrimes are covered
under our existing laws, including the
Cybercrime Prevention Act of 2012.
ISSUES/PROBLEM AREAS
IT SECURITY
INCIDENTS
A Major Concern
2007
2008
Virus
52%
50%
Insider Abuse
59%
44%
Laptop theft
50%
42%
Unauthorized Access
25%
29%
Denial of Service
25%
21%
25%
21%
Bots
21%
20%
Implementing Trustworthy
Computing
Risk Assessment
2.
4.
7.
8.
Prevention
Passwords
Anti-virus
software
Audit-control
software
Encryption
AUGMENTING
COMPUTER
SECURITY
Biometrics
Access control
software
Firewalls
Passwords
Encryption
Firewalls
Biometrics
Anti-virus sofware
Detection
Response