Unit 6-10
Unit 6-10
Unit 6-10
Going over the technologies in the past and how it has evolved to the
technologies we have in the present gave us an idea of what is possible in the future.
It is with the creativity and ingenuity of us, human beings, that we are able to make
sense of technological developments and turn them into productivity boosting tools.
But technologies are not developed to match exactly what every person needs.
After all, each person has something different to do and to work on. It is thus important
for these technologies to be transformed into something that is geared towards making
every person productive despite the difference in their needs. Technologies are being
specialized. So how exactly does these technologies work?
Data are facts that are recorded and stored. Information is processed data used
in decision making. The value of information is the benefit produced by the information
minus the cost of producing it.
Page | 1
Information Systems
● Set of interrelated components
● Collect, process, store, and distribute information
● Support decision making, coordination, and control
● May also help analyze problems, visualize complex subjects and create new
products
Page | 2
building blocks of an information system because they represent actual day-to-
day business operations.
● People - those who have an interest in an information system are called
stakeholders. Stakeholders include the management group responsible for the
system, the users (sometimes called end users) inside and outside the company
who will interact with the system, and IT staff members, such as systems
analysts, programmers, and network administrators who develop and support
the system.
Page | 3
● Click - Click-only companies are those companies who have a website/online
presence without a physical store. They sell their products through their
website only.
The Internet has drastically reduced the intermediaries within a transaction. Internet-
based commerce is called e-commerce (electronic commerce) or I-commerce (Internet
commerce). The E-commerce includes two main sectors: B2C (business-to-consumer)
and B2B (business-tobusiness).
B2C (Business-to-Consumer)
● Using the Internet, consumers can go online to purchase an enormous variety
of products and services. This new shopping environment allows customers to
do research, compare prices and features, check availability, arrange delivery,
and choose payment methods in a single convenient session.
B2B (Business-to-Business)
● Business-to-business (B2B), also called B-to-B, is a form of transaction between
businesses, such as one involving a manufacturer and wholesaler, or a
wholesaler and a retailer.
In the past, IT managers divided systems into categories based on the user
group the system served. Categories and users included office systems (administrative
staff), operational systems (operational personnel), decision support systems (middle-
Page | 4
managers and knowledge workers), and executive information systems (top managers).
Today, traditional labels no longer apply. For example, all employees, including top
managers, use office productivity systems. Similarly, operational users often require
decision support systems. As business changes, information use also changes in most
companies. Today, it makes more sense to identify a system by its functions and
features, rather than by its users.
Top managers
● Strategic plans
Operational Employees
● Operational employees include users who rely on TP systems to enter and
receive data they need to perform their jobs.
Page | 6
MODULE 2
System Analyst
● A systems analyst investigates, analyzes, designs, develops, installs,
evaluates, and maintains a company’s information systems.
● On large projects, the analyst works as a member of an IT department
team
● Smaller companies often use consultants to perform the work
SYSTEM DEVELOPMENT
Page | 1
System Development Life Cycle(SDLC)
Systems Planning – It is the initial stage in the systems development life cycle
(SDLC). It is the fundamental process of understanding why an information
system should be built and determine how the project team will go about building
it. It describes how IT projects get started, how systems analysts evaluate
proposed projects, the feasibility of a project, and the reasoning behind the
proposed system development.
Page | 2
Systems Analysis Activities
Page | 3
▪ Security refers to hardware, software, and procedural
controls that safeguard and protect the system and its data
from internal or external threats.
Flowchart
● Business flowchart shows the steps that make up a business
process, along with who's responsible for each step.
● They are useful for analyzing current processes, planning
improvements, and crystallizing communication between process
participants
Types of Flowchart:
● Document
• Illustrates the flow of documents and information
between areas of responsibility within an organization.
• A document flowchart is particularly useful in analyzing
the adequacy of control procedures.
Page | 4
● System
▪ System flowcharts depict the relationship among the input,
processing, and output of an AIS
● Program
▪ A program flowchart describes the specific logic to perform a
process shown on a systems flowchart
Check the following videos for further discussion on the Flowcharting process.
• Lesson 08 FlowCharting.mp4
• Flowchart Tutorial (with Symbols, Guide and Examples)
System Requirements
In the context of software development and system design, requirements are
statements that describe what the system should do or possess to meet the
needs of its users and stakeholders. These requirements can be broadly
categorized into two types: functional requirements and nonfunctional
requirements.
Non-functional Requirements:
Non-functional requirements, on the other hand, define the attributes and
qualities that describe how the system should perform, rather than what it should
do. These requirements focus on aspects related to system behavior,
performance, security, and user experience. Nonfunctional requirements
answer the question, "How well does the system perform?"
Page | 5
● Scalability: The system should handle an increasing number of users
without significant performance degradation.
● Security: User passwords should be securely hashed and stored to
prevent unauthorized access.
● Usability: The website's interface should be intuitive and easy to navigate
for users of all experience levels.
● Reliability: The system should have at least 99.9% uptime, with minimal
downtime for maintenance.
It's important to note that both functional and non-functional requirements are
crucial for successful system development. Functional requirements define
what the system should achieve in terms of features and capabilities, while non-
functional requirements ensure the system meets the desired levels of
performance, quality, and user satisfaction. Both sets of requirements play a
key role in guiding the design, development, testing, and validation of the
system.
Systems Design – Systems Design is the third of five phases in the systems
development life cycle (SDLC). Now you are ready to begin the physical design
of the system that will meet the specifications described in the system
requirements document. Systems design tasks include output and user
interface design, data design, and system architecture.
A video by Johnny Khoury has explained how the Design Phase in SDLC
(Lesson07 video01 Design Phase in SDLC) works. It is all about the design
phase of creating a system.
Page | 6
System Design Objectives
The goal of systems design is to build a system that is effective, reliable, and
maintainable
● A system is effective if it meets all user needs and business requirements
● A system is reliable if it adequately handles errors
● A system is maintainable if it is well designed, flexible, and developed
with future modifications in mind
● Data Considerations
▪ Data should be entered into the system where and when it occurs
because delays cause data errors
▪ Data should be verified when it is entered, to catch errors
immediately
▪ Automated methods of data entry should be used whenever
possible
▪ Audit trail
▪ Every instance of entry and change to data should be logged
▪ Data should be entered into a system only once
▪ Data duplication should be avoided
● Design Trade-Offs
▪ Most design trade-off decisions that you will face come down to
the basic conflict of quality versus cost
▪ Avoid decisions that achieve short-term savings but might mean
higher costs later
Prototyping
Page | 7
The method by which a prototype is developed. It involves a repetitive
sequence of analysis, design, modeling, and testing. It is a common technique
that can be used to design anything from a new home to a computer network.
Prototyping Methods
● System prototyping - produces a full-featured, working model of the
information system. Because the model is “on track” for implementation,
it is especially important to obtain user feedback, and to be sure that the
prototype meets all requirements of users and management.
● Design prototyping or Throwaway prototyping – method of development
that employs technical mechanisms for reducing risk in a project, when
the project needs are vaguely and poorly laid out. The end product of
design prototyping is a user-approved model that documents and
benchmarks the features of the finished system.
● Prototyping offers many benefits
▪ Users and systems developers can avoid
misunderstandings
▪ Managers can evaluate a working model more effectively
than a paper specification ● Consider potential problems
▪ The rapid pace of development can create quality problems
▪ In very complex systems, the prototype becomes unwieldy
and difficult to manage
Page | 8
use it to produce a document in a format which satisfies a particular
human readership
● Screen generators - or form painter, is an interactive tool that helps you
design a custom interface, create screens forms, and handle data entry
format and procedures.
Limitations of Prototypes
● A prototype is a functioning system, but it is less efficient than a fully
developed system
● Systems developers can upgrade the prototype into the final information
system by adding the necessary capability. Otherwise, the prototype is
discarded
Page | 9
User Interface
Describes how users interact with a computer system, and consists of all
the hardware, software, screens, menus, functions, output, and features that
affect two-way communications between the user and the computer.
Graphical User Interface - uses visual objects and techniques that allow users
to communicate effectively with the system.
Usability – user satisfaction, support for business functions, and system
effectiveness
● Process-control systems – allow users to send commands to the system
● User-centered systems – how users communicate with the information
system, and how the system supports the firm’s business operations
User interface requires the understanding of human-computer interactions and
user-centered design principles.
Human-Computer Interaction describes the relationship between computers
and people who use them to perform their jobs
Page | 10
Seven Habits of Successful Interface Designers:
1. Understand the Business
The interface designer must understand the underlying business
functions and how the system supports individual, departmental, and
enterprise goals. The overall objective is to design an interface that helps
users to perform their jobs.
5. Focus on Usability
The user interface should include all tasks, commands, and
communications between users and the information system. The opening
screen should show the main option. Each screen option leads to another
screen, with more options.
6. Invite Feedback
Even after the system is operational, it is important to monitor system
usage and solicit user suggestions. The analyst can determine if system
features are being used as intended by observing and surveying users.
Page | 11
7. Document Everything
All screen designs should be documented for later use by programmers.
Systems Implementation – This phase begins once the client has tested and
approved the system. The system is installed at this phase to support the
specified business functions. The performance of the system is compared to the
performance targets defined during the planning phase.
Systems Maintenance – System maintenance is a continuous operation that
includes eliminating program and design flaws, updating documentation and
test data, and updating user support.
Page | 12
MODULE 2
System Analyst
● A systems analyst investigates, analyzes, designs, develops, installs,
evaluates, and maintains a company’s information systems.
● On large projects, the analyst works as a member of an IT department
team
● Smaller companies often use consultants to perform the work
SYSTEM DEVELOPMENT
Page | 1
System Development Life Cycle(SDLC)
Systems Planning – It is the initial stage in the systems development life cycle
(SDLC). It is the fundamental process of understanding why an information
system should be built and determine how the project team will go about building
it. It describes how IT projects get started, how systems analysts evaluate
proposed projects, the feasibility of a project, and the reasoning behind the
proposed system development.
Page | 2
Systems Analysis Activities
Page | 3
▪ Security refers to hardware, software, and procedural
controls that safeguard and protect the system and its data
from internal or external threats.
Flowchart
● Business flowchart shows the steps that make up a business
process, along with who's responsible for each step.
● They are useful for analyzing current processes, planning
improvements, and crystallizing communication between process
participants
Types of Flowchart:
● Document
• Illustrates the flow of documents and information
between areas of responsibility within an organization.
• A document flowchart is particularly useful in analyzing
the adequacy of control procedures.
Page | 4
● System
▪ System flowcharts depict the relationship among the input,
processing, and output of an AIS
● Program
▪ A program flowchart describes the specific logic to perform a
process shown on a systems flowchart
Check the following videos for further discussion on the Flowcharting process.
• Lesson 08 FlowCharting.mp4
• Flowchart Tutorial (with Symbols, Guide and Examples)
System Requirements
In the context of software development and system design, requirements are
statements that describe what the system should do or possess to meet the
needs of its users and stakeholders. These requirements can be broadly
categorized into two types: functional requirements and nonfunctional
requirements.
Non-functional Requirements:
Non-functional requirements, on the other hand, define the attributes and
qualities that describe how the system should perform, rather than what it should
do. These requirements focus on aspects related to system behavior,
performance, security, and user experience. Nonfunctional requirements
answer the question, "How well does the system perform?"
Page | 5
● Scalability: The system should handle an increasing number of users
without significant performance degradation.
● Security: User passwords should be securely hashed and stored to
prevent unauthorized access.
● Usability: The website's interface should be intuitive and easy to navigate
for users of all experience levels.
● Reliability: The system should have at least 99.9% uptime, with minimal
downtime for maintenance.
It's important to note that both functional and non-functional requirements are
crucial for successful system development. Functional requirements define
what the system should achieve in terms of features and capabilities, while non-
functional requirements ensure the system meets the desired levels of
performance, quality, and user satisfaction. Both sets of requirements play a
key role in guiding the design, development, testing, and validation of the
system.
Systems Design – Systems Design is the third of five phases in the systems
development life cycle (SDLC). Now you are ready to begin the physical design
of the system that will meet the specifications described in the system
requirements document. Systems design tasks include output and user
interface design, data design, and system architecture.
A video by Johnny Khoury has explained how the Design Phase in SDLC
(Lesson07 video01 Design Phase in SDLC) works. It is all about the design
phase of creating a system.
Page | 6
System Design Objectives
The goal of systems design is to build a system that is effective, reliable, and
maintainable
● A system is effective if it meets all user needs and business requirements
● A system is reliable if it adequately handles errors
● A system is maintainable if it is well designed, flexible, and developed
with future modifications in mind
● Data Considerations
▪ Data should be entered into the system where and when it occurs
because delays cause data errors
▪ Data should be verified when it is entered, to catch errors
immediately
▪ Automated methods of data entry should be used whenever
possible
▪ Audit trail
▪ Every instance of entry and change to data should be logged
▪ Data should be entered into a system only once
▪ Data duplication should be avoided
● Design Trade-Offs
▪ Most design trade-off decisions that you will face come down to
the basic conflict of quality versus cost
▪ Avoid decisions that achieve short-term savings but might mean
higher costs later
Prototyping
Page | 7
The method by which a prototype is developed. It involves a repetitive
sequence of analysis, design, modeling, and testing. It is a common technique
that can be used to design anything from a new home to a computer network.
Prototyping Methods
● System prototyping - produces a full-featured, working model of the
information system. Because the model is “on track” for implementation,
it is especially important to obtain user feedback, and to be sure that the
prototype meets all requirements of users and management.
● Design prototyping or Throwaway prototyping – method of development
that employs technical mechanisms for reducing risk in a project, when
the project needs are vaguely and poorly laid out. The end product of
design prototyping is a user-approved model that documents and
benchmarks the features of the finished system.
● Prototyping offers many benefits
▪ Users and systems developers can avoid
misunderstandings
▪ Managers can evaluate a working model more effectively
than a paper specification ● Consider potential problems
▪ The rapid pace of development can create quality problems
▪ In very complex systems, the prototype becomes unwieldy
and difficult to manage
Page | 8
use it to produce a document in a format which satisfies a particular
human readership
● Screen generators - or form painter, is an interactive tool that helps you
design a custom interface, create screens forms, and handle data entry
format and procedures.
Limitations of Prototypes
● A prototype is a functioning system, but it is less efficient than a fully
developed system
● Systems developers can upgrade the prototype into the final information
system by adding the necessary capability. Otherwise, the prototype is
discarded
Page | 9
User Interface
Describes how users interact with a computer system, and consists of all
the hardware, software, screens, menus, functions, output, and features that
affect two-way communications between the user and the computer.
Graphical User Interface - uses visual objects and techniques that allow users
to communicate effectively with the system.
Usability – user satisfaction, support for business functions, and system
effectiveness
● Process-control systems – allow users to send commands to the system
● User-centered systems – how users communicate with the information
system, and how the system supports the firm’s business operations
User interface requires the understanding of human-computer interactions and
user-centered design principles.
Human-Computer Interaction describes the relationship between computers
and people who use them to perform their jobs
Page | 10
Seven Habits of Successful Interface Designers:
1. Understand the Business
The interface designer must understand the underlying business
functions and how the system supports individual, departmental, and
enterprise goals. The overall objective is to design an interface that helps
users to perform their jobs.
5. Focus on Usability
The user interface should include all tasks, commands, and
communications between users and the information system. The opening
screen should show the main option. Each screen option leads to another
screen, with more options.
6. Invite Feedback
Even after the system is operational, it is important to monitor system
usage and solicit user suggestions. The analyst can determine if system
features are being used as intended by observing and surveying users.
Page | 11
7. Document Everything
All screen designs should be documented for later use by programmers.
Systems Implementation – This phase begins once the client has tested and
approved the system. The system is installed at this phase to support the
specified business functions. The performance of the system is compared to the
performance targets defined during the planning phase.
Systems Maintenance – System maintenance is a continuous operation that
includes eliminating program and design flaws, updating documentation and
test data, and updating user support.
Page | 12
Unit 08: Computer and Internet Etiquette
As people continue to use technology in their everyday lives, from
communications to making transactions online, many have forgotten their
proper etiquette when using their computer systems and when interacting using
the Internet. Internet etiquette, also known as “Netiquette,” is essential in a
civilized work environment or personal relationship. Even though you aren't with
others in person, you should remember that they're still there, on the other end
of your communication. With the age of technology, threats to a computer
system is now more rampant, there is cyberbullying, hacking, harassment, and
other fraud techniques. There is no official list of netiquette rules or guidelines,
the idea is to respect other users and those online.
Page | 1
emotion. All caps will make you look like you’re shouting. Don’t overuse
smileys and emoticons because they make you look unprofessional.
Constructing your sentences carefully and editing what you write before
hitting send is often enough.
12. Remember that your posts and account can be easily traced back to you
even if you write under an alias or a made-up handle. You leave data
footprints whenever you’re online. These are stored and can be retrieved.
Even when using incognito. Always be a decent and responsible netizen.
2. Thou shalt not interfere with other people’s computer work – Computer
viruses are small programs that disrupt other people’s computer work by
destroying their files, taking huge amounts of computer time or memory,
or by simply displaying annoying messages.
Generating and consciously spreading computer viruses is unethical.
3. Thou shalt not snoop around in other people’s computer files – Reading
other people’s email messages is as bad as opening and reading their
letters: This is invading their privacy. Obtaining other people’s non-public
files should be judged the same way as breaking into their rooms and
stealing their documents.
4. Thou shalt not use a computer to steal – Using a computer to break into
the accounts of a company or a bank and transferring money should be
judged the same way as robbery. It is illegal and there are strict laws
against it.
5. Thou shalt not use a computer to bear false witness – The Internet can
spread untruth as fast as it can spread truth. Putting out false
"information" to the world is bad. For instance, spreading false rumors
about a person or false propaganda about historical events is wrong.
Page | 2
6. Thou shalt not copy or use proprietary software for which you have not
paid – Software is an intellectual product. In that way, it is like a book:
Obtaining illegal copies of copyrighted software is as bad as
photocopying a copyrighted book. There are laws against both.
Information about the copyright owner can be embedded by a process
called watermarking into pictures in the digital format.
9. Thou shalt think about the social consequences of the program you are
writing or the system you are designing – You have to think about
computer issues in a more general social framework: Can the program
you write be used in a way that is harmful to society? For example, if you
are working for an animation house, and are producing animated films
for children, you are responsible for their contents. Do the animations
include scenes that can be harmful to children? In the United States, the
Communications Decency Act was an attempt by lawmakers to ban
certain types of content from Internet websites to protect young children
from harmful material. That law was struck down because it violated the
free speech principles in that country's constitution. The discussion, of
course, is going on.
10. Thou shalt always use a computer in ways that ensure consideration and
respect for your fellow humans – Just like public buses or banks, people
using computer communications systems may find themselves in
situations where there is some form of queuing and you have to wait for
Page | 3
your turn and generally be nice to other people in the environment. The
fact that you cannot see the people you are interacting with does not
mean that you can be rude to them.
References
● https://explorable.com/hawthorne-effect
● https://methods.sagepub.com/book/key-concepts-in-social-
research/n22.xml
● https://online.visual-paradigm.com/diagrams/tutorials/use-case-
diagram-tutorial/
● https://sites.google.com/site/2012itcs371devsec3fuzzysystem3/3
● https://www.investopedia.com/terms/c/click_and_mortar.asp
● https://www.mbaskool.com/business-concepts/marketing-and-strategy-
terms/2587click-only-companies.html
● https://www.sciencedirect.com/topics/computer-science/sequence-
diagram
● https://www.slideshare.net/fajarbaskoro/systems-request
● https://www.tutorialspoint.com/software_engineering/case_tools_overvi
ew.htm
● https://www.visualparadigm.com/support/documents/vpuserguide/2821/
286/7114_drawingbusin.html
● https://www.youtube.com/watch?v=DMPxxijmG7M&fbclid=IwAR0hx6Uo
4PSlgqmMmAO eX4e_R6mq0s4nMw-iwcXUOiixRkvkHeWxK8UTQj8
● https://www.youtube.com/watch?v=rAR5sbaphwU&fbclid=IwAR3EXVa8
Rag6iV8zFswXcF hRFOB_FaiEa7QD6QMukGoyaiQ6cRLH30xiCtY
● McCombes, S. (2020, January 13). How to Do a Case Study: Examples
and Methods.
Retrieved June 7, 2020, from
https://www.scribbr.com/methodology/case-study/
● NewLeaf. (2012). ROI or Payback Period? Retrieved June 7, 2020, from
https://newleafllc.com/2012/08/roi-or-payback-period/
● Requirements Modeling. Part 1
https://www.youtube.com/watch?v=2t0ichoFHG8 Part 2
https://www.youtube.com/watch?v=1u5KQh_B1_U
● ROSENBLATT, H. (2014) Systems Analysis and Design, 10th edition.
Shelly Cashman Series. Cengage Learning
● Top five causes of scope creep ... and what to do about them. A Guide to
the Project Management Body of Knowledge (PMBOK® Guide)—Fourth
edition https://www.pmi.org/learning/library/top-five-causes-scope-
creep-6675
Page | 4
● Feronika, N. (2018, January 15). Systems Analysis Activities. School of
Information Systems. https://sis.binus.ac.id/2018/01/15/systems-
analysis-activities/
● System Development Lifecycle (SDLC) | Michigan Tech Information
Technology. (n.d.). Michigan Technological University.
https://www.mtu.edu/it/security/policies-
proceduresguidelines/information-security-program/system-
development-lifecycle/
● Thakur, D. (2013, January 30). What is system maintenance? What are
its different types. Computer Notes.
https://ecomputernotes.com/mis/implementation-andevaluation/what-is-
system-maintenance-what-are-its-different-types
Page | 5
Unit 09: Computer and Cybersecurity
The vulnerabilities of a computer system should not be left alone for
perpetrators. We should prevent perpetrators from gaining access to our
computer systems. To ensure that information presented by your computer
system is reliable and not prone to computer fraud and malware.
Computers and the internet have transformed the lives of many people in many
good ways. Unfortunately, this vast network and its associated technologies
also have a number of security threats. It is our duty to protect ourselves from
these threats and attacks. Scammers, hackers and identity thieves are looking
to steal your personal information - and your money.
Page | 1
a network and the procedures that determine how and where data may
be stored or shared all fall under this umbrella.
Page | 2
The goal of information security follows three main principles:
1. Confidentiality is ensuring that information is available only to the
intended audience – An organization obtains or creates a piece of
sensitive data that will be used in the course of its business operations.
Because the data is sensitive, that data should only be able to be seen
by the people in the organization that need to see it in order to do their
jobs. It should be protected from access by unauthorized individuals.
2. Integrity is protecting information from being modified by unauthorized
parties – Integrity involves maintaining the accuracy, consistency and
trustworthiness of data. Data must not be changed whilst at rest or in
transit by unauthorized individuals (which would demonstrate a breach of
confidentiality). Integrity of data is commonly ensured by implementing
security measures such as file permissions and access control models.
Version controls can also be utilized to avoid changes to data made
accidentally by authorized individuals.
3. Availability is protecting information from being modified by unauthorized
parties – When the individual that needs that piece of data to perform a
job duty is ready to utilize it, it must be readily accessible (i.e. online) in
a timely and reliable manner so the job task can be completed on time
and the company can continue its processing. Availability means that
authorized individuals are able to access their data whenever they want.
Effectively executing all three principles of the Security Triad creates an ideal
outcome from an information security perspective.
Page | 3
2. Use a strong password
Reusing passwords or having the same password for multiple accounts,
websites, and other systems will become more vulnerable. Do not save
passwords on websites and devices that are unsecure. Remember to
change your passwords on a schedule to keep them fresh.
Page | 4
7. Keep personal information safe
Do not divulge personal information online if you’re not sure about the
sender or the website. A common fraud, called "phishing", sends
messages that appear to be from a bank, shop or auction, giving a link
to a fake website and asking you to follow that link and confirm your
account details.
Definition of terms
● Firewall: A firewall is a network security device that monitors incoming
and outgoing network traffic and decides whether to allow or block
specific traffic based on a defined set of security rules.
● Hackers: A hacker is a person who breaks into a computer system. The
reasons for hacking can be many: installing malware, stealing or
destroying data, disrupting service, and more. Hacking can also be done
for ethical reasons, such as trying to find software vulnerabilities so they
can be fixed.
● Threats: A threat is anything that can compromise the confidentiality,
integrity, or availability of an information system.
● Vulnerability: A vulnerability is any weakness in the information
technology (IT) infrastructure that hackers can exploit to gain
unauthorized access to data.
Page | 5
Some of the most common threats to cybersecurity include:
● Malware: This refers to malicious software such as viruses, worms, and
Trojan horses that can infect computers and devices, steal sensitive
information, or damage systems.
● Phishing: This is the practice of sending fake emails or messages that
appear to come from a trustworthy source, such as a bank or a popular
website, in order to trick people into revealing sensitive information.
● Ransomware: This is a type of malware that encrypts a victim's files and
demands a ransom payment in exchange for the decryption key.
● Distributed Denial of Service (DDoS) attacks: These attacks overload a
website or online service with traffic, making it inaccessible to users.
● Insider threats: Refers to current or former employees, business
partners, contractors, or anyone who has had access to any systems or
networks in the past. can be considered an insider threat if they abuse
their access permissions.
● Man-in-the-middle attacks: Man-in-the-middle is an eavesdropping
attack, where a hacker/intruder intercepts and relays messages between
two parties in order to steal data.
● Advanced persistent threats (APTs): In an APT, an intruder or group of
intruders sneak into a system and remain undetected for an extended
period. The intruder leaves networks and systems intact to avoid
detection so that the intruder can spy on business activity and steal
sensitive data.
Information security, also known as InfoSec, refers to the processes and
tools designed and deployed to protect sensitive business information from
modification, disruption, destruction, and inspection.
Page | 6
Unit 10: Cybercrime Law
DISCLAIMER: The following material was copied with permission from the GIT
Lecture 9 - Cybercrime Laws in the Philippines.pptx presentation of Atty. Marco
Cunanan from PAO.
● When the attachment is opened, the file activates a code that sends an
instruction to forward the same email to all the contacts of the user
● The worm spread to e-mail accounts across the globe – including US and
Europe – overwhelming the email systems of private and government
organizations causing them to shut down resulting to estimated damages
worth millions of USD
● This prompted the FBI to identify the source of the worm, which was then
traced back to the Philippines
Page | 1
“It is not clear whether the author of the virus can even be prosecuted in the
Philippines, where computer use is still uncommon among ordinary citizens and cyber-
crimes are not yet define in the legal code.”
Page | 2
Section 6. LEGAL RECOGNITION OF DATA MESSAGES
● ELECTRONIC DATA MESSAGES such text messages, e-mails, or any other
similar modes of communication done through electronic means [including
unaltered screenshots] has the same legal validity as physical messages
Chapter III of R.A. 8792 states the following penalties in violation of this law:
Section 33. PENALTIES
The following acts shall be penalized by fine and/or imprisonment:
1. HACKING/CRACKING
● Unauthorized access into a computer system/server or information and
communication system
● Any access with the intent to corrupt, alter, steal, or destroy using a
computer or computer system without the knowledge and consent of the
owner of the system
2. PIRACY
● Unauthorized copying, reproduction, storage, uploading, downloading,
communication, or broadcasting of protected material [..] through the use
of telecommunication networks, e.g. the Internet, in a manner that
infringes intellectual property.
3. Violations against R.A. 7394: The Consumer Act Of The Philippines ● R.A.
7394 was enacted primarily to protect the consumers …
… against hazards to health and safety, and
… against deceptive, unfair and unconscionable sales acts and
practices.
Page | 3
NOTE:
● Penalty for HACKING/CRACKING and PIRACY:
▪ Pay a fine amounting to a minimum of one hundred thousand
pesos (PhP 100,000) and a maximum that is commensurate to the
damage incurred and …
▪ Mandatory imprisonment of 6 months to 3 years.
● Penalty for violations against R.A. 7394 will be the same penalties as provided
by same law which is to pay a fine of PhP 20,000 to PhP 2000,000 and/or
imprisonment of 3 to 6 years
Page | 4
3. When by such commission, any damage is caused to a […] person who,
at the time of the offense was committed, was in the Philippines
Does connecting to an open WIFI network (e.g. WIFI with no password), without
the consent of the network owner, constitute a violation of RA 10175?
YES! Illegal access is to “make use of any resources” without right
(consent)
Page | 5
2. ILLEGAL INTERCEPTION
The interception […] of computer data to, from, or within a computer
system.
NOTE:
● Interception is listening to, recording, monitoring or surveillance of the
content of communications through the use of electronic eavesdropping or
tapping devices at the same time that the communication is occurring
3. DATA INTERFERENCE
The intentional or reckless alteration, damaging, deletion or
deterioration of computer data, electronic document or electronic
data message without right – including the introduction or
transmission of viruses NOTE:
GUIDE QUESTION: R.A. 10175
Consider the following situation:
A friend sent you a file on a flash drive infected with a virus
Both of you is not aware that the flash drive is infected
After you insert the flash drive in your computer, your computer get
infected and you lost your documents
Is your friend liable for any violation on RA 10175?
YES! Data interference includes “the intentional or reckless alteration,
damaging, deletion
or deterioration of computer data” – even if your friend has no malicious
intent it is still considered as “recklessness” in his/her part causing you
to lose your file
4. SYSTEM INTERFERENCE
The intentional alteration or reckless hindering or interference with the
functioning of a computer or computer network by inputting,
Page | 6
transmitting, damaging, deleting, deteriorating, altering or suppressing
computer data or program, electronic document, or electronic data
message, without right or authority, including the introduction or
transmission of viruses
NOTE:
● This is more or less an extension of the previous offense whereby the
affected entity is not just data but the whole system
Page | 7
COMELEC website defaced by Anonymous Philippines (March 27,
2016)
5. MISUSE OF DEVICE
The unauthorized use, production, sale, procurement, distribution or
otherwise making available of:
i. A device designed for committing any offenses under this Act ii.
A computer password, access code, or similar data by which […] a
computer system is […] accessed with the intent of committing
any offenses under this act
NOTE:
MISUSE OF DEVICE EXAMPLE: SKIMMING DEVICES and KEYLOGGERS
6. CYBER-SQUATTING
The acquisition of a domain name on the internet in bad faith to profit,
mislead, destroy reputation, and deprive others from registering the
same
It is cyber squatting if the domain name that was acquired is:
i. Similar, identical or confusingly similar to an existing government-
registered trademark;
ii. In case of a personal name, identical or in any way similar with the
name of a person other than the registrant; and
iii. Acquired without right or with intellectual property interests in it
NOTE:
● CYBER-SQUATTING SAMPLE CASE: MikeRoweSoft.com
Page | 8
In January 2004, Mike Rowe was a grade 12 student who operated a
profitable web design business as a part time job.
He registered the website with the domain name MikeRoweSoft.com
Lawyers from Microsoft asked him to stop using the website and Mike
Rowe complied after an undisclosed settlement with the company
NOTE:
● COMPUTER-RELATED FORGERY EXAMPLE:
Hacking into the SLU Student Portal to change your grade from 65 to 95
Since NO MONETARY VALUE is involved, this is considered as “forgery” and
not “fraud”
2. Computer-related FRAUD
The unauthorized input, alteration, or deletion of computer data or
program or interference in the functioning of a computer system,
causing damage thereby with fraudulent intent
NOTE:
● The ONLY difference between forgery and fraud is if the damage incurred
has a monetary value.
● COMPUTER-RELATED FRAUD EXAMPLES:
Hacking into a bank’s database and changing your account balance from
PhP 500 to PhP 5,000
Asking people to send you a “prepaid load” by pretending to be a
“relative from abroad”
Page | 9
● The intentional acquisition, use, misuse, transfer, possession,
alteration or deletion of identifying information belonging to another
[person] without right
NOTE:
● COMPUTER-RELATED IDENTIFY THEFT EXAMPLE:
Those fake social media accounts that has a user profile that contains
“identifying information” – like picture or name – belonging to another
person with the intention of using it for malicious purposes, such as
pretending to be the actual person even if it is not
NO! Since both parties consented and even if these acts are publicly
denounced, they do NOT constitute to cybersex since the act is NOT done
for “any favour or consideration” and without the element of “engagement
in business”
2. CHILD PORNOGRAPHY
● The unlawful or prohibited acts defined and punishable by R.A. 9775:
The Anti-Child Pornography Act of 2009 committed through a
computer system
● This includes any representation – whether visual or audio – by
electronic or any other means of a child engaged or involved in real
or simulated explicit sexual activities NOTE:
GUIDE QUESTION: R.A. 10175
Are “hentai” clips – sexually explicit Japanese comics or anime – considered as
a violation of this law?
NO … unless the hentai clip itself contains a character which is explicit
identified as a minor. If so, the said material is prohibited and the
creator/distributor of the said material are liable for violation of this law.
Page | 10
3. ONLINE LIBEL
● Libel is the public and malicious imputation of a crime – real or
imaginary – or any act, omission, condition, status or circumstance
tending to cause the dishonor, discredit, or contempt of a […] person,
or to blacken the memory of the dead
Page | 11
If you COMMENTED on the said post with “OO NGA!”, are you liable?
NO! Similar to LIKING or REACTING, commenting “OO NGA!” does not
discredit or allege Maria David – none of the FOUR ELEMENTS OF LIBEL
is present!
If you COMMENTED on the said post with “OO NGA! MAGNANAKAW
KAYONG MAG-
INA”, are you liable?
YES! This statement is not merely an approval but also states an
allegation towards Maria David and her mother.
This makes the person liable for libel since the comment can be seen
publicly as well.
Page | 12
The following and similar acts, though they may not constitute a criminal
offense, shall produce a cause of action for damages, prevention and other
relief:
(1) Prying into the privacy of another's residence;
(2) Meddling with or disturbing the private life or family relations of another;
(3) Intriguing to cause another to be alienated from his friends;
(4) Vexing or humiliating another on account of his religious beliefs, lowly
station in life, place of birth, physical defect, or other personal condition.
GUIDE QUESTION: RIGHT TO PRIVACY
May an individual installs surveillance cameras on his own property facing the
property of another? (Hing vs. Choachuy 2013)
NO! A man’s house is his castle, where his right to privacy cannot be denied or
even restricted by others.
It includes any act of intrusion into, peeping or peering inquisitively into the
residence of another without the consent of the latter.
NOTE on the INSTALLATION of CAMERAS:
The installation of surveillance cameras, should NOT cover places where there is
reasonable expectation of privacy, unless the consent of the individual – whose
right to privacy would be affected – was obtained.
Page | 13
REASONABLE EXPECTATION OF PRIVACY
Also known as the “right to be left alone”, refers to the right of a person to “expect
privacy” in places and/or situations that the community generally accepts as
“quite reasonable”
For instance, there are certain instances that a person assumes that there is
reasonable expectation of privacy such that at that particular moment nobody
can see or hear him/her.
GUIDE QUESTION: REASONABLE EXPECTATION OF PRIVACY
Does an employee have a reasonable expectation of privacy in the workplace?
According to a court decision, an employee have LESS or NO expectations of
privacy in the workplace.
For instance, CCTV cameras may be watching an employee’s every move while
inside the company grounds. The only place where there is reasonable
expectation of privacy is inside the toilet facilities of the company.
Section 4: PENALTIES.
The penalty for the commission of any of the prohibited acts above are as
follows:
● Imprisonment of 3 years to 7 years imprisonment; and
● Fine of Php 100,000.00 to Php 500,000.00
Page | 15
DEFINITION OF TERMS
1. PERSONAL INFORMATION CONTROLLER (PIC)
The individual, corporation, or body who decides what to do with data.
4. BREACH
A security incident that:
a. Leads to unlawful or unauthorized processing of personal,
sensitive, or privileged information;
b. Compromises the availability, integrity, or confidentiality of
personal data.
Page | 16
PROCESSING OF PERSONAL INFORMATION
The processing of personal information shall be allowed if it adheres to ALL the
following:
1. PRINCIPLES OF TRANSPARENCY
● The data subject must know:
a. What personal data will be collected
b. How the personal data will be collected
c. Why personal data will be collected
● The data processing policies of the PIC must be known to the data
subject.
● The information to be provided to the data subject must be in clear
and plain language.
3. PRINCIPLE OF PROPORTIONALITY
● The amount of data collected for processing should be adequate,
relevant, and not excessive in proportion to the purpose of the
data processing.
● Efforts should be made to limit the processed data to the minimum
necessary.
Page | 17
3. The processing is necessary for compliance with a legal obligation to
which the PIC is subject;
4. The processing is necessary to protect vitally important interests of the
data subject, including life and health;
5. The processing is necessary in order to respond to national emergency,
to comply with the requirements of public order and safety, or to fulfill
functions of public authority […]; or
6. The processing is necessary for the purposes of the legitimate interests
pursued by the PIC […], except where such interests are overridden by
fundamental rights and freedoms of the data subject […]
2. Right to OBJECT
● The right to refuse to the processing of personal data.
● This includes the right to be given an opportunity to withhold
consent to the processing in case of any changes or any
amendment to the information supplied or declared.
3. Right to ACCESS
● The right to find out whether a PIC holds any personal data about
you.
4. Right to RECTIFICATION
● This involves the right to dispute the inaccuracy or error in the
personal data and have the PIC correct it immediately.
● It also includes access to new and retracted information, and
simultaneous receipt thereof.
Page | 18
● Recipients previously given erroneous data must be informed of
inaccuracy and rectification upon reasonable request of the data
subject.
6. Right to DAMAGES
● This is the right to be receive compensation for any damages
sustained due to inaccurate, incomplete, outdated, false,
unlawfully obtained, or unauthorized use of personal data.
● If there are circumstances where you discovered that your
personal data was mishandled, you have the right to ask for
compensation for the damage it has caused you.
Page | 19
GUIDE QUESTION: R.A. 10173
May a teacher/professor search the contents of a student’s cellular phone?
NO! Any search through a student’s cellular phone without justification under a
law or regulation is UNLAWFUL, and may be considered as “unauthorized
processing of data”
However, there are exceptions:
• If it was done with student’s consent [except if the student is a minor]
• If it is required by the student’s life and health, or by national emergency.
NO! Consent under the Data Privacy Act has three requirements, none of which
are seen in an implied consent:
• Consent must be freely given;
• Details about what consent is being asked must be specific; and
• There must be an informed indication of will.
NO! It is possible that one may share a similar signature as another person.
Moreover, some signatures do not, in any way, show signs of identity of a
person.
However, these may be considered personal information when used to identify
an individual such as a signature affixed on the name of a person.
Are usernames, password, IP and MAC address, location cookies and birthday
(month and day only) are considered personal information?
YES!*
* Only when they are combined with other pieces of information that may allow
an individual to be distinguished from others.
Page | 20
2. Accessing personal information and sensitive personal information due
to negligence Provided access to (sensitive) personal information due to
negligence or was unauthorized under the Data Privacy Act or any
existing law.
6. Malicious disclosure
Discloses to a third party unwarranted or false information with malice or
in bad faith relative to any (sensitive) personal information obtained by
such PIC or PIP.
Page | 21
IT security is about protecting things that are of value to an organization.
Security controls exist to reduce or mitigate the risk to those assets. They
include any type of policy, procedure, technique, method, solution, plan, action,
or device designed to help accomplish that goal. Recognizable examples
include firewalls, surveillance systems, and antivirus software.
Control Types
● Physical Controls – Describes anything tangible that’s used to prevent or
detect unauthorized access to physical areas, systems, or assets. This
includes gates, access cards, CCTVs, and motion sensors.
● Technical Controls – (also known as logical controls) Includes hardware
or software mechanisms used to protect assets. Common examples are
authentication solutions, firewalls, and antivirus software.
● Administrative Controls – Refers to policies, procedures, or guidelines
that define personnel or business practices in accordance with the
organization's security goals. These can apply to the hiring and
termination of employees, equipment and Internet usage, separation of
duties, and auditing.
Control Functions
● Preventive Controls – These is any security measure that is designed to
prevent or stop any malicious activity from happening. These can be
fences, alarms, and antivirus software.
● Detective Controls – These is any security measure taken or
implemented to detect and alert to unwanted or unauthorized activity in
progress or after it has occurred. It can be alerting guards or notifications
from a motion sensor.
● Corrective Controls – Any measures taken to repair damage or restore
resources and capabilities following an unauthorized or unwanted
activity. This may include rebooting the system, or terminating a process,
or quarantining a virus.
Page | 22
CONTROL FUNCTIONS
GRADED ACTIVITY 2
Page | 23
2. Think of any business around you (your bank, convenience store, etc.)
and identify ways on how you think they can be more productive. Explain
in 3-5 sentences.
Part 3: Unit 3 (5 pts)
1. Computers perform many jobs that previously were performed by people.
Will computer-based transactions and expanded e-commerce eventually
replace person to-person contact? From a customer’s point of view, is
this better? Why or why not?
2. What types of information systems might a large company use?
0 -1000 -1000
1 600 100
2 400 400
3 200 600
4 200 600
5 100 700
Solution:
Content marketing can be a very hectic mess unless you organize it into clear
business processes. Consider the following process:
• The content writer takes up & finishes the first draft of an article. Includes
descriptions of any custom images that are to be used in the article
• The marketer gathers influencer contact information, to be used for advertising
and marketing once the article is done
• The editor proof-reads the article, makes points on grammar, style, spelling, etc.
• The designer creates custom images as asked, sending them over to the
content writer
Page | 24
Unit 08: Computer and Internet Etiquette
As people continue to use technology in their everyday lives, from
communications to making transactions online, many have forgotten their
proper etiquette when using their computer systems and when interacting using
the Internet. Internet etiquette, also known as “Netiquette,” is essential in a
civilized work environment or personal relationship. Even though you aren't with
others in person, you should remember that they're still there, on the other end
of your communication. With the age of technology, threats to a computer
system is now more rampant, there is cyberbullying, hacking, harassment, and
other fraud techniques. There is no official list of netiquette rules or guidelines,
the idea is to respect other users and those online.
Page | 1
emotion. All caps will make you look like you’re shouting. Don’t overuse
smileys and emoticons because they make you look unprofessional.
Constructing your sentences carefully and editing what you write before
hitting send is often enough.
12. Remember that your posts and account can be easily traced back to you
even if you write under an alias or a made-up handle. You leave data
footprints whenever you’re online. These are stored and can be retrieved.
Even when using incognito. Always be a decent and responsible netizen.
2. Thou shalt not interfere with other people’s computer work – Computer
viruses are small programs that disrupt other people’s computer work by
destroying their files, taking huge amounts of computer time or memory,
or by simply displaying annoying messages.
Generating and consciously spreading computer viruses is unethical.
3. Thou shalt not snoop around in other people’s computer files – Reading
other people’s email messages is as bad as opening and reading their
letters: This is invading their privacy. Obtaining other people’s non-public
files should be judged the same way as breaking into their rooms and
stealing their documents.
4. Thou shalt not use a computer to steal – Using a computer to break into
the accounts of a company or a bank and transferring money should be
judged the same way as robbery. It is illegal and there are strict laws
against it.
5. Thou shalt not use a computer to bear false witness – The Internet can
spread untruth as fast as it can spread truth. Putting out false
"information" to the world is bad. For instance, spreading false rumors
about a person or false propaganda about historical events is wrong.
Page | 2
6. Thou shalt not copy or use proprietary software for which you have not
paid – Software is an intellectual product. In that way, it is like a book:
Obtaining illegal copies of copyrighted software is as bad as
photocopying a copyrighted book. There are laws against both.
Information about the copyright owner can be embedded by a process
called watermarking into pictures in the digital format.
9. Thou shalt think about the social consequences of the program you are
writing or the system you are designing – You have to think about
computer issues in a more general social framework: Can the program
you write be used in a way that is harmful to society? For example, if you
are working for an animation house, and are producing animated films
for children, you are responsible for their contents. Do the animations
include scenes that can be harmful to children? In the United States, the
Communications Decency Act was an attempt by lawmakers to ban
certain types of content from Internet websites to protect young children
from harmful material. That law was struck down because it violated the
free speech principles in that country's constitution. The discussion, of
course, is going on.
10. Thou shalt always use a computer in ways that ensure consideration and
respect for your fellow humans – Just like public buses or banks, people
using computer communications systems may find themselves in
situations where there is some form of queuing and you have to wait for
Page | 3
your turn and generally be nice to other people in the environment. The
fact that you cannot see the people you are interacting with does not
mean that you can be rude to them.
References
● https://explorable.com/hawthorne-effect
● https://methods.sagepub.com/book/key-concepts-in-social-
research/n22.xml
● https://online.visual-paradigm.com/diagrams/tutorials/use-case-
diagram-tutorial/
● https://sites.google.com/site/2012itcs371devsec3fuzzysystem3/3
● https://www.investopedia.com/terms/c/click_and_mortar.asp
● https://www.mbaskool.com/business-concepts/marketing-and-strategy-
terms/2587click-only-companies.html
● https://www.sciencedirect.com/topics/computer-science/sequence-
diagram
● https://www.slideshare.net/fajarbaskoro/systems-request
● https://www.tutorialspoint.com/software_engineering/case_tools_overvi
ew.htm
● https://www.visualparadigm.com/support/documents/vpuserguide/2821/
286/7114_drawingbusin.html
● https://www.youtube.com/watch?v=DMPxxijmG7M&fbclid=IwAR0hx6Uo
4PSlgqmMmAO eX4e_R6mq0s4nMw-iwcXUOiixRkvkHeWxK8UTQj8
● https://www.youtube.com/watch?v=rAR5sbaphwU&fbclid=IwAR3EXVa8
Rag6iV8zFswXcF hRFOB_FaiEa7QD6QMukGoyaiQ6cRLH30xiCtY
● McCombes, S. (2020, January 13). How to Do a Case Study: Examples
and Methods.
Retrieved June 7, 2020, from
https://www.scribbr.com/methodology/case-study/
● NewLeaf. (2012). ROI or Payback Period? Retrieved June 7, 2020, from
https://newleafllc.com/2012/08/roi-or-payback-period/
● Requirements Modeling. Part 1
https://www.youtube.com/watch?v=2t0ichoFHG8 Part 2
https://www.youtube.com/watch?v=1u5KQh_B1_U
● ROSENBLATT, H. (2014) Systems Analysis and Design, 10th edition.
Shelly Cashman Series. Cengage Learning
● Top five causes of scope creep ... and what to do about them. A Guide to
the Project Management Body of Knowledge (PMBOK® Guide)—Fourth
edition https://www.pmi.org/learning/library/top-five-causes-scope-
creep-6675
Page | 4
● Feronika, N. (2018, January 15). Systems Analysis Activities. School of
Information Systems. https://sis.binus.ac.id/2018/01/15/systems-
analysis-activities/
● System Development Lifecycle (SDLC) | Michigan Tech Information
Technology. (n.d.). Michigan Technological University.
https://www.mtu.edu/it/security/policies-
proceduresguidelines/information-security-program/system-
development-lifecycle/
● Thakur, D. (2013, January 30). What is system maintenance? What are
its different types. Computer Notes.
https://ecomputernotes.com/mis/implementation-andevaluation/what-is-
system-maintenance-what-are-its-different-types
Page | 5
Unit 09: Computer and Cybersecurity
The vulnerabilities of a computer system should not be left alone for
perpetrators. We should prevent perpetrators from gaining access to our
computer systems. To ensure that information presented by your computer
system is reliable and not prone to computer fraud and malware.
Computers and the internet have transformed the lives of many people in many
good ways. Unfortunately, this vast network and its associated technologies
also have a number of security threats. It is our duty to protect ourselves from
these threats and attacks. Scammers, hackers and identity thieves are looking
to steal your personal information - and your money.
Page | 1
a network and the procedures that determine how and where data may
be stored or shared all fall under this umbrella.
Page | 2
The goal of information security follows three main principles:
1. Confidentiality is ensuring that information is available only to the
intended audience – An organization obtains or creates a piece of
sensitive data that will be used in the course of its business operations.
Because the data is sensitive, that data should only be able to be seen
by the people in the organization that need to see it in order to do their
jobs. It should be protected from access by unauthorized individuals.
2. Integrity is protecting information from being modified by unauthorized
parties – Integrity involves maintaining the accuracy, consistency and
trustworthiness of data. Data must not be changed whilst at rest or in
transit by unauthorized individuals (which would demonstrate a breach of
confidentiality). Integrity of data is commonly ensured by implementing
security measures such as file permissions and access control models.
Version controls can also be utilized to avoid changes to data made
accidentally by authorized individuals.
3. Availability is protecting information from being modified by unauthorized
parties – When the individual that needs that piece of data to perform a
job duty is ready to utilize it, it must be readily accessible (i.e. online) in
a timely and reliable manner so the job task can be completed on time
and the company can continue its processing. Availability means that
authorized individuals are able to access their data whenever they want.
Effectively executing all three principles of the Security Triad creates an ideal
outcome from an information security perspective.
Page | 3
2. Use a strong password
Reusing passwords or having the same password for multiple accounts,
websites, and other systems will become more vulnerable. Do not save
passwords on websites and devices that are unsecure. Remember to
change your passwords on a schedule to keep them fresh.
Page | 4
7. Keep personal information safe
Do not divulge personal information online if you’re not sure about the
sender or the website. A common fraud, called "phishing", sends
messages that appear to be from a bank, shop or auction, giving a link
to a fake website and asking you to follow that link and confirm your
account details.
Definition of terms
● Firewall: A firewall is a network security device that monitors incoming
and outgoing network traffic and decides whether to allow or block
specific traffic based on a defined set of security rules.
● Hackers: A hacker is a person who breaks into a computer system. The
reasons for hacking can be many: installing malware, stealing or
destroying data, disrupting service, and more. Hacking can also be done
for ethical reasons, such as trying to find software vulnerabilities so they
can be fixed.
● Threats: A threat is anything that can compromise the confidentiality,
integrity, or availability of an information system.
● Vulnerability: A vulnerability is any weakness in the information
technology (IT) infrastructure that hackers can exploit to gain
unauthorized access to data.
Page | 5
Some of the most common threats to cybersecurity include:
● Malware: This refers to malicious software such as viruses, worms, and
Trojan horses that can infect computers and devices, steal sensitive
information, or damage systems.
● Phishing: This is the practice of sending fake emails or messages that
appear to come from a trustworthy source, such as a bank or a popular
website, in order to trick people into revealing sensitive information.
● Ransomware: This is a type of malware that encrypts a victim's files and
demands a ransom payment in exchange for the decryption key.
● Distributed Denial of Service (DDoS) attacks: These attacks overload a
website or online service with traffic, making it inaccessible to users.
● Insider threats: Refers to current or former employees, business
partners, contractors, or anyone who has had access to any systems or
networks in the past. can be considered an insider threat if they abuse
their access permissions.
● Man-in-the-middle attacks: Man-in-the-middle is an eavesdropping
attack, where a hacker/intruder intercepts and relays messages between
two parties in order to steal data.
● Advanced persistent threats (APTs): In an APT, an intruder or group of
intruders sneak into a system and remain undetected for an extended
period. The intruder leaves networks and systems intact to avoid
detection so that the intruder can spy on business activity and steal
sensitive data.
Information security, also known as InfoSec, refers to the processes and
tools designed and deployed to protect sensitive business information from
modification, disruption, destruction, and inspection.
Page | 6
Unit 10: Cybercrime Law
DISCLAIMER: The following material was copied with permission from the GIT
Lecture 9 - Cybercrime Laws in the Philippines.pptx presentation of Atty. Marco
Cunanan from PAO.
● When the attachment is opened, the file activates a code that sends an
instruction to forward the same email to all the contacts of the user
● The worm spread to e-mail accounts across the globe – including US and
Europe – overwhelming the email systems of private and government
organizations causing them to shut down resulting to estimated damages
worth millions of USD
● This prompted the FBI to identify the source of the worm, which was then
traced back to the Philippines
Page | 1
“It is not clear whether the author of the virus can even be prosecuted in the
Philippines, where computer use is still uncommon among ordinary citizens and cyber-
crimes are not yet define in the legal code.”
Page | 2
Section 6. LEGAL RECOGNITION OF DATA MESSAGES
● ELECTRONIC DATA MESSAGES such text messages, e-mails, or any other
similar modes of communication done through electronic means [including
unaltered screenshots] has the same legal validity as physical messages
Chapter III of R.A. 8792 states the following penalties in violation of this law:
Section 33. PENALTIES
The following acts shall be penalized by fine and/or imprisonment:
1. HACKING/CRACKING
● Unauthorized access into a computer system/server or information and
communication system
● Any access with the intent to corrupt, alter, steal, or destroy using a
computer or computer system without the knowledge and consent of the
owner of the system
2. PIRACY
● Unauthorized copying, reproduction, storage, uploading, downloading,
communication, or broadcasting of protected material [..] through the use
of telecommunication networks, e.g. the Internet, in a manner that
infringes intellectual property.
3. Violations against R.A. 7394: The Consumer Act Of The Philippines ● R.A.
7394 was enacted primarily to protect the consumers …
… against hazards to health and safety, and
… against deceptive, unfair and unconscionable sales acts and
practices.
Page | 3
NOTE:
● Penalty for HACKING/CRACKING and PIRACY:
▪ Pay a fine amounting to a minimum of one hundred thousand
pesos (PhP 100,000) and a maximum that is commensurate to the
damage incurred and …
▪ Mandatory imprisonment of 6 months to 3 years.
● Penalty for violations against R.A. 7394 will be the same penalties as provided
by same law which is to pay a fine of PhP 20,000 to PhP 2000,000 and/or
imprisonment of 3 to 6 years
Page | 4
3. When by such commission, any damage is caused to a […] person who,
at the time of the offense was committed, was in the Philippines
Does connecting to an open WIFI network (e.g. WIFI with no password), without
the consent of the network owner, constitute a violation of RA 10175?
YES! Illegal access is to “make use of any resources” without right
(consent)
Page | 5
2. ILLEGAL INTERCEPTION
The interception […] of computer data to, from, or within a computer
system.
NOTE:
● Interception is listening to, recording, monitoring or surveillance of the
content of communications through the use of electronic eavesdropping or
tapping devices at the same time that the communication is occurring
3. DATA INTERFERENCE
The intentional or reckless alteration, damaging, deletion or
deterioration of computer data, electronic document or electronic
data message without right – including the introduction or
transmission of viruses NOTE:
GUIDE QUESTION: R.A. 10175
Consider the following situation:
A friend sent you a file on a flash drive infected with a virus
Both of you is not aware that the flash drive is infected
After you insert the flash drive in your computer, your computer get
infected and you lost your documents
Is your friend liable for any violation on RA 10175?
YES! Data interference includes “the intentional or reckless alteration,
damaging, deletion
or deterioration of computer data” – even if your friend has no malicious
intent it is still considered as “recklessness” in his/her part causing you
to lose your file
4. SYSTEM INTERFERENCE
The intentional alteration or reckless hindering or interference with the
functioning of a computer or computer network by inputting,
Page | 6
transmitting, damaging, deleting, deteriorating, altering or suppressing
computer data or program, electronic document, or electronic data
message, without right or authority, including the introduction or
transmission of viruses
NOTE:
● This is more or less an extension of the previous offense whereby the
affected entity is not just data but the whole system
Page | 7
COMELEC website defaced by Anonymous Philippines (March 27,
2016)
5. MISUSE OF DEVICE
The unauthorized use, production, sale, procurement, distribution or
otherwise making available of:
i. A device designed for committing any offenses under this Act ii.
A computer password, access code, or similar data by which […] a
computer system is […] accessed with the intent of committing
any offenses under this act
NOTE:
MISUSE OF DEVICE EXAMPLE: SKIMMING DEVICES and KEYLOGGERS
6. CYBER-SQUATTING
The acquisition of a domain name on the internet in bad faith to profit,
mislead, destroy reputation, and deprive others from registering the
same
It is cyber squatting if the domain name that was acquired is:
i. Similar, identical or confusingly similar to an existing government-
registered trademark;
ii. In case of a personal name, identical or in any way similar with the
name of a person other than the registrant; and
iii. Acquired without right or with intellectual property interests in it
NOTE:
● CYBER-SQUATTING SAMPLE CASE: MikeRoweSoft.com
Page | 8
In January 2004, Mike Rowe was a grade 12 student who operated a
profitable web design business as a part time job.
He registered the website with the domain name MikeRoweSoft.com
Lawyers from Microsoft asked him to stop using the website and Mike
Rowe complied after an undisclosed settlement with the company
NOTE:
● COMPUTER-RELATED FORGERY EXAMPLE:
Hacking into the SLU Student Portal to change your grade from 65 to 95
Since NO MONETARY VALUE is involved, this is considered as “forgery” and
not “fraud”
2. Computer-related FRAUD
The unauthorized input, alteration, or deletion of computer data or
program or interference in the functioning of a computer system,
causing damage thereby with fraudulent intent
NOTE:
● The ONLY difference between forgery and fraud is if the damage incurred
has a monetary value.
● COMPUTER-RELATED FRAUD EXAMPLES:
Hacking into a bank’s database and changing your account balance from
PhP 500 to PhP 5,000
Asking people to send you a “prepaid load” by pretending to be a
“relative from abroad”
Page | 9
● The intentional acquisition, use, misuse, transfer, possession,
alteration or deletion of identifying information belonging to another
[person] without right
NOTE:
● COMPUTER-RELATED IDENTIFY THEFT EXAMPLE:
Those fake social media accounts that has a user profile that contains
“identifying information” – like picture or name – belonging to another
person with the intention of using it for malicious purposes, such as
pretending to be the actual person even if it is not
NO! Since both parties consented and even if these acts are publicly
denounced, they do NOT constitute to cybersex since the act is NOT done
for “any favour or consideration” and without the element of “engagement
in business”
2. CHILD PORNOGRAPHY
● The unlawful or prohibited acts defined and punishable by R.A. 9775:
The Anti-Child Pornography Act of 2009 committed through a
computer system
● This includes any representation – whether visual or audio – by
electronic or any other means of a child engaged or involved in real
or simulated explicit sexual activities NOTE:
GUIDE QUESTION: R.A. 10175
Are “hentai” clips – sexually explicit Japanese comics or anime – considered as
a violation of this law?
NO … unless the hentai clip itself contains a character which is explicit
identified as a minor. If so, the said material is prohibited and the
creator/distributor of the said material are liable for violation of this law.
Page | 10
3. ONLINE LIBEL
● Libel is the public and malicious imputation of a crime – real or
imaginary – or any act, omission, condition, status or circumstance
tending to cause the dishonor, discredit, or contempt of a […] person,
or to blacken the memory of the dead
Page | 11
If you COMMENTED on the said post with “OO NGA!”, are you liable?
NO! Similar to LIKING or REACTING, commenting “OO NGA!” does not
discredit or allege Maria David – none of the FOUR ELEMENTS OF LIBEL
is present!
If you COMMENTED on the said post with “OO NGA! MAGNANAKAW
KAYONG MAG-
INA”, are you liable?
YES! This statement is not merely an approval but also states an
allegation towards Maria David and her mother.
This makes the person liable for libel since the comment can be seen
publicly as well.
Page | 12
The following and similar acts, though they may not constitute a criminal
offense, shall produce a cause of action for damages, prevention and other
relief:
(1) Prying into the privacy of another's residence;
(2) Meddling with or disturbing the private life or family relations of another;
(3) Intriguing to cause another to be alienated from his friends;
(4) Vexing or humiliating another on account of his religious beliefs, lowly
station in life, place of birth, physical defect, or other personal condition.
GUIDE QUESTION: RIGHT TO PRIVACY
May an individual installs surveillance cameras on his own property facing the
property of another? (Hing vs. Choachuy 2013)
NO! A man’s house is his castle, where his right to privacy cannot be denied or
even restricted by others.
It includes any act of intrusion into, peeping or peering inquisitively into the
residence of another without the consent of the latter.
NOTE on the INSTALLATION of CAMERAS:
The installation of surveillance cameras, should NOT cover places where there is
reasonable expectation of privacy, unless the consent of the individual – whose
right to privacy would be affected – was obtained.
Page | 13
REASONABLE EXPECTATION OF PRIVACY
Also known as the “right to be left alone”, refers to the right of a person to “expect
privacy” in places and/or situations that the community generally accepts as
“quite reasonable”
For instance, there are certain instances that a person assumes that there is
reasonable expectation of privacy such that at that particular moment nobody
can see or hear him/her.
GUIDE QUESTION: REASONABLE EXPECTATION OF PRIVACY
Does an employee have a reasonable expectation of privacy in the workplace?
According to a court decision, an employee have LESS or NO expectations of
privacy in the workplace.
For instance, CCTV cameras may be watching an employee’s every move while
inside the company grounds. The only place where there is reasonable
expectation of privacy is inside the toilet facilities of the company.
Section 4: PENALTIES.
The penalty for the commission of any of the prohibited acts above are as
follows:
● Imprisonment of 3 years to 7 years imprisonment; and
● Fine of Php 100,000.00 to Php 500,000.00
Page | 15
DEFINITION OF TERMS
1. PERSONAL INFORMATION CONTROLLER (PIC)
The individual, corporation, or body who decides what to do with data.
4. BREACH
A security incident that:
a. Leads to unlawful or unauthorized processing of personal,
sensitive, or privileged information;
b. Compromises the availability, integrity, or confidentiality of
personal data.
Page | 16
PROCESSING OF PERSONAL INFORMATION
The processing of personal information shall be allowed if it adheres to ALL the
following:
1. PRINCIPLES OF TRANSPARENCY
● The data subject must know:
a. What personal data will be collected
b. How the personal data will be collected
c. Why personal data will be collected
● The data processing policies of the PIC must be known to the data
subject.
● The information to be provided to the data subject must be in clear
and plain language.
3. PRINCIPLE OF PROPORTIONALITY
● The amount of data collected for processing should be adequate,
relevant, and not excessive in proportion to the purpose of the
data processing.
● Efforts should be made to limit the processed data to the minimum
necessary.
Page | 17
3. The processing is necessary for compliance with a legal obligation to
which the PIC is subject;
4. The processing is necessary to protect vitally important interests of the
data subject, including life and health;
5. The processing is necessary in order to respond to national emergency,
to comply with the requirements of public order and safety, or to fulfill
functions of public authority […]; or
6. The processing is necessary for the purposes of the legitimate interests
pursued by the PIC […], except where such interests are overridden by
fundamental rights and freedoms of the data subject […]
2. Right to OBJECT
● The right to refuse to the processing of personal data.
● This includes the right to be given an opportunity to withhold
consent to the processing in case of any changes or any
amendment to the information supplied or declared.
3. Right to ACCESS
● The right to find out whether a PIC holds any personal data about
you.
4. Right to RECTIFICATION
● This involves the right to dispute the inaccuracy or error in the
personal data and have the PIC correct it immediately.
● It also includes access to new and retracted information, and
simultaneous receipt thereof.
Page | 18
● Recipients previously given erroneous data must be informed of
inaccuracy and rectification upon reasonable request of the data
subject.
6. Right to DAMAGES
● This is the right to be receive compensation for any damages
sustained due to inaccurate, incomplete, outdated, false,
unlawfully obtained, or unauthorized use of personal data.
● If there are circumstances where you discovered that your
personal data was mishandled, you have the right to ask for
compensation for the damage it has caused you.
Page | 19
GUIDE QUESTION: R.A. 10173
May a teacher/professor search the contents of a student’s cellular phone?
NO! Any search through a student’s cellular phone without justification under a
law or regulation is UNLAWFUL, and may be considered as “unauthorized
processing of data”
However, there are exceptions:
• If it was done with student’s consent [except if the student is a minor]
• If it is required by the student’s life and health, or by national emergency.
NO! Consent under the Data Privacy Act has three requirements, none of which
are seen in an implied consent:
• Consent must be freely given;
• Details about what consent is being asked must be specific; and
• There must be an informed indication of will.
NO! It is possible that one may share a similar signature as another person.
Moreover, some signatures do not, in any way, show signs of identity of a
person.
However, these may be considered personal information when used to identify
an individual such as a signature affixed on the name of a person.
Are usernames, password, IP and MAC address, location cookies and birthday
(month and day only) are considered personal information?
YES!*
* Only when they are combined with other pieces of information that may allow
an individual to be distinguished from others.
Page | 20
2. Accessing personal information and sensitive personal information due
to negligence Provided access to (sensitive) personal information due to
negligence or was unauthorized under the Data Privacy Act or any
existing law.
6. Malicious disclosure
Discloses to a third party unwarranted or false information with malice or
in bad faith relative to any (sensitive) personal information obtained by
such PIC or PIP.
Page | 21
IT security is about protecting things that are of value to an organization.
Security controls exist to reduce or mitigate the risk to those assets. They
include any type of policy, procedure, technique, method, solution, plan, action,
or device designed to help accomplish that goal. Recognizable examples
include firewalls, surveillance systems, and antivirus software.
Control Types
● Physical Controls – Describes anything tangible that’s used to prevent or
detect unauthorized access to physical areas, systems, or assets. This
includes gates, access cards, CCTVs, and motion sensors.
● Technical Controls – (also known as logical controls) Includes hardware
or software mechanisms used to protect assets. Common examples are
authentication solutions, firewalls, and antivirus software.
● Administrative Controls – Refers to policies, procedures, or guidelines
that define personnel or business practices in accordance with the
organization's security goals. These can apply to the hiring and
termination of employees, equipment and Internet usage, separation of
duties, and auditing.
Control Functions
● Preventive Controls – These is any security measure that is designed to
prevent or stop any malicious activity from happening. These can be
fences, alarms, and antivirus software.
● Detective Controls – These is any security measure taken or
implemented to detect and alert to unwanted or unauthorized activity in
progress or after it has occurred. It can be alerting guards or notifications
from a motion sensor.
● Corrective Controls – Any measures taken to repair damage or restore
resources and capabilities following an unauthorized or unwanted
activity. This may include rebooting the system, or terminating a process,
or quarantining a virus.
Page | 22
CONTROL FUNCTIONS
GRADED ACTIVITY 2
Page | 23
2. Think of any business around you (your bank, convenience store, etc.)
and identify ways on how you think they can be more productive. Explain
in 3-5 sentences.
Part 3: Unit 3 (5 pts)
1. Computers perform many jobs that previously were performed by people.
Will computer-based transactions and expanded e-commerce eventually
replace person to-person contact? From a customer’s point of view, is
this better? Why or why not?
2. What types of information systems might a large company use?
0 -1000 -1000
1 600 100
2 400 400
3 200 600
4 200 600
5 100 700
Solution:
Content marketing can be a very hectic mess unless you organize it into clear
business processes. Consider the following process:
• The content writer takes up & finishes the first draft of an article. Includes
descriptions of any custom images that are to be used in the article
• The marketer gathers influencer contact information, to be used for advertising
and marketing once the article is done
• The editor proof-reads the article, makes points on grammar, style, spelling, etc.
• The designer creates custom images as asked, sending them over to the
content writer
Page | 24