Tuesday, March 15, 2011

CS 192 - Module 11-13

1. What is computer crime?

                Computer crimes or cybercrimes encompass unauthorized or illegal activities perpetrated via computer as well as the theft of computers and other technological hardware. Generally, however, it may be divided into one of two types of categories: (1) crimes that target computer networks or devices directly; (2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device. As firms of all sizes, industrial orientation, and geographic location increasingly rely on computers to operate, concerns about computer crime have also risen, in part because the practice appears to be thriving despite the concerted efforts of both the law enforcement and business communities to stop it. But computer experts and business consultants alike note that both international corporations and modest family-owned businesses can do a great deal to neutralize computer viruses and other manifestations of computer crime.

2. Give an example of computer crime not stated in the Computer Ethics Blog.

                An example of computer crime not stated in the said blogspot is the crime that is termed as "Eavesdropping on Emanations". Electronic emanations from computer equipment is a risk you need to be aware of, although this is mainly a concern for military and intelligence data. Computer equipment, like every other type of electrical equipment from hairdryers to stereos, emits electromagnetic impulses. Whenever you strike a computer key, an electronic impulse is sent into the immediate area. Foreign intelligence services, commercial enterprises, and sometimes even teenage crackers may take advantage of these electronic emanations by monitoring, intercepting, and decoding them. This may sound highly sophisticated, but there have been some embarrassingly easy cases.

3. What is stated in section 33a of Republic Act 8792?
                         
                Hacking or crackling with refers to unauthorized access into or interference in a computer system/server or information and communication system; or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner of the computer or information and communications system, including the introduction of computer viruses and the like, resulting in the corruption, destruction, alteration, theft or loss of electronic data messages or electronic documents shall be punished by a minimum fine of One Hundred Thousand pesos (P 100,000.00) and a maximum commensurate to the damage incurred and a mandatory imprisonment of six (6) months to three (3) years.
 
4. In Visayas State University, there is an office that deals with protecting the Intellectual Property Rights (IPR) of those who publish their intellectual output works. What is this office that caters with IPR concerns? Who is the head of this office?
 
               In VSU, the office that delas with protecting the Intellectual Property Rights (IPR) of those who publish their intellectual output works is the ODREX or the Office of the Director for Research and Extension and is headed by Dr. Othelo Capuno.

No comments:

Post a Comment