ACTIVITY 3
Name: SUBJECT Course Code
BATIN, KATRINA COMPUTER ENGINEERING LAWS CMPE 30202
RICCI C. AND PROFESSIONAL PRACTICE
Course & Section Instructor Date
BSCOE 3 – 4 ENGR. ANTONIO VELASCO June 18, 2024
I. Directions: Identify the following. Write your answer in the space provided.
ANSWERS STATEMETS
Patch 1. “Fix” to a certain program that aims to eliminate the problem.
2. Pieces of programming code that are usually disguised as something
Viruses else that causes unexpected and undesirable behavior to the
computer and are often attached to files.
3. Harmful programs that reside in the active memory of a computer
Worms
and duplicate themselves.
4. Set of programs that enables its user to gain administrator-level
Rootkits
access to a computer without the end user’s consent or knowledge.
5. Abuse of email systems to send unsolicited emails to large
Spam
numbers of people.
6. Act of using email fraudulently to try to get the recipient to reveal
Phishing
personal data.
7. People that test the limitations of systems out of intellectual
Hackers
curiosity.
Hacktivism 8. An act of hacking to achieve a political or social goal.
9. People who attack computers or networks in an attempt to
intimidate
Cyberterrorist
or coerce a government to advance certain political or social
objectives.
Computer Forensics 10. The key to fighting computer crime in a court of law.
ACTIVITY 3
Name: SUBJECT Course Code
BATIN, KATRINA COMPUTER ENGINEERING LAWS CMPE 30202
RICCI C. AND PROFESSIONAL PRACTICE
Course & Section Instructor Date
BSCOE 3 – 4 ENGR. ANTONIO VELASCO June 18, 2024
II. In the recent status of the online transactions we are experiencing in the pandemic
situation, give at least one example scenario of the following: Phishing, spear-fishing,
smishing, vishing. Write your answer in your Gdrive file.
Some examples of Phishing, Spear-Phishing, Smishing, and Vishing:
1. Phishing: You receive an email that looks like it's from your university's CPE department, asking
you to update your student account information by clicking on a link. The email seems legitimate,
but the link takes you to a fake login page where your credentials can be stolen.
2. Spear-Phishing: You receive a personalized email that appears to be from a classmate or
professor, asking you to download study materials from a shared link. However, clicking the link
could lead to malware being installed on your device.
3. Smishing: You receive a text message claiming to be from a student organization, offering a link
to vote for the next club president. Clicking on the link directs you to a fake website where your
personal information might be compromised.
4. Vishing: You receive a phone call from someone claiming to be from the student loan office,
asking you to verify your student ID and financial aid details over the phone. This could be a
scam to steal your sensitive information.