0% found this document useful (0 votes)
40 views2 pages

Batin - Celpp Activity 3

computer engineering law and practice

Uploaded by

katrinaricci110
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views2 pages

Batin - Celpp Activity 3

computer engineering law and practice

Uploaded by

katrinaricci110
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

ACTIVITY 3

Name: SUBJECT Course Code


BATIN, KATRINA COMPUTER ENGINEERING LAWS CMPE 30202
RICCI C. AND PROFESSIONAL PRACTICE
Course & Section Instructor Date
BSCOE 3 – 4 ENGR. ANTONIO VELASCO June 18, 2024

I. Directions: Identify the following. Write your answer in the space provided.

ANSWERS STATEMETS

Patch 1. “Fix” to a certain program that aims to eliminate the problem.


2. Pieces of programming code that are usually disguised as something
Viruses else that causes unexpected and undesirable behavior to the
computer and are often attached to files.

3. Harmful programs that reside in the active memory of a computer


Worms
and duplicate themselves.

4. Set of programs that enables its user to gain administrator-level


Rootkits
access to a computer without the end user’s consent or knowledge.

5. Abuse of email systems to send unsolicited emails to large


Spam
numbers of people.

6. Act of using email fraudulently to try to get the recipient to reveal


Phishing
personal data.

7. People that test the limitations of systems out of intellectual


Hackers
curiosity.

Hacktivism 8. An act of hacking to achieve a political or social goal.

9. People who attack computers or networks in an attempt to


intimidate
Cyberterrorist
or coerce a government to advance certain political or social
objectives.

Computer Forensics 10. The key to fighting computer crime in a court of law.
ACTIVITY 3

Name: SUBJECT Course Code


BATIN, KATRINA COMPUTER ENGINEERING LAWS CMPE 30202
RICCI C. AND PROFESSIONAL PRACTICE
Course & Section Instructor Date
BSCOE 3 – 4 ENGR. ANTONIO VELASCO June 18, 2024

II. In the recent status of the online transactions we are experiencing in the pandemic
situation, give at least one example scenario of the following: Phishing, spear-fishing,
smishing, vishing. Write your answer in your Gdrive file.
Some examples of Phishing, Spear-Phishing, Smishing, and Vishing:

1. Phishing: You receive an email that looks like it's from your university's CPE department, asking

you to update your student account information by clicking on a link. The email seems legitimate,

but the link takes you to a fake login page where your credentials can be stolen.

2. Spear-Phishing: You receive a personalized email that appears to be from a classmate or

professor, asking you to download study materials from a shared link. However, clicking the link

could lead to malware being installed on your device.

3. Smishing: You receive a text message claiming to be from a student organization, offering a link

to vote for the next club president. Clicking on the link directs you to a fake website where your

personal information might be compromised.

4. Vishing: You receive a phone call from someone claiming to be from the student loan office,

asking you to verify your student ID and financial aid details over the phone. This could be a

scam to steal your sensitive information.

You might also like