Sie sind auf Seite 1von 8

Jhoanne Khryss P.

Dela Cruz
BSCS-4A
Types of Viruses and Other Malicious Programs
1. Resident Viruses
This type of virus is a permanent which dwells in the RAM memory. From
there it can overcome and interrupt all of the operations executed by the
system: corrupting files and programs that are opened, closed, copied,
renamed etc.
Examples include: Randex, CMJ, Meve, and MrKlunky.
2. Multipartite Viruses
Multipartite viruses are distributed through infected media and usually hide
in the memory. Gradually, the virus moves to the boot sector of the hard
drive and infects executable files on the hard drive and later across the
computer system.
3. Direct Action Viruses
The main purpose of this virus is to replicate and take action when it is
executed. When a specific condition is met, the virus will go into action and
infect files in the directory or folder that it is in and in directories that are
specified in the AUTOEXEC.BAT file PATH. This batch file is always located in
the root directory of the hard disk and carries out certain operations when
the computer is booted.
4. Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information
contained in the files that it infects, rendering them partially or totally
useless once they have been infected.
The only way to clean a file infected by an overwrite virus is to delete
the filecompletely, thus losing the original content.
Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.
5. Boot Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a
crucial part of a disk, in which information on the disk itself is stored together
with a program that makes it possible to boot (start) the computer from the

disk.
The best way of avoiding boot viruses is to ensure that floppy disks are writeprotected and never start your computer with an unknown floppy disk in the
disk drive.
Examples of boot viruses include: Polyboot.B, AntiEXE.
6. Macro Virus
Macro viruses infect files that are created using certain applications or
programs that contain macros. These mini-programs make it possible to
automate series of operations so that they are performed as a single action,
thereby saving the user from having to carry them out one by one.
Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.
7. Directory Virus
Directory viruses change the paths that indicate the location of a file. By
executing a program (file with the extension .EXE or .COM) which has been
infected by a virus, you are unknowingly running the virus program, while
the original file and program have been previously moved by the virus.
Once infected it becomes impossible to locate the original files.
8. Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way (using
different algorithms and encryption keys) every time they infect a system.
This makes it impossible for anti-viruses to find them using string or
signature searches (because they are different in each encryption) and also
enables them to create a large number of copies of themselves.
Examples include: Elkern, Marburg, Satan Bug, and Tuareg.
9. File Infectors
This type of virus infects programs or executable files (files with an .EXE or
.COM extension). When one of these programs is run, directly or indirectly,
the virus is activated, producing the damaging effects it is programmed to
carry out. The majority of existing viruses belongs to this category, and can
be classified depending on the actions that they carry out.
10. Encrypted Viruses

This type of viruses consists of encrypted malicious code, decrypted module.


The viruses use encrypted code technique which make
antivirus softwarehardly to detect them. The antivirus program usually can
detect this type of viruses when they try spread by decrypted themselves.

CYBERCRIME LAW IN THE PHILIPPINES


Republic Act No. 10175 or the Cybercrime Prevention Act of
2012 is a Philippine Republic Act signed by President Aquino on 12
September 2012. It aims to address legal issues concerning online
interactions. Among the cybercrime offenses included in the bill are
cybersquatting, cybersex, child pornography, identity theft, illegal access to
data and libel, but the new Act received mixed reactions upon its enactment
especially on the grounds of freedom of expression, freedom of speech and
data security. Several petitions are currently submitted to the Supreme Court
of the Philippines questioning the constitutionality of the Act.
The Cybercrime Prevention Act of 2012 is the first law in the Philippines
which specifically criminalizes computer crime, which prior to the passage of
the law had no strong legal precedent in Philippine jurisprudence. The Act,
divided into 31 sections split across eight chapters, criminalizes several
types of offenses, including illegal access (hacking), data interference, device
misuse, cybersquatting, computer-related offenses such as computer fraud,
content-related offenses such as cybersex and spam, and other offenses. The
law also reaffirms existing laws against child pornography, an offense under
Republic Act No. 9779 (the Anti-Child Pornography Act of 2009), and libel, an
offense under Section 377 of the Revised Penal Code of the Philippines, also
criminalizing them when committed using a computer system. Finally, the
Act provides for a "catch-all" clause, wherein all offenses currently
punishable under the Revised Penal Code are likewise punishable under the
Act when committed using a computer, with corresponding stricter penalties
than if the crimes were punishable under the Revised Penal Code alone.

Section 4 - Cyber Crime Offenses

(a)

Offenses against the confidentiality, integrity and

availability of computer data and systems


1. Illegal Access - The access to the whole or any part of a computer
system without right.
2. Illegal Interception - The interception made by technical means
without right of any non-public transmission of computer data to,
from, or within a computer system including electromagnetic
emissions from a computer system carrying such computer data.
3. Data Interference - The intentional or reckless alteration,
damaging, deletion or deterioration of computer data, electronic
document, or electronic data message, without right, including the
introduction or transmission of viruses.
4. System Interference - The intentional alteration or reckless
hindering or interference with the functioning of a computer or
computer network by inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer data or computer
program, electronic document, or electronic data message, without
right or authority, including the introduction or transmission of
viruses.
5. Misuse of Devices - The use, production, sale, procurement,
importation, distribution, or otherwise making available, without
right, of:
A device, including a computer program, designed or
adapted primarily for the purpose of committing any of the

offenses under this Act; or


A computer password, access code, or similar data by
which the whole or any part of a computer system is
capable of being accessed with intent that it be used for
the purpose of committing any of the offenses under this

Act.
6. Cyber-squatting - The acquisition of a domain name over the
internet in bad faith to profit, mislead, destroy reputation, and
deprive others from registering the same, if such a domain name is:

Similar, identical, or confusingly similar to an existing


trademark registered with the appropriate government

agency at the time of the domain name registration:


Identical or in any way similar with the name of a person

other than the registrant, in case of a personal name; and


Acquired without right or with intellectual property
interests in it.

(b)

Computer-related offenses

1. Computer-related Forgery- The input, alteration, or deletion of any


computer data without right resulting in inauthentic data with the
intent that it be considered or acted upon for legal purposes as if it
were authentic, regardless whether or not the data is directly readable
and intelligible; or the act of knowingly using computer data which is
the product of computer-related forgery as defined herein, for the
purpose of perpetuating a fraudulent or dishonest design.
2. Computer-related Fraud - The unauthorized input, alteration, or
deletion of computer data or program or interference in the functioning
of a computer system, causing damage thereby with fraudulent intent:
Provided, That if no damage has yet been caused, the penalty
imposable shall be one (1) degree lower.
3. Computer-related Identity Theft - The intentional acquisition, use,
misuse, transfer, possession, alteration or deletion of identifying
information belonging to another, whether natural or juridical, without
right: Provided, That if no damage has yet been caused, the penalty
imposable shall be one (1) degree lower.
(c)

Content-related offenses

1. Cybersex - The willful engagement, maintenance, control, or


operation, directly or indirectly, of any lascivious exhibition of sexual

organs or sexual activity, with the aid of a computer system, for favor
or consideration.
2. Child Pornography - The unlawful or prohibited acts defined and
punishable by Republic Act No. 9775 or the Anti-Child Pornography Act
of 2009, committed through a computer system. The penalty to be
imposed shall be (1) one degree higher than that provided for in
Republic Act No. 9775.
3. Unsolicited Commercial Communications - The transmission of
commercial electronic communication with the use of computer system
which seek to advertise, sell, or offer for sale products and services are
prohibited unless:
There is prior affirmative consent from the recipient; or
The primary intent of the communication is for service
and/or administrative announcements from the sender to

its existing users, subscribers or customers; or


The following conditions are present:
The commercial electronic communication contains a
simple, valid, and reliable way for the recipient to reject
receipt of further commercial electronic messages (opt-out)

from the same source;


The commercial electronic communication does not
purposely disguise the source of the electronic message;

and
The commercial electronic communication does not
purposely include misleading information in any part of the
message in order to induce the recipients to read the

message.
4. Libel - The unlawful or prohibited acts of libel as defined in Article 355
of the Revised Penal Code, as amended, committed through a
computer system or any other similar means which may be devised in
the future.

Section 5 - Other offenses under R.A. 10175

1. Aiding or Abetting in the Commission of Cybercrime - Any person who


willfully abets or aids in the commission of any of the offenses
enumerated in this Act shall be held liable.
2. Attempt in the Commission of Cybercrime - Any person who willfully
attempts to commit any of the offenses enumerated in R.A. 10175 shall
be held liable.
Penalties:

For sections 4a and 4b, imprisonment of prision mayor or a fine of at

least P200,000 or both.


For section 4a5, imprisonment of prision mayor or a fine of not more

than P500,000 or both.


If section 4a are committed in critical infrastructure, penalty of

reclusion temporal or a fine of at least P500,000 or both.


For section 4c1, imprisonment of prision mayor or a fine of at least

P200,000 but not exceeding P1,000,000 or both.


For section 4c2, penalties as enumerated in RA 9775 or Anti-Child
Pornography Act of 2009. 1 degree higher if committed in computer

system.
For section 4c3, punishment of arresto mayor or a fine of at least

P50,000 but not exceeding P250,000 or both


For section 5, punishment of 1 degree lower of the prescribed penalty
for the offense or a fine of at least P100,000 but not exceeding

P500,000 or both.
Corporate liability is equivalent to at least double the fines imposable
in section 7 up to maximum of P10,000,000.

Enforcement and Implementation

Law enforcement authorities, such as the National Bureau of


Investigation (NBI) and the Philippine National Police (PNP) shall be

responsible for the implementation of the provisions of this Act.


The Department of Justice (DOJ) shall be responsible for assisting in
investigations or proceedings concerning criminal offenses related to
computer systems or data, in collection of electronic evidence of

criminal offense and in ensuring the provisions of the law are complied
with.

Das könnte Ihnen auch gefallen