100% found this document useful (3 votes)
2K views6 pages

Introduction To Cybercrime

Topics covered include the nature of cybercrimes and computer systems, cybercrime offenses defined in the law, and the procedures for digital forensics investigation and prosecution of cybercrimes while respecting human rights. Assessment includes exams, papers, and case analyses to evaluate students' understanding and application of these concepts.

Uploaded by

mark patalinghug
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
2K views6 pages

Introduction To Cybercrime

Topics covered include the nature of cybercrimes and computer systems, cybercrime offenses defined in the law, and the procedures for digital forensics investigation and prosecution of cybercrimes while respecting human rights. Assessment includes exams, papers, and case analyses to evaluate students' understanding and application of these concepts.

Uploaded by

mark patalinghug
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

INTRODUCTION TOCYBERIME AND ENVIONMENTAL LAWS AND PROTECTION

COURSE
Performance
OUTCOMES COURSE CONTENT/TOPICS
PROGRAM Indicators Teaching Learning Continuing
(ILO-Course Level) Assessment Task
OUTCOMES
COURSE DESCRIPTION: The students should Activities (TLAs) Monitoring
The students should
be able to:
be able to :
This course covers an overview of cybercrime, including a basic understanding of computer technology, history of cybercrimes, nature and types of cybercrimes,
INTRODUCTION TO CYBERCRIMES
incident response, collection and preservation; digital investigative plan, and the applicable legal provision. This also covers the study of the concepts and principles of
POb -environment
Internalize specifically
1. Discuss the
on ecosystem and1.biodiversity,
Articulate various
the Lesson
threats 1: Overview
to their existence of  Lecture It includes the study of relevant environmental
and its impact on humankind.
laws and
the concepts of concepts
jurisprudence, the and
detection, concepts
investigation, and and
gathering Cybercrime,
of evidence in Basic
the Components
prosecution of cases.  Interactive  Written and
human rights and principles of principles of and Functions of Digital Devices discussion Oral
victim welfare with cybercrimes digital forensics in and Definition of Computer  Reporting/multimedi Examinations
respect to investigation. the investigation Terminology a  Recitation
cybercrime of cybercrimes. a. Introduction  presentation  Rubrics
2. Demonstrate the 2. Apply the b. General concept of  Seminar  Term papers
investigation
application of principles of cybercrime and cyberspace
principles of cybercrime c. Nature of Cybercrime
cybercrime investigation with d. Historical background of
investigation with respect to human cybercrimes
respect to human rights and e. Concept of Cybercriminal
rights and victims’ victim’s welfare. and cybercrime network
welfare. f. Preventive measures against
cybercrimes

POc – Demonstrate 1. Use criminalistics or 1. Apply the correct Lesson 2: Components of  Lecture
competence and forensic science procedure in Computer System  Video /film showing  Written and
broad concepts in the assembling and a. Four (4) Main computer of actual Oral
understanding in detection and disassembling the components investigation Examinations
law enforcement investigation of main computer a. Input devices  Recitation
 seminar
administration, violations components to b. Output devices  Rubrics
public safety and cybercrime laws retrieve digital c. Secondary storage  Term papers
criminal justice data device
d. Processor
e. Primary Storage
Devices
b. Computer System
 Computer Hardware
 Computer Software
c. Functions of digital devices
or Relevant characteristics of
digital information
d. Basic computer terminology

POc – Demonstrate 1. Understand the 1. Apply the different Lesson 3: CYBERCRIME • Lecture
competence and principles on relevant principles on OFFENSES (SEC. 4, 5 , and 6 • Interactive discussion • Written and Oral
broad jurisprudence related to relevant R.A. 10175) AND DUTIES OF • Reporting / Examinations
understanding in cybercrimes. jurisprudence LEAs Multimedia • Recitation
law enforcement related to 1. RA 10175, Sec 4 – Cybercrime presentation • Rubrics
administration, cybercrimes. Offenses • Seminar • Term papers
public safety and 1. Illegal access • Case analysis
criminal justice 2. Illegal interception
3. Data interference • Lecture • Written and Oral
2. Application of 4. System Interference • Interactive Examinations
evidence and criminal 5. Misuse of Devices discussion • Recitation
6. Cyber-squatting
procedure in the 2. Apply the specific • Reporting / • Rubrics
7. Computer Related Offenses
prosecution of applicable criminal Multimedia • Term papers
a. Computer related forgery
cybercrimes procedure and presentation
b. Computer related
evidence on identity theft
cybercrimes c. Content related offenses
 Cybersex
 Child Pornography
 Unsolicited
commercial
communications
 Libel
2. RA 10175, Sec 5 - Other
Offenses
a. Aiding and abetting in
the commission of
cybercrime
b. Attempt in the
commission of
cybercrime
3. R 10175, Sec. 6 - Crimes
defined and penalized in RPC
through the use of ICT
4. RA 10175, Sec 11 – Duties of
Law Enforcement Agencies
PO-d – Utilize 1. Demonstrate 1. Apply the Lesson 4. INCIDENT RESPONSE, • Written and Oral
criminalistics or competence in procedure in the PRESERVATION and • Lecture Examinations
forensic science in search, collection identification and COLLECTION • Interactive • Recitation
the investigation and preservation of preservation of discussion • Rubrics
and detection of digital evidence. digital evidence A. Steps in the Identification and • Reporting / • Practicum
crimes from local and preservation of digital Multimedia outputs
international 3rd evidence from local and presentation
party providers. international 3rd party
providers
2. Apply properly the
steps during 1. Preservation rules under the
incident response Budapest convention and
to protect the value G7 24/7 high tech crimes
of forensic network
evidence. 2. Rules of cybercrime
warrants and related
3. Familiarize in issuances
using forensic 3. Preservation through law
tools like FTK, enforcement portals
EDD and Magnet
Ram Capture in B. Steps for Incident Response &
imaging the hard Imaging
drives. 1. Visual Assessment of
Powered On Computers
2. Image RAM
3. Check for Encryption

1. Demonstrate 1. Execute the steps Lesson 5: DIGITAL 1. Lecture • Written and Oral
knowledge in in making a digital INVESTIGATIVE PLAN 2. Interactive discussion Examinations
criminalistics, forensic investigative plan A. Digital Investigative Analysis 3. Reporting / • Rubrics
science in the detection when conducting Multimedia • Practicum
and investigation of cybercrime 1. Digital evidence storage presentation outputs
violations cybercrime investigation. a) Desktop, laptop, server
laws b) Hard drives
i) Electromagnetic
ii) Solid State
c) Random Access Memory
(RAM)
d) External devices
e) Cloud
f) Mobile devices
g) Novelty devices 
2. Computers save and delete
information
a) Electromagnetic Drives
i) Deleted files remain
forever, until they are
overwritten
b) Solid state drive
c) Physical VS Logical
d) Time Stamps
3. Counter Forensic Activity
a) Check application activity
b) Event Log Clearing
c) Command Line activity
1. Demonstrate 1. Use the steps in Lesson 6: INITIAL • Lecture • Written and Oral • Written
knowledge in imaging RAM and EXAMINATION OF DIGITAL • Interactive Examinations and Oral
criminalistics, forensic hard drive. EVIDENCE (ARTIFACTS) discussion • Rubrics Examinat
science in the detection • Reporting / • Practicum ions
and investigation of 2. Analyze the digital 1. File Knowledge/Access Multimedia outputs • Rubrics
violations cybercrime evidence 2. Applications/Program Activity presentation • Prac
laws recovered from the 3. USB Analysis ticum
RAM and hard 4. Location Information outputs
drive. 5. Time Manipulation
6. Communications

POc: Demonstrate 1. Apply the principles 1. Execute the Lesson 7: WARRANTS AND • Lecture  Written and  Written
competence and on relevant different warrants and OTHER ISSUANCES FOR • Interactive Oral and Oral
broad jurisprudence related to other issuances COMPUTER DATA discussion Examinations Examina
understanding in cybercrimes. needed to search, a. Warrant to disclose computer • Reporting /  Rubrics tions
law enforcement seize and examine data Multimedia  Practicum  Rubrics
administration, computer data. b. Warrant to intercept presentation outputs  Practicu
public safety and computer data m
criminal justice c. Warrant to search, seize and outputs
examine computer data
d. Warrant to examiner
computer data
e. Warrant to destroy computer
data

ENVIRONMENTAL LAWS AND PROTECTION


POc: Demonstrate 1. Understand the 1. articulate and apply  Environmental concepts and •Lecture  Written and
competence and concepts and principles the concepts and principles •Interactive discussion Oral
broad about environment, principles of  Attributes of ecosystem and •Reporting / Multimedia Examinations
understanding in specifically on environment, biodiversity presentation  Recitation
law enforcement ecosystem and specifically on  Various threats to environmental •Field visits/exercises  Rubrics
administration, biodiversity ecosystem and well-being •Seminar  Term papers
public safety and biodiversity and the  Threats to mankind
criminal justice various threats to their
existence
2. Demonstrate 2. apply knowledge on • International Union for the • Lecture
knowledge on relevant the legal foundations Conservation of Nature (IUCN) • Interactive
environmental laws and of environmental • NIPAS Law discussion
their elements, laws, particularly on • Convention on Biodiversity •
jurisprudence, and the ecosystem and • Etc…
gathering of evidence in biodiversity
the prosecution of
cases.
POd: utilize 1. Apply 1 Detect and  Specific or relevant techniques in  Lecture • Written and
criminalistics or knowledge in investigate wildlife environmental crime detection  Video /film showing Oral
forensic science in criminalistics, trafficking (Comparison of morphology of of actual Examinations
the investigation forensic science in d.2 Identify wildlife sawdust) investigation • Recitation
and detection of the detection and belonging to various  Specific lists of various  seminar • Rubrics
crime investigation of conservation status conservation status (IUCN, CITES, • Term papers
violations of As classified under Philippines Red List)
environmental laws CITES, IUCN and  Forms or documentations required
Philippines Red List for transport of wildlife
d.3 Determine
authenticity of
documents involved in
illegal trade and
trafficking
POe:. apply the 1. Understand the 1. Know the different • jurisprudence • Lecture • Written and Oral
principles and principles on relevant principles on relevant • List of jurisprudence and list of • Interactive discussion Examinations
jurisprudence of jurisprudence related to jurisprudence related laws, • Reporting / • Recitation
criminal law, environmental cases. to environmental • Special rules of procedures for Multimedia • Rubrics
evidence and cases (blue and green) environmental cases presentation • Term papers
criminal procedure; • Field visits/exercises • Case analysis
• Seminar
2. Application of 2 Demonstrate the • Rules of procedure for • Lecture • Written and Oral
evidence and criminal specific applicable environmental cases (civil or • Interactive Examinations
procedure in the criminal procedure criminal) discussion • Recitation
prosecution of and evidence on • IPRA Law • Reporting / • Rubrics
environmental cases environmental cases • Blue and Green Laws Multimedia • Term papers
(blue and green) presentation • Case analysis
• Field visits/ exercises
• Seminar

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy