2 Flashcards

(142 cards)

1
Q

provided the FOUR GENERAL TYPES OF CYBERCRIME:

A

BUDAPEST CONVENTION ON CYBER CRIME/ BUDAPEST CONVENTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The BUDAPEST CONVENTION ON CYBER CRIME/ BUDAPEST CONVENTION held on

A

2001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FOUR GENERAL TYPES OF CYBERCRIME:

A

· OFFENSES AGAINST THE CONFIDENTIALITY, INTEGRITY AND AVAILABILITY OF COMPUTER DATA AND SYSTEMS,

· COMPUTER-RELATED OFFENSES

· CONTENT-RELATED OFFENSES

· COPYRIGHT-RELATED OFFENSES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

–on the provisions of RA 10175, the online offenses or cybercrime offenses that will fall under this typology are the

A

ILLEGAL ACCESS, ILLEGAL INTERCEPTION, DATA INTERFERENCE, SYSTEM INTERFERENCE, AND MISUSE OF DEVICES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RA 8293

A

“INTELLECTUAL PROPERTY CODE”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

–first international treaty

A

BUDAPEST CONVENTION ON CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

–held to seek or address cybercrime, to provide solution and measures in combating cybercrime

A

BUDAPEST CONVENTION ON CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

–during this convention, they crafted or created a guideline as a basis of every country in developing their national laws in terms of penalizing or combating cybercrime

A

BUDAPEST CONVENTION ON CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

–ito ang reason why na-enact ang RA 10175 kahit na meron ng RA 8792 since it only punishes limited online crimes

A

BUDAPEST CONVENTION ON CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

–nakapagdecided ang PH that they will enact another law which is RA 10175 to be compliant to this guidelines set by the convention

A

BUDAPEST CONVENTION ON CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

– is an international agreement depending on kung ano yung mga member countries involved in this convention

A

TREATY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

–PH is involved and one of the state parties or countries na naging signatory on this convention

A

BUDAPEST CONVENTION ON CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

GENERAL CLASSIFICATIONS OF CYBERCRIME

A
  1. UNAUTHORIZED ACCESS
  2. HACKING
  3. CRACKING
  4. CYBER FRAUD
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is when someone gains access to a website, program, server, service, or other system using someone else’s account.

A

UNAUTHORIZED ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

using your friends fb account after they neglected or nakalimutan nila na ilog-out ito or pwede din na naiwan nung friend mo yung laptop niya na nakaopen yung fb niya dun then pinakelaman mo

A

UNAUTHORIZED ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PASSWORD GUESSING IS THE EXAMPLE

A

UNAUTHORIZED ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

–it does not only include the attempt but also intrude or napasok or nagkaroon na siya ng access

A

HACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Any attempt to intrude into a computer or a network without authorization.
A

HACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

-This involves changing of system or security features in a bid to accomplish a goal that differs from the intended purpose of the system.

A

HACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • It can also refer to non-malicious activities, usually involving unusual or improvised alterations to equipment or processes.
A

HACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

-An individual who involves themselves in hacking activities is known as a

A

HACKER.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

– malicious software once installed it records everything you type or your keyboard strokes or it monitors everything you do on your computer

A

KEYLOGGER MALWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

–gain through using other technique like gumamit ka ng KEYLOGGER MALWARE

A

HACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • is a malicious software where mal stands for malicious then ware is software
A

MALWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
can be described as gaining unauthorized access to a computer system by improper means
HACKING
18
can be describes as gaining access to a computer system using usual means of access but without consent
UNAUTHORIZED ACCESS
19
THE VARIOUS KINDS OF HACKERS
· WHITE HATS HACKER · BLACK HAT HACKERS · GRAY HAT HACKERS
20
also known as ETHICAL HACKERS
WHITE HATS HACKER
21
strive to operate in the publics best interest, rather than to create turmoil.
WHITE HATS HACKER
22
work doing penetration, to attempt to break into the company’s networks to find and report on security vulnerabilities.
WHITE HATS HACKER
22
--their purpose is for good intention
WHITE HATS HACKER
23
--they hack their own security system to make it more hacked proof
WHITE HATS HACKER
23
--they enhance their cybersecurity once nalaman nila na vulnerable ang system nila
WHITE HATS HACKER
24
--same part of the organization wherein naghire ng hacker to check if their system is vulnerable or not
WHITE HATS HACKER
25
--many private entity or government agencies hire this kind of hacker to maintain their system security
WHITE HATS HACKER
26
to create damage, chaos
TURMOIL
27
– this kind of hackers, hack to take control over the system for personal gains.
BLACK HAT HACKERS
28
-They destroy, steal and even prevent authorized users from accessing the system
BLACK HAT HACKERS
28
--criminal by definition HACKERS
BLACK HAT HACKERS
29
--they intentionally gain unauthorized access to other accounts with malicious intent whether their purpose is to steal data, information, to spread virus, malware or for personal gain
BLACK HAT HACKERS
30
--bad intention ang gusto nila
BLACK HAT HACKERS
31
- They belong to the neutral zone.
GRAY HAT HACKERS
32
-They act in the middle ground between white hat hackers, who operate on behalf of those maintaining secure systems, and sometimes act as black hat hackers who act maliciously to exploit vulnerabilities in systems.
GRAY HAT HACKERS
33
--it depends upon the situation
GRAY HAT HACKERS
34
– is breaking into a network;
CRACKING
35
PEOPLE IN CRAKING
CRACKERS
36
-CRACKERS also act as
BLACK HATS
37
by gaining access to the accounts of people maliciously and misusing this information across networks.
CRACKING
38
-they can steal credit card information, they can destroy important files, disclose crucial data and information or personal details and sell them for personal gains
CRACKING
39
--considered as highest form of hacking
CRACKING
40
is breaking into the security system for criminal and illegal reasons or for personal gains only.
CRACKING
41
is the process of intruding computer systems without authorization in order to gain access to them, for good or bad purposes
HACKING
42
bypasses passwords or licenses in computer programs;
CRACKING
42
or in other ways intentionally breaches computer security.
CRACKING
42
is done to remove paid software requirements or pop-up purchase reminders so that people can access the software for free.
SOFTWARE CRACKING
42
COMMON TYPES OF CRACKING
* SOFTWARE CRACKING * NETWORK CRACKING * PASSWORD CRACKING
42
is a paid program that has had its copy protections removed.
SOFTWARE CRACKING
42
-is the act of infiltrating a LOCAL AREA NETWORK (LAN).
NETWORK CRACKING
43
-Sometimes referred to as web cracking or WIRED EQUIVALENT PRIVACY (WEP) cracking, this usually involves accessing poorly secure networks.
NETWORK CRACKING
44
LAN MEANS
LOCAL AREA NETWORK
45
WEP MEANS
WIRED EQUIVALENT PRIVACY
46
is the act of stealing people’s passwords from databases.
PASSWORD CRACKING
46
- is the crime committed via a computer and internet with the intent to corrupt another individual’s personal and financial information stored online from people illegally by deceiving them.
CYBER FRAUD
46
CYBER FRAUD CATEGORIES
a. SPOOFING OR PHISHING b. VIRUS HOAX EMAILS c. LOTTERY FRAUDS d. CREDIT CARD FRAUD e. THEFT OF INTERNET HOURS f. CYBER TERRORISM g. CYBER PORNOGRAPHY i. CYBER-LIBEL OR CYBER DEFAMATION j. CYBER STALKING k. DENIAL OF SERVICE ATTACKS l. DISTRIBUTED DENIAL-OF-SERVICE ATTACK (DDoS attack) m. SALAMI SLICING ATTACK/ SALAMI FRAUD n. MALWARE ATTACK
47
is a type of scam in which criminals attempt to obtain someone's personal information by pretending to be a legitimate source.
SPOOFING OR PHISHING
48
SPOOFING OR PHISHING FORM
· EMAIL SPOOFING · TEXT MESSAGE SPOOFING · URL Spoofing
49
is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.
EMAIL SPOOFING
50
the sender forges email headers so that client software displays the fraudulent sender address, which most users take at face value.
EMAIL SPOOFING
51
making an email address the same as in his bank account wherein nagsend ka ng message na kailangan niyang iclick itong link kundi mab’block yung account niya without him knowing na may mali sa email address na imbes .com ay – or dash ang nakalagay
EMAIL SPOOFING
52
- Sometimes referred to as SMISHING.
TEXT MESSAGE SPOOFING
53
-The text message may appear to come from a legitimate source, such as your bank.
TEXT MESSAGE SPOOFING
54
-It may request that you call a certain phone number or click on a link within the message, with the goal of getting you to divulge personal information.
TEXT MESSAGE SPOOFING
54
--there are people who enjoys to exploit others
VIRUS HOAX EMAILS
54
--sending text message
TEXT MESSAGE SPOOFING
54
happens when scammers set up a fraudulent website to obtain information from victims or to install malware on their computers.
URL Spoofing
55
--most common form of phishing
URL Spoofing
55
are false reports about non-existent viruses, often claiming to do impossible things like blow up the recipient's computer and set it on fire, or less sensationally, delete everything on the user's computer.
VIRUS HOAX EMAILS
56
--it is chain email that tells to forward this message to anyone they know
VIRUS HOAX EMAILS
57
- These are emails, which inform the recipient that he/ she has won a prize in a lottery.
LOTTERY FRAUDS
58
--in order for them to get the money, the recipients need to reply so once nagreply ang tao ay may isesend ulit sila na email requiring them to input all their information on your bank account
LOTTERY FRAUDS
59
is the unauthorized use of a credit or debit card, or similar payment tool to fraudulently obtain money or property.
CREDIT CARD FRAUD
60
can be stolen from unsecured websites or can be obtained in an identity theft scheme.
Credit and debit card numbers
61
-is the scheme of obtaining the personal, financial information or other information of another person to use their identity to commit fraud or other illegal activities.
IDENTITY THEFT
62
--is a vehicle for perpetrating other fraud crimes or schemes
IDENTITY THEFT
62
--online transaction became the online thing nowadays
CREDIT CARD FRAUD
62
- Unauthorized use of Internet hours paid for by another person.
THEFT OF INTERNET HOURS
62
- It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
CYBER TERRORISM
63
--flooding viruses and malware para ipakita sa government na ito yung pinaglalaban mo
CYBER TERRORISM
64
--creating fear to the people in online
CYBER TERRORISM
65
--nowadays, it is attractive option for modern terrorist or traditional terrorism since this is much more cheaper than the usual one
CYBER TERRORISM
65
--more anonymous than the modern one since nagagawa nila ito ng hindi sila nakikilala or napaglalaban nila kung ano ang gusto nila
CYBER TERRORISM
65
--the variety or number of targets are enormous or mas marami silang natatarget
CYBER TERRORISM
66
REPUBLIC ACT NO. 11479
ANTI-TERRORISM ACT OF 2020
67
– is the act of using cyberspace to create, display, distribute, import, or publish pornography or obscene materials, especially materials depicting children engaged in sexual acts with adults.
CYBER PORNOGRAPHY
68
- making sexual acts like mga nakahubad na bata then publishing it thru books, journals, newspaper
PORNOGRAPHY
68
- is a term used when someone has posted or emailed something that is untrue and damaging about someone else on the social media, including blogs, chat rooms, personal websites, social media, social networking sites, or other published articles.
CYBER-LIBEL OR CYBER DEFAMATION
68
refers to the use of the Internet, e-mail, or other electronic communications device to stalk and later on harass another person.
CYBER STALKING
69
also called as CYBER SMEARING.
CYBER-LIBEL OR CYBER DEFAMATION
70
RA 10627
ANTI BULLYING ACT OF 2013
71
accomplish this by flooding the target with traffic, or sending many information that triggers a crash on someone’s computer or computer network.
DENIAL OF SERVICE ATTACKS
71
--deny or shut down the service of this source sa legitimate sources niya
DENIAL OF SERVICE ATTACKS
71
--can cause the organization both time and money while their resources are inaccessible
DENIAL OF SERVICE ATTACKS
71
--hitting the target resource or the website server with two many request at the same time to the extent na bumabagal or hindi na makapag-respond ng maayos or hindi niya ma-accommodate yung mga legitimate sources niya
DENIAL OF SERVICE ATTACKS
72
--disrupt or damage the business --one source lang or one computer lang ang ginagamit mo
DENIAL OF SERVICE ATTACKS
73
- occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
DISTRIBUTED DENIAL-OF-SERVICE ATTACK (DDoS attack)
74
--the server cannot connect to the server quickly enough if madami or flooded na sila --the server may not respond to the real users because busy sila sa mga fake users
DISTRIBUTED DENIAL-OF-SERVICE ATTACK (DDoS attack)
75
is a technique by which cyber-criminals steal money or resources a bit at a time so that it will be remain unnoticeable.
SALAMI SLICING ATTACK/ SALAMI FRAUD
76
--pieces by pieces
SALAMI SLICING ATTACK/ SALAMI FRAUD
77
- is a common cyberattack where malware executes unauthorized actions on the victim’s computer system.
MALWARE ATTACK
78
-The malicious software encompasses many specific types of attacks like infecting computers.
MALWARE ATTACK
79
COMMON TYPES OF MALWARES
a. ADWARE/ ADVERTISING-SUPPORTED SOFTWARE b. RANSOMWARE c. ROOTKIT d. TROJAN HORSE e. VIRUS f. WORM
80
SOME PREVENTIVE MEASURES AGAINST CYBERCRIMES
1. KEEP SOFTWARE AND OPERATING SYSTEM UPDATED 2. USE ANTI-VIRUS SOFTWARE and keep it UPDATED 3. USE STRONG PASSWORDS 4. NEVER OPEN ATTACHMENTS IN SPAM EMAILS 5. HANDS TYPING ON LAPTOP KEYBOARD 6. DO NOT GIVE OUT PERSONAL INFORMATION unless secure 7. CONTACT COMPANIES DIRECTLY about suspicious requests 8. BE MINDFUL of which website URLS YOU VISIT 9. KEEP AN EYE ON YOUR BANK STATEMENTS
81
-is a type of malware that automatically delivers advertisements.
ADWARE/ ADVERTISING-SUPPORTED SOFTWARE
81
--bigla nalang nagpopop out sa ating computer like porn
ADWARE/ ADVERTISING-SUPPORTED SOFTWARE
81
--can collect or steal your data by directing to the advertisement
ADWARE/ ADVERTISING-SUPPORTED SOFTWARE
82
--it can change your internet browsing settings or home page --nangyayari ito kapag nagdodownload tayo tas wala kang anti virus ay may chance na mangyari sayo ito
ADWARE/ ADVERTISING-SUPPORTED SOFTWARE
83
ADWARE MEANS
ADVERTISING-SUPPORTED SOFTWARE
84
-is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
RANSOMWARE
84
--it will hold your file or data as stage or your data are encrypted so need mo muna ng encryption key from the hacker
RANSOMWARE
85
--criminal money making scheme dahil di mo magagamit yung files mo then hihingian ka ng pera bago mo magamit ulit
RANSOMWARE
86
--once paid, your identity ay tatatak na sa hacker and there is a possibility na he can target you again
RANSOMWARE
87
is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
ROOTKIT
88
-Once it has been installed it is possible for the malicious party behind the rootkit to remotely execute files, access/steal information.
ROOTKIT
89
can modify system configurations, alter software.
ROOTKIT
90
--gain access without being detected
ROOTKIT
91
92
--KIT OR SOFTWARE na nasa computer mo
ROOTKIT
92
commonly known as a “TROJAN,”
TROJAN HORSE
92
can give a malicious party remote access to an infected computer.
TROJAN HORSE
92
is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware.
TROJAN HORSE
93
-Once an attacker has access to an infected computer, it is possible for the attacker to steal data.
TROJAN HORSE
94
--genuine software or application
TROJAN HORSE
94
--named after human viruses that spread person to person
VIRUS
95
-cannot replicate itself or hindi dumadami unlike sa worm
TROJAN HORSE
96
are designed to damage the target computer or device by corrupting data, reformatting your hard disk, or completely shutting down your system.
VIRUS
97
--cannot replicate itself without human intervention
VIRUS
98
--made from malicious code that can propagate itself from device to device
VIRUS
98
is a type of malware that spreads copies of itself from computer to computer.
WORM
99
--might be triggered by the activation of host or the user
VIRUS
99
can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
WORM
100
--they can stand alone
WORM
101
--best example for this is I LOVE YOU VIRUS, once na sinend ito sa tao then inopen tas lahat ng mga contacts mo sa email ay masesendan din neto without sending it directly to them
WORM