CHAPTER 1 Flashcards

(143 cards)

1
Q

“Ever since men began to modify their lives by using technology, they have found themselves in a series of technological traps”

A

Roger Revelle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

-are essentially a combination of the elements of COMPUTER AND NET CRIME

A

CYBER-CRIMES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

can be best defined as “Offenses that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly using modem telecommunication networks such as the Internet and mobile phones.

A

CYBER-CRIMES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is criminal activity that either targets or uses a computer, a computer network or a networked device.

A

CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

– two or more computers that are connected with one another for the purpose of communicating data electronically

A

COMPUTER NETWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

–kind of device that are used to connect devices or computers together to transfer resources or files

A

NETWORK DEVICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

 common sources being shared today is CONNECTION TO THE

A

INTERNET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • is criminal activity in computer alone
A

COMPUTER CRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

–no help or no internet

A

COMPUTER CRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

–online or illegal activity which is committed on/ through internet without the use of computer

A

NET CRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

-is the study of causation of crimes that occur in the cyberspace and its impact in the physical space (Jaishankar, 2007).

A

CYBER CRIMINOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

–coined the term CYBER CRIMINOLOGY, he did not only define it

A

JAISHANKAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

–known as the Founding Father of Cyber Criminology

A

JAISHANKAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

REASONS OF JAISHANKAR ON COINING THE CYBER CRIMINOLOGY

A
  1. According to him, the body of knowledge that deals with cybercrime should not be confused with investigations and it should be merged with the CYBER FORENSIC OR DIGITAL FORENSIC in terms of investigating cybercrimes
  2. There should be an independent discipline to study and explore cybercrimes from a social science perspective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

–process of preservation, identification, extraction, and documentation of computer evidence which can be used by the court of law

A

DIGITAL FORENSIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is the cause why people commit cybercrime and traditional crime

A

ECONOMIC GAIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

some people commit cybercrime because of

A

THRILL OR TO SIMPLY SHOW THEIR TALENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • study of crimes, criminals and victims
A

CRIMINOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

– environment of the internet

A

CYBERSPACE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

GENERAL CATEGORIES OF CYBER CRIME:

A
  1. COMPUTER AS A TARGET
  2. COMPUTER AS A WEAPON
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

– illegal activity that attack other computers or the direct target is the computer itself

A

COMPUTER AS A TARGET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • The computer as we know it today had its beginning on
A

19TH CENTURY.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

designed the ANALYTICAL ENGINE and this design was used as basic framework of the computers of today are based on.

A

CHARLES BABBAGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CHARLES BABBAGE designed the

A

ANALYTICAL ENGINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
this design was used as basic framework of the computers of today are based on.
ANALYTICAL ENGINE
25
-during that time, when this engine was made it is considered as the first era of modern computers
ANALYTICAL ENGINE
26
--it is a fully controlled and an automatic mechanical digital computer
ANALYTICAL ENGINE
27
* The first recorded cybercrime in the history took place in the year
1820.
27
-he is a textile manufacturer in France
JOSEPH MARIE JACQUARD
28
-later on, he devised a loom or device allowed the repetition of series of steps in weaving special fabrics
JOSEPH MARIE JACQUARD
29
-there was indeed a device to facilitate the production of fabric, the Jacquard employees were afraid or threatened because there was a chance they would lose their jobs. With that his employees committed acts of sabotage to the technology that was made in order to discourage Jacquard to further use that new technology
JOSEPH MARIE JACQUARD
30
--despite of what they did, the employees were not convicted
JOSEPH MARIE JACQUARD
31
* The first person to be found guilty of cybercrime in history was
IAN MURPHY
32
also known as CAPTAIN ZAP
IAN MURPHY
33
* The first person to be found guilty of cybercrime was IAN MURPHY, also known as CAPTAIN ZAP, and that happened in the year?
1981.
34
* The first unsolicited bulk commercial email was sent by a
DIGITAL EQUIPMENT CORP MARKETING
35
* The first unsolicited bulk commercial email was sent by a DIGITAL EQUIPMENT CORP MARKETING representative to every
ARPANET (ADVANCED RESEARCH PROJECTS AGENCY NETWORK)
36
* The first unsolicited bulk commercial email was sent by a DIGITAL EQUIPMENT CORP MARKETING representative to every ARPANET (ADVANCED RESEARCH PROJECTS AGENCY NETWORK) address on the west coast of the United States on
May 3, 1978.
37
ARPANET MEANS
ADVANCED RESEARCH PROJECTS AGENCY NETWORK
38
The message promoted the availability of a new model of computer and was sent by
GARY THUERK
39
The message promoted the availability of a new model of computer and was sent by GARY THUERK to
393 RECIPIENTS
40
unsolicited bulk commercial email is a formal name for
SPAM OR JUNK EMAILS
41
-was the first wide-area packet-switching network with distributed control and one of the first networks to implement the TCP/IP protocol suite.
ADVANCED RESEARCH PROJECTS AGENCY NETWORK (ARPANET)
42
-This technology became the technical foundation of the Internet.
ADVANCED RESEARCH PROJECTS AGENCY NETWORK (ARPANET)
43
- suite of communication protocol use to interconnect network devices on the internet
TCP/IP OR TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL
44
-also known as a LOVE BUG VIRUS
I LOVE YOU VIRUS
45
-was a type of computer virus that attacked billions of computers with windows operating systems.
I LOVE YOU VIRUS
46
-It started the attack MAY 2000 from the PHILIPPINES.
I LOVE YOU VIRUS
46
-It started the attack MAY 2000 from the PHILIPPINES.
I LOVE YOU VIRUS
47
-This virus was created by computer programmer student of AMA namely ONEL DE GUZMAN.
I LOVE YOU VIRUS
48
I LOVE YOU VIRUS STARTED THE ATTACK ON?
MAY 2000 from the PHILIPPINES
49
I LOVE YOU VIRUS spread through internet network as an ?
EMAIL ATTACHMENT
50
The virus spread through internet network as an EMAIL ATTACHMENT, with the subject line as ____ and an attachment _____
“ILOVEYOU” “LOVE-LETTER-FOR-YOU.txt.vbs”.
51
I LOVE YOU VIRUS WAS CREATED BY
ONEL DE GUZMAN.
52
--he created this because his thesis was rejected, the reason why his professor rejected his thesis is about a virus then therefore for them, it is unethical since he is a student
ONEL DE GUZMAN.
53
--once it was opened, a VISUAL BASIC SCRIPT OR VBS will be executed or ito na yung virus itself then the computer will be infected and finds the recipient outlook address book and resend the note to everyone in it then it will destroy every file of your computer including the jpeg, mp3
I LOVE YOU VIRUS
54
--the virus target is the MICROSOFT OUTLOOK
I LOVE YOU VIRUS
55
WITHIN 10 DAYS, HOW MANY NETWORKS WERE DESTROYED?
50 MILLION
56
WHAT HAPPENED TO THE CASE OF ONEL DE GUZMAN?
NOTHING HAPPENED
57
_____ filed cases against him, but even at the first stage, the indictment was _____ because there was no law penalizing the said act during the time of commission in the Philippines.
GOVERNMENT PROSECUTORS DISMISSED
58
“NULLUM CRIMEN, NULLA POENA SINE LEGE” MEANS
"THERE IS NO CRIME IF THERE IS NO LAW PUNISHING IT."
59
WHAT WAS THE EFFECT OF I LOVE YOU VIRUS CASE ON THE PHILIPPINE LEGISLATION?
the Philippine Congress enacted REPUBLIC ACT (RA) 8792, otherwise known as the “Electronic Commerce Act of 2000”. This was signed into law on JUNE 14, 2000.
60
otherwise known as the “Electronic Commerce Act of 2000”
REPUBLIC ACT (RA) 8792
61
This was signed into law on JUNE 14, 2000.
REPUBLIC ACT (RA) 8792
62
THE SALIENT FEATURES OF THE ACT ARE AS FOLLOWS:
*Provides for the ADMISSIBILITY OF ELECTRONIC DOCUMENTS in court cases *PENALIZES LIMITED ONLINE CRIME, such as hacking, introduction of viruses and copyright violations of AT LEAST PHP 100,000 and a maximum commensurate to the damage incurred, and imprisonment of six months to three years, among others; * PROMOTES E-COMMERCE in the country *Aims to REDUCE GRAFT AND CORRUPTION IN GOVERNMENT
63
PENALIZES LIMITED ONLINE CRIME, such as __________ and a maximum commensurate to the damage incurred, and imprisonment of _____, among others;
hacking, introduction of viruses and copyright violations of AT LEAST PHP 100,000 six months to three years
64
-is considered the landmark law in the history of the Philippines since it has placed the Philippines among the countries penalizing cybercrime.
RA 8792
65
-Likewise, the Supreme Court drafted the RULES ON ELECTRONIC EVIDENCE, which took effect on AUGUST 1, 2000, to emphasize the admissibility of evidence in electronic form, subject to its AUTHENTICITY AND RELIABILITY.
RA 8792
66
Likewise, the Supreme Court drafted the RULES ON ELECTRONIC EVIDENCE, which took effect on ______, to emphasize the admissibility of evidence in electronic form, subject to its _____
AUGUST 1, 2000 AUTHENTICITY AND RELIABILITY.
67
The first Filipino to be convicted of cybercrime, was
JJ MARIA GINER
67
JJ MARIA GINER He was convicted in ____ BY _____
SEPTEMBER 2005 by Manila MTC Branch 14 JUDGE ROSALYN MISLOS-LOJA.
67
Giner pleaded guilty to hacking the
government portal “gov.ph” and other government websites.
68
He was sentenced to ONE TO TWO YEARS of imprisonment and fined Php100,000. However, he immediately APPLIED FOR PROBATION, which was eventually granted by the court.
JJ MARIA GINER
69
is considered a landmark case, as he is the first local hacker to be convicted under SECTION 33A OF THE E-COMMERCE LAW OR REPUBLIC ACT 8792.
CONVICTION OF GINER
70
The CONVICTION OF GINER is considered a landmark case, as he is the first local hacker to be convicted under
SECTION 33A OF THE E-COMMERCE LAW OR REPUBLIC ACT 8792.
71
-electronic machine or device powered by electric wherein its task or function is that it accepts data, stores data, processes data into a useful information.
COMPUTER
72
is made up of multiple parts and components that facilitate user functionality.
COMPUTER
73
TWO PRIMARY CATEGORIES OF COMPUTER
1. HARDWARE 2. SOFTWARE
74
- The physical components of a computer system
1. HARDWARE
75
- These are the instructions that tell the computer what to do and how to do it.
2. SOFTWARE
76
--a.k.a PROGRAMS
2. SOFTWARE
77
HARDWARE COMPONENTS
1. INPUT DEVICES 2. OUTPUT DEVICES 3. PROCESSING DEVICES 4. STORAGE MEDIA
78
is any hardware component that allows the user to enter data into the computer.
INPUT DEVICES
78
-one of the pointing device that has a pointer that changes into different shape as we use it
* MOUSE
79
INPUT DEVICES EXAMPLES
* KEYBOARD * MOUSE * SCANNER * MICROPHONE * DIGITAL CAMERA * PC VIDEO CAMERA
80
is the pointing device in laptop
TOUCH PAD
81
is any hardware component that gives information to the user
OUTPUT DEVICES
82
OUTPUT DEVICES EXAMPLES
* MONITOR * PRINTER * SPEAKER
82
-components responsible for the processing of information within the computer system
3. PROCESSING DEVICES
83
--core function of the any computer
3. PROCESSING DEVICES
84
--raw data is transformed into information
3. PROCESSING DEVICES
85
2 COMMON EXAMPLE OF PROCESSING DEVICES
* CPU/ CENTRAL PROCESSING UNIT * MOTHERBOARD
86
-considered as the brain of the computer
* CPU/ CENTRAL PROCESSING UNIT
87
-is considered as the backbone of the computer
* MOTHERBOARD
88
-it connect some of the parts of a computer together
* MOTHERBOARD
89
THE TWO MAIN CATEGORIES OF SOFTWARE:
* SYSTEM SOFTWARE * APPLICATION SOFTWARE
90
also called the OPERATING SYSTEM (OS) which actually runs the computer.
* SYSTEM SOFTWARE
91
--common system software is
WINDOWS OPERATING SYSTEM, MacOS, IOS, ANDROID
92
is a program that allows users to a specific task on the computer.
* APPLICATION SOFTWARE
93
EXAMPLES OF APPLICATION SOFTWARE
* WORD PROCESSING APPLICATION * SPREADSHEET APPLICATION * E-MAIL APPLICATION * INTERNET APPLICATION
94
-keeps data, information and instructions for use in the future.
STORAGE DEVICE/ MEDIUM OR MEDIA
95
STORAGE MEDIA/ STORAGE MEDIUM/ STORAGE DEVICE HAS
WRITING READING
96
-- when the user saves information or data in storage devices, the process is
WRITING
97
- once we open the data or information that we saved in the storage devices, the process is
READING
98
PRIMARY STORAGE
* RAM (RANDOM ACCESS MEMORY)
99
- is the primary storage of a computer.
* RAM (RANDOM ACCESS MEMORY)
100
-When you’re working on a file on your computer, it will temporarily store data in your
* RAM (RANDOM ACCESS MEMORY)
101
-It allows you to perform everyday tasks like opening applications, loading webpages, editing a document or playing games, and allows you to quickly jump from one task to another without losing your progress.
* RAM (RANDOM ACCESS MEMORY)
101
--considered as VOLATILE MEMORY means that it is unstable so once i-off yung laptop ay mawawala lahat ng data since it is TEMPORARILY STORED
* RAM (RANDOM ACCESS MEMORY)
102
RAM MEANS
* RAM (RANDOM ACCESS MEMORY)
103
ROM MEANING
READ ONLY MEMORY
104
--stores the application software and operating system
ROM/READ ONLY MEMORY
105
--considered as NON- VOLATILE MEMORY
ROM/READ ONLY MEMORY
106
SECONDARY STORAGE
HARD DISK DRIVES (HDD) & SOLID-STATE DRIVES (SSD)
107
are commonly used as the main storage device in a computer.
* HARD DISK DRIVES (HDD)
108
often store operating system, software programs and other files.
* HARD DISK DRIVES (HDD)
109
-These are magnetic storage devices
* HARD DISK DRIVES (HDD)
110
--takes longer to gather information due to the mechanical nature which is it needs to rotate first
* HARD DISK DRIVES (HDD)
111
--many intricate moving parts so it is vulnerable to damage and wet
* HARD DISK DRIVES (HDD)
112
- is a new generation of storage device used in computers.
* SOLID-STATE DRIVES (SSD)
113
replace traditional mechanical hard disks by using flash-based memory, which is significantly faster.
* SOLID-STATE DRIVES (SSD)
114
don’t rely on magnets and disks, instead they use a type of flash memory called NAND OR NOT AND
* SOLID-STATE DRIVES (SSD)
115
SSDs don’t rely on magnets and disks, instead they use a type of flash memory called
NAND OR NOT AND
116
EXTERNAL STORAGE DEVICES
* EXTERNAL HARD DRIVE * FLOPPY DISKS * CDs, DVDs, and Blu-Ray disks * FLASH MEMORY DEVICES
117
- is a device which is plugged into your machine to give almost-immediate storage space, without the need to open or use your computer’s internal storage.
* EXTERNAL HARD DRIVE
118
-were the first widely available portable, removable storage devices.
* FLOPPY DISKS
119
-They work in the same way as hard disk drives, although at a much smaller scale.
FLOPPY DISKS
120
was the fist personal computer (PC) release without a floppy disk drive
iMac
121
-are used for a lot more than just playing music and videos
* CDs, DVDs, and Blu-Ray disks
122
—they also act as storage devices, and collectively they’re known as OPTICAL STORAGE DEVICES OR OPTICAL DISK MEDIA.
* CDs, DVDs, and Blu-Ray disks
122
--working through the action of light
* CDs, DVDs, and Blu-Ray disks
123
* CDs, DVDs, and Blu-Ray disks -are used for a lot more than just playing music and videos—they also act as storage devices, and collectively they’re known as
OPTICAL STORAGE DEVICES OR OPTICAL DISK MEDIA
124
--working through the action of light
* CDs, DVDs, and Blu-Ray disks
125
-- are the latest available drive --reserve with high-definition display
BLU-RAY DISK
126
CD- ROM MEANS
COMPACT DISC- READ ONLY MEMORY
126
--is optical storage disk where data written on them is already permanent and cannot be removed or overwritten or palitan
CD- ROM (COMPACT DISC- READ ONLY MEMORY)
126
--common in software installation program --cannot be used as personal storage device
CD- ROM (COMPACT DISC- READ ONLY MEMORY)
127
CD-RW MEANS
COMPACT DISC RE-WRITABLE
127
CD-R MEANS
COMPACT DISC- RECORDABLE
128
– recordable but cannot be overwritten; not flexible
CD-R(COMPACT DISC- RECORDABLE)
129
-- you can continuously write data and erase data from them
CD-RW (COMPACT DISC RE-WRITABLE)
130
– these are small, portable storage devices that have long been a popular choice for extra computer storage.
* FLASH MEMORY DEVICES
130
-The most recognizable type of flash memory device is the
USB FLASH DRIVE