Chapter 2 Flashcards
(52 cards)
What is R.A 10175?
Cybercrime Prevention Act of 2012
the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.”
Cubersecurity
involves protection of sensitive personal and business information through prevention, detection and response to different online attacks.
Cubersecurity
You should disable these features when they are not in use.
Disabled Remote Connectivity
an illegal act an individual commits to defrauding someone who is the actual credit card holder.
Credit Card Frauds
the concealment of the origins ofillegallyobtained money, typically by means of transfers involving foreign banks or legitimate businesses.
Money Laundering
Pornographic Websites; online distribution
Cyber pornography
Millions of websites, all hosted on servers abroad, offer online gambling
Online gambling
Software Piracy; Copyright Infringement; Trademarks Violations; Theft of Computer Source Code
Intellectual Property (IP) Crimes
A spoofed email is one that appears to originate from one source but actually has been sent from another source.
Email spoofing
This occurs when defamation takes place with the help of computers and/or the internet.
Cyber defamation
This involves following a person’s movements across the internet by posting messages (sometimes threatening) on bulletin boards frequented by the victim, entering chat rooms frequented by the victim, constantly bombarding the victim with emails etc.
Cyber Stalking
Also known as “hacking”.
Unauthorized access
It involves gaining access illegally to a computer system or network and in some cases making unauthorized use of this access.
Hacking
the act by which other forms of cybercrime (e.g., fraud, terrorism) are committed.
Hacking
any information contained in electronic form such as that stored in computer hard disks, removal storage media
Theft
This refers to sending a large number of emails to the victim resulting in the victim’s email account or mail servers crashing.
Email Bombing
These attacks are often used in committing financial crime and are based on the idea that an alteration, so insignificant, would go completely unnoticed in a single case.
Salami attacks
It is a cybercrime in which the attacker floods a server with internet traffic to prevent users from accessing connected online services and sites.
Distributed denial of service attack
programs that attach themselves to a computer or a file then circulate themselves to other files and other computers on a network.
Virus
They usually affect the data on computer either by altering or deleting it.
Virus
They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on computer’s memory.
Worms
These are event dependent programs where programs kicks into action only when a certain event occurs
Logic Bomb
An unauthorized program which functions from inside what seems to be an authorized program thereby concealing what is actually doing.
Trojan attacks