Discussion 3 Flashcards

(35 cards)

1
Q

a remote access program that allows hackers to control computer systems.

A

“Deep Throat,”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

originally referred to modifying technology for creative uses, but it has since become associated with cybercrime.

A

“hacking”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is an ever-growing threat, but awareness and good cybersecurity practices can help minimize risks.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is harmful software designed to damage, disrupt, or gain unauthorized access to a computer system.

A
  1. Malware (Malicious Software)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Allow hackers to bypass security and gain unauthorized access.
A

Backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Disguised as legitimate programs but execute hidden malicious functions.
A

Trojan Horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Self-replicating programs that corrupt files and disrupt system functionality.
A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Spread independently through networks, often causing widespread damage.
A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Malicious software hidden within seemingly harmless downloads.
A

Bundlers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • Overload systems to prevent legitimate access.
A

Denial of Service (DoS) Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • Infected devices controlled remotely to carry out large-scale attacks.
A

Botnets and Zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Monitors user activities and collects sensitive data without consent.
A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Record every keystroke to capture login credentials and personal details.
A

Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

-Analyze and intercept network traffic to steal confidential information.

A

Sniffers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cybercriminals often trick people into providing personal information through deception.

A
  1. Phishing and Social Engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Fraudulent emails impersonating legitimate entities to steal data.
A

Email Phishing

17
Q
  • Faking identities, emails, or websites to gain trust and extract sensitive details.
18
Q
  • Redirecting users to fake websites that collect login credentials.
19
Q
  • Malicious programs that alter web traffic to fraudulent sites.
20
Q
  • Scams promising large financial rewards in exchange for personal details or payments.
A

Advance-Fee Fraud (419 Scams)

21
Q
  • Fake browser windows that imitate real websites to steal information,
A

Floating Windows

22
Q

A panel of experts was formed to study transnational cybercrime and recommend legal actions.

A

Council of Europe (1985-1989):

23
Q

Adopted a resolution urging member states to ensure their legal systems could handle cybercrimes.

A

United Nations (1990):

24
Q

A UN agency that focuses on information and communication technology laws to combat cybercrime.

A

International Telecommunications Union (ITU):

25
Issued recommendations and later initiated drafting an international treaty on cybercrime.
Council of Europe (1995 & 1997):
26
Adopted in 2001 and came into force on July 1, 2004. First international treaty aimed at addressing cybercrime by: • Defining offenses such as fraud, copyright violations, child pornography, and breaches of network security. Establishing legal procedures for investigating and prosecuting cybercrimes, including search and data interception. • Promoting international cooperation in law enforcement.
The Convention on Cybercrime (Budapest Convention)
27
Became the 57th country to join the Convention in 2018 after signing in 2016,
Philippines' Participation:
28
Role of the G7 in Cybercrime Prevention The Group of 7 (G7) are?
Canada, France, Germany, Italy, Japan, the United Kingdom, and the United States.
29
It plays a key role in creating policies and agreements to combat cybercrime.
Group 7 Canada, France, Germany, Italy, Japan, the United Kingdom, and the United States.
30
was established to facilitate real-time international cooperation in cybercrime investigations.
The G7 24/7 High-Tech Crime Network
31
Year created to preserve digital evidence for legal processes.
Created in 1997
32
Operates in over 70 countries with designated contact points available 24/7 for assistance in: Providing technical guidance. Preserving electronic evidence. Locating cybercriminals. Exchanging legal information.
G7 24/7 High-Tech Crime
33
34
the Department of Justice (DOJ) is designated as the main authority for international cooperation through Mutual Legal Assistance Treaty (MLAT) and extradition.
Under Republic Act No. 10175 (Cybercrime Prevention Act),
35