2 Flashcards

1
Q

provided the FOUR GENERAL TYPES OF CYBERCRIME:

A

BUDAPEST CONVENTION ON CYBER CRIME/ BUDAPEST CONVENTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The BUDAPEST CONVENTION ON CYBER CRIME/ BUDAPEST CONVENTION held on

A

2001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FOUR GENERAL TYPES OF CYBERCRIME:

A

· OFFENSES AGAINST THE CONFIDENTIALITY, INTEGRITY AND AVAILABILITY OF COMPUTER DATA AND SYSTEMS,

· COMPUTER-RELATED OFFENSES

· CONTENT-RELATED OFFENSES

· COPYRIGHT-RELATED OFFENSES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

–on the provisions of RA 10175, the online offenses or cybercrime offenses that will fall under this typology are the

A

ILLEGAL ACCESS, ILLEGAL INTERCEPTION, DATA INTERFERENCE, SYSTEM INTERFERENCE, AND MISUSE OF DEVICES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RA 8293

A

“INTELLECTUAL PROPERTY CODE”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

–first international treaty

A

BUDAPEST CONVENTION ON CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

–held to seek or address cybercrime, to provide solution and measures in combating cybercrime

A

BUDAPEST CONVENTION ON CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

–during this convention, they crafted or created a guideline as a basis of every country in developing their national laws in terms of penalizing or combating cybercrime

A

BUDAPEST CONVENTION ON CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

–ito ang reason why na-enact ang RA 10175 kahit na meron ng RA 8792 since it only punishes limited online crimes

A

BUDAPEST CONVENTION ON CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

–nakapagdecided ang PH that they will enact another law which is RA 10175 to be compliant to this guidelines set by the convention

A

BUDAPEST CONVENTION ON CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

– is an international agreement depending on kung ano yung mga member countries involved in this convention

A

TREATY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

–PH is involved and one of the state parties or countries na naging signatory on this convention

A

BUDAPEST CONVENTION ON CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

GENERAL CLASSIFICATIONS OF CYBERCRIME

A
  1. UNAUTHORIZED ACCESS
  2. HACKING
  3. CRACKING
  4. CYBER FRAUD
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is when someone gains access to a website, program, server, service, or other system using someone else’s account.

A

UNAUTHORIZED ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

using your friends fb account after they neglected or nakalimutan nila na ilog-out ito or pwede din na naiwan nung friend mo yung laptop niya na nakaopen yung fb niya dun then pinakelaman mo

A

UNAUTHORIZED ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PASSWORD GUESSING IS THE EXAMPLE

A

UNAUTHORIZED ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

–it does not only include the attempt but also intrude or napasok or nagkaroon na siya ng access

A

HACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Any attempt to intrude into a computer or a network without authorization.
A

HACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

-This involves changing of system or security features in a bid to accomplish a goal that differs from the intended purpose of the system.

A

HACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • It can also refer to non-malicious activities, usually involving unusual or improvised alterations to equipment or processes.
A

HACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

-An individual who involves themselves in hacking activities is known as a

A

HACKER.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

– malicious software once installed it records everything you type or your keyboard strokes or it monitors everything you do on your computer

A

KEYLOGGER MALWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

–gain through using other technique like gumamit ka ng KEYLOGGER MALWARE

A

HACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • is a malicious software where mal stands for malicious then ware is software
A

MALWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

can be described as gaining unauthorized access to a computer system by improper means

A

HACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

can be describes as gaining access to a computer system using usual means of access but without consent

A

UNAUTHORIZED ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

THE VARIOUS KINDS OF HACKERS

A

· WHITE HATS HACKER
· BLACK HAT HACKERS
· GRAY HAT HACKERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

also known as ETHICAL HACKERS

A

WHITE HATS HACKER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

strive to operate in the publics best interest, rather than to create turmoil.

A

WHITE HATS HACKER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

work doing penetration, to attempt to break into the company’s networks to find and report on security vulnerabilities.

A

WHITE HATS HACKER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

–their purpose is for good intention

A

WHITE HATS HACKER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

–they hack their own security system to make it more hacked proof

A

WHITE HATS HACKER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

–they enhance their cybersecurity once nalaman nila na vulnerable ang system nila

A

WHITE HATS HACKER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

–same part of the organization wherein naghire ng hacker to check if their system is vulnerable or not

A

WHITE HATS HACKER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

–many private entity or government agencies hire this kind of hacker to maintain their system security

A

WHITE HATS HACKER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

to create damage, chaos

A

TURMOIL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

– this kind of hackers, hack to take control over the system for personal gains.

A

BLACK HAT HACKERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

-They destroy, steal and even prevent authorized users from accessing the system

A

BLACK HAT HACKERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

–criminal by definition HACKERS

A

BLACK HAT HACKERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

–they intentionally gain unauthorized access to other accounts with malicious intent whether their purpose is to steal data, information, to spread virus, malware or for personal gain

A

BLACK HAT HACKERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

–bad intention ang gusto nila

A

BLACK HAT HACKERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  • They belong to the neutral zone.
A

GRAY HAT HACKERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

-They act in the middle ground between white hat hackers, who operate on behalf of those maintaining secure systems, and sometimes act as black hat hackers who act maliciously to exploit vulnerabilities in systems.

A

GRAY HAT HACKERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

–it depends upon the situation

A

GRAY HAT HACKERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

– is breaking into a network;

A

CRACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

PEOPLE IN CRAKING

A

CRACKERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

-CRACKERS also act as

A

BLACK HATS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

by gaining access to the accounts of people maliciously and misusing this information across networks.

A

CRACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

-they can steal credit card information, they can destroy important files, disclose crucial data and information or personal details and sell them for personal gains

A

CRACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

–considered as highest form of hacking

A

CRACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

is breaking into the security system for criminal and illegal reasons or for personal gains only.

A

CRACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

is the process of intruding computer systems without authorization in order to gain access to them, for good or bad purposes

A

HACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

bypasses passwords or licenses in computer programs;

A

CRACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

or in other ways intentionally breaches computer security.

A

CRACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

is done to remove paid software requirements or pop-up purchase reminders so that people can access the software for free.

A

SOFTWARE CRACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

COMMON TYPES OF CRACKING

A
  • SOFTWARE CRACKING
  • NETWORK CRACKING
  • PASSWORD CRACKING
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

is a paid program that has had its copy protections removed.

A

SOFTWARE CRACKING

42
Q

-is the act of infiltrating a LOCAL AREA NETWORK (LAN).

A

NETWORK CRACKING

43
Q

-Sometimes referred to as web cracking or WIRED EQUIVALENT PRIVACY (WEP) cracking, this usually involves accessing poorly secure networks.

A

NETWORK CRACKING

44
Q

LAN MEANS

A

LOCAL AREA NETWORK

45
Q

WEP MEANS

A

WIRED EQUIVALENT PRIVACY

46
Q

is the act of stealing people’s passwords from databases.

A

PASSWORD CRACKING

46
Q
  • is the crime committed via a computer and internet with the intent to corrupt another individual’s personal and financial information stored online from people illegally by deceiving them.
A

CYBER FRAUD

46
Q

CYBER FRAUD CATEGORIES

A

a. SPOOFING OR PHISHING
b. VIRUS HOAX EMAILS
c. LOTTERY FRAUDS
d. CREDIT CARD FRAUD
e. THEFT OF INTERNET HOURS
f. CYBER TERRORISM
g. CYBER PORNOGRAPHY
i. CYBER-LIBEL OR CYBER DEFAMATION
j. CYBER STALKING
k. DENIAL OF SERVICE ATTACKS
l. DISTRIBUTED DENIAL-OF-SERVICE ATTACK (DDoS attack)
m. SALAMI SLICING ATTACK/ SALAMI FRAUD
n. MALWARE ATTACK

47
Q

is a type of scam in which criminals attempt to obtain someone’s personal information by pretending to be a legitimate source.

A

SPOOFING OR PHISHING

48
Q

SPOOFING OR PHISHING FORM

A

· EMAIL SPOOFING
· TEXT MESSAGE SPOOFING
· URL Spoofing

49
Q

is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.

A

EMAIL SPOOFING

50
Q

the sender forges email headers so that client software displays the fraudulent sender address, which most users take at face value.

A

EMAIL SPOOFING

51
Q

making an email address the same as in his bank account wherein nagsend ka ng message na kailangan niyang iclick itong link kundi mab’block yung account niya without him knowing na may mali sa email address na imbes .com ay – or dash ang nakalagay

A

EMAIL SPOOFING

52
Q
  • Sometimes referred to as SMISHING.
A

TEXT MESSAGE SPOOFING

53
Q

-The text message may appear to come from a legitimate source, such as your bank.

A

TEXT MESSAGE SPOOFING

54
Q

-It may request that you call a certain phone number or click on a link within the message, with the goal of getting you to divulge personal information.

A

TEXT MESSAGE SPOOFING

54
Q

–there are people who enjoys to exploit others

A

VIRUS HOAX EMAILS

54
Q

–sending text message

A

TEXT MESSAGE SPOOFING

54
Q

happens when scammers set up a fraudulent website to obtain information from victims or to install malware on their computers.

A

URL Spoofing

55
Q

–most common form of phishing

A

URL Spoofing

55
Q

are false reports about non-existent viruses, often claiming to do impossible things like blow up the recipient’s computer and set it on fire, or less sensationally, delete everything on the user’s computer.

A

VIRUS HOAX EMAILS

56
Q

–it is chain email that tells to forward this message to anyone they know

A

VIRUS HOAX EMAILS

57
Q
  • These are emails, which inform the recipient that he/ she has won a prize in a lottery.
A

LOTTERY FRAUDS

58
Q

–in order for them to get the money, the recipients need to reply so once nagreply ang tao ay may isesend ulit sila na email requiring them to input all their information on your bank account

A

LOTTERY FRAUDS

59
Q

is the unauthorized use of a credit or debit card, or similar payment tool to fraudulently obtain money or property.

A

CREDIT CARD FRAUD

60
Q

can be stolen from unsecured websites or can be obtained in an identity theft scheme.

A

Credit and debit card numbers

61
Q

-is the scheme of obtaining the personal, financial information or other information of another person to use their identity to commit fraud or other illegal activities.

A

IDENTITY THEFT

62
Q

–is a vehicle for perpetrating other fraud crimes or schemes

A

IDENTITY THEFT

62
Q

–online transaction became the online thing nowadays

A

CREDIT CARD FRAUD

62
Q
  • Unauthorized use of Internet hours paid for by another person.
A

THEFT OF INTERNET HOURS

62
Q
  • It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
A

CYBER TERRORISM

63
Q

–flooding viruses and malware para ipakita sa government na ito yung pinaglalaban mo

A

CYBER TERRORISM

64
Q

–creating fear to the people in online

A

CYBER TERRORISM

65
Q

–nowadays, it is attractive option for modern terrorist or traditional terrorism since this is much more cheaper than the usual one

A

CYBER TERRORISM

65
Q

–more anonymous than the modern one since nagagawa nila ito ng hindi sila nakikilala or napaglalaban nila kung ano ang gusto nila

A

CYBER TERRORISM

65
Q

–the variety or number of targets are enormous or mas marami silang natatarget

A

CYBER TERRORISM

66
Q

REPUBLIC ACT NO. 11479

A

ANTI-TERRORISM ACT OF 2020

67
Q

– is the act of using cyberspace to create, display, distribute, import, or publish pornography or obscene materials, especially materials depicting children engaged in sexual acts with adults.

A

CYBER PORNOGRAPHY

68
Q
  • making sexual acts like mga nakahubad na bata then publishing it thru books, journals, newspaper
A

PORNOGRAPHY

68
Q
  • is a term used when someone has posted or emailed something that is untrue and damaging about someone else on the social media, including blogs, chat rooms, personal websites, social media, social networking sites, or other published articles.
A

CYBER-LIBEL OR CYBER DEFAMATION

68
Q

refers to the use of the Internet, e-mail, or other electronic communications device to stalk and later on harass another person.

A

CYBER STALKING

69
Q

also called as CYBER SMEARING.

A

CYBER-LIBEL OR CYBER DEFAMATION

70
Q

RA 10627

A

ANTI BULLYING ACT OF 2013

71
Q

accomplish this by flooding the target with traffic, or sending many information that triggers a crash on someone’s computer or computer network.

A

DENIAL OF SERVICE ATTACKS

71
Q

–deny or shut down the service of this source sa legitimate sources niya

A

DENIAL OF SERVICE ATTACKS

71
Q

–can cause the organization both time and money while their resources are inaccessible

A

DENIAL OF SERVICE ATTACKS

71
Q

–hitting the target resource or the website server with two many request at the same time to the extent na bumabagal or hindi na makapag-respond ng maayos or hindi niya ma-accommodate yung mga legitimate sources niya

A

DENIAL OF SERVICE ATTACKS

72
Q

–disrupt or damage the business

–one source lang or one computer lang ang ginagamit mo

A

DENIAL OF SERVICE ATTACKS

73
Q
  • occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
A

DISTRIBUTED DENIAL-OF-SERVICE ATTACK (DDoS attack)

74
Q

–the server cannot connect to the server quickly enough if madami or flooded na sila

–the server may not respond to the real users because busy sila sa mga fake users

A

DISTRIBUTED DENIAL-OF-SERVICE ATTACK (DDoS attack)

75
Q

is a technique by which cyber-criminals steal money or resources a bit at a time so that it will be remain unnoticeable.

A

SALAMI SLICING ATTACK/ SALAMI FRAUD

76
Q

–pieces by pieces

A

SALAMI SLICING ATTACK/ SALAMI FRAUD

77
Q
  • is a common cyberattack where malware executes unauthorized actions on the victim’s computer system.
A

MALWARE ATTACK

78
Q

-The malicious software encompasses many specific types of attacks like infecting computers.

A

MALWARE ATTACK

79
Q

COMMON TYPES OF MALWARES

A

a. ADWARE/ ADVERTISING-SUPPORTED SOFTWARE
b. RANSOMWARE
c. ROOTKIT
d. TROJAN HORSE
e. VIRUS
f. WORM

80
Q

SOME PREVENTIVE MEASURES AGAINST CYBERCRIMES

A
  1. KEEP SOFTWARE AND OPERATING SYSTEM UPDATED
  2. USE ANTI-VIRUS SOFTWARE and keep it UPDATED
  3. USE STRONG PASSWORDS
  4. NEVER OPEN ATTACHMENTS IN SPAM EMAILS
  5. HANDS TYPING ON LAPTOP KEYBOARD
  6. DO NOT GIVE OUT PERSONAL INFORMATION unless secure
  7. CONTACT COMPANIES DIRECTLY about suspicious requests
  8. BE MINDFUL of which website URLS YOU VISIT
  9. KEEP AN EYE ON YOUR BANK STATEMENTS
81
Q

-is a type of malware that automatically delivers advertisements.

A

ADWARE/ ADVERTISING-SUPPORTED SOFTWARE

81
Q

–bigla nalang nagpopop out sa ating computer like porn

A

ADWARE/ ADVERTISING-SUPPORTED SOFTWARE

81
Q

–can collect or steal your data by directing to the advertisement

A

ADWARE/ ADVERTISING-SUPPORTED SOFTWARE

82
Q

–it can change your internet browsing settings or home page

–nangyayari ito kapag nagdodownload tayo tas wala kang anti virus ay may chance na mangyari sayo ito

A

ADWARE/ ADVERTISING-SUPPORTED SOFTWARE

83
Q

ADWARE MEANS

A

ADVERTISING-SUPPORTED SOFTWARE

84
Q

-is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.

A

RANSOMWARE

84
Q

–it will hold your file or data as stage or your data are encrypted so need mo muna ng encryption key from the hacker

A

RANSOMWARE

85
Q

–criminal money making scheme dahil di mo magagamit yung files mo then hihingian ka ng pera bago mo magamit ulit

A

RANSOMWARE

86
Q

–once paid, your identity ay tatatak na sa hacker and there is a possibility na he can target you again

A

RANSOMWARE

87
Q

is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.

88
Q

-Once it has been installed it is possible for the malicious party behind the rootkit to remotely execute files, access/steal information.

89
Q

can modify system configurations, alter software.

90
Q

–gain access without being detected

92
Q

–KIT OR SOFTWARE na nasa computer mo

92
Q

commonly known as a “TROJAN,”

A

TROJAN HORSE

92
Q

can give a malicious party remote access to an infected computer.

A

TROJAN HORSE

92
Q

is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware.

A

TROJAN HORSE

93
Q

-Once an attacker has access to an infected computer, it is possible for the attacker to steal data.

A

TROJAN HORSE

94
Q

–genuine software or application

A

TROJAN HORSE

94
Q

–named after human viruses that spread person to person

95
Q

-cannot replicate itself or hindi dumadami unlike sa worm

A

TROJAN HORSE

96
Q

are designed to damage the target computer or device by corrupting data, reformatting your hard disk, or completely shutting down your system.

97
Q

–cannot replicate itself without human intervention

98
Q

–made from malicious code that can propagate itself from device to device

98
Q

is a type of malware that spreads copies of itself from computer to computer.

99
Q

–might be triggered by the activation of host or the user

99
Q

can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.

100
Q

–they can stand alone

101
Q

–best example for this is I LOVE YOU VIRUS, once na sinend ito sa tao then inopen tas lahat ng mga contacts mo sa email ay masesendan din neto without sending it directly to them