2 Flashcards
provided the FOUR GENERAL TYPES OF CYBERCRIME:
BUDAPEST CONVENTION ON CYBER CRIME/ BUDAPEST CONVENTION
The BUDAPEST CONVENTION ON CYBER CRIME/ BUDAPEST CONVENTION held on
2001
FOUR GENERAL TYPES OF CYBERCRIME:
· OFFENSES AGAINST THE CONFIDENTIALITY, INTEGRITY AND AVAILABILITY OF COMPUTER DATA AND SYSTEMS,
· COMPUTER-RELATED OFFENSES
· CONTENT-RELATED OFFENSES
· COPYRIGHT-RELATED OFFENSES
–on the provisions of RA 10175, the online offenses or cybercrime offenses that will fall under this typology are the
ILLEGAL ACCESS, ILLEGAL INTERCEPTION, DATA INTERFERENCE, SYSTEM INTERFERENCE, AND MISUSE OF DEVICES
RA 8293
“INTELLECTUAL PROPERTY CODE”
–first international treaty
BUDAPEST CONVENTION ON CYBERCRIME
–held to seek or address cybercrime, to provide solution and measures in combating cybercrime
BUDAPEST CONVENTION ON CYBERCRIME
–during this convention, they crafted or created a guideline as a basis of every country in developing their national laws in terms of penalizing or combating cybercrime
BUDAPEST CONVENTION ON CYBERCRIME
–ito ang reason why na-enact ang RA 10175 kahit na meron ng RA 8792 since it only punishes limited online crimes
BUDAPEST CONVENTION ON CYBERCRIME
–nakapagdecided ang PH that they will enact another law which is RA 10175 to be compliant to this guidelines set by the convention
BUDAPEST CONVENTION ON CYBERCRIME
– is an international agreement depending on kung ano yung mga member countries involved in this convention
TREATY
–PH is involved and one of the state parties or countries na naging signatory on this convention
BUDAPEST CONVENTION ON CYBERCRIME
GENERAL CLASSIFICATIONS OF CYBERCRIME
- UNAUTHORIZED ACCESS
- HACKING
- CRACKING
- CYBER FRAUD
is when someone gains access to a website, program, server, service, or other system using someone else’s account.
UNAUTHORIZED ACCESS
using your friends fb account after they neglected or nakalimutan nila na ilog-out ito or pwede din na naiwan nung friend mo yung laptop niya na nakaopen yung fb niya dun then pinakelaman mo
UNAUTHORIZED ACCESS
PASSWORD GUESSING IS THE EXAMPLE
UNAUTHORIZED ACCESS
–it does not only include the attempt but also intrude or napasok or nagkaroon na siya ng access
HACKING
- Any attempt to intrude into a computer or a network without authorization.
HACKING
-This involves changing of system or security features in a bid to accomplish a goal that differs from the intended purpose of the system.
HACKING
- It can also refer to non-malicious activities, usually involving unusual or improvised alterations to equipment or processes.
HACKING
-An individual who involves themselves in hacking activities is known as a
HACKER.
– malicious software once installed it records everything you type or your keyboard strokes or it monitors everything you do on your computer
KEYLOGGER MALWARE
–gain through using other technique like gumamit ka ng KEYLOGGER MALWARE
HACKING
- is a malicious software where mal stands for malicious then ware is software
MALWARE
can be described as gaining unauthorized access to a computer system by improper means
HACKING
can be describes as gaining access to a computer system using usual means of access but without consent
UNAUTHORIZED ACCESS
THE VARIOUS KINDS OF HACKERS
· WHITE HATS HACKER
· BLACK HAT HACKERS
· GRAY HAT HACKERS
also known as ETHICAL HACKERS
WHITE HATS HACKER
strive to operate in the publics best interest, rather than to create turmoil.
WHITE HATS HACKER
work doing penetration, to attempt to break into the company’s networks to find and report on security vulnerabilities.
WHITE HATS HACKER
–their purpose is for good intention
WHITE HATS HACKER
–they hack their own security system to make it more hacked proof
WHITE HATS HACKER
–they enhance their cybersecurity once nalaman nila na vulnerable ang system nila
WHITE HATS HACKER
–same part of the organization wherein naghire ng hacker to check if their system is vulnerable or not
WHITE HATS HACKER
–many private entity or government agencies hire this kind of hacker to maintain their system security
WHITE HATS HACKER
to create damage, chaos
TURMOIL
– this kind of hackers, hack to take control over the system for personal gains.
BLACK HAT HACKERS
-They destroy, steal and even prevent authorized users from accessing the system
BLACK HAT HACKERS
–criminal by definition HACKERS
BLACK HAT HACKERS
–they intentionally gain unauthorized access to other accounts with malicious intent whether their purpose is to steal data, information, to spread virus, malware or for personal gain
BLACK HAT HACKERS
–bad intention ang gusto nila
BLACK HAT HACKERS
- They belong to the neutral zone.
GRAY HAT HACKERS
-They act in the middle ground between white hat hackers, who operate on behalf of those maintaining secure systems, and sometimes act as black hat hackers who act maliciously to exploit vulnerabilities in systems.
GRAY HAT HACKERS
–it depends upon the situation
GRAY HAT HACKERS
– is breaking into a network;
CRACKING
PEOPLE IN CRAKING
CRACKERS
-CRACKERS also act as
BLACK HATS
by gaining access to the accounts of people maliciously and misusing this information across networks.
CRACKING
-they can steal credit card information, they can destroy important files, disclose crucial data and information or personal details and sell them for personal gains
CRACKING
–considered as highest form of hacking
CRACKING
is breaking into the security system for criminal and illegal reasons or for personal gains only.
CRACKING
is the process of intruding computer systems without authorization in order to gain access to them, for good or bad purposes
HACKING
bypasses passwords or licenses in computer programs;
CRACKING
or in other ways intentionally breaches computer security.
CRACKING
is done to remove paid software requirements or pop-up purchase reminders so that people can access the software for free.
SOFTWARE CRACKING
COMMON TYPES OF CRACKING
- SOFTWARE CRACKING
- NETWORK CRACKING
- PASSWORD CRACKING
is a paid program that has had its copy protections removed.
SOFTWARE CRACKING
-is the act of infiltrating a LOCAL AREA NETWORK (LAN).
NETWORK CRACKING
-Sometimes referred to as web cracking or WIRED EQUIVALENT PRIVACY (WEP) cracking, this usually involves accessing poorly secure networks.
NETWORK CRACKING
LAN MEANS
LOCAL AREA NETWORK
WEP MEANS
WIRED EQUIVALENT PRIVACY
is the act of stealing people’s passwords from databases.
PASSWORD CRACKING
- is the crime committed via a computer and internet with the intent to corrupt another individual’s personal and financial information stored online from people illegally by deceiving them.
CYBER FRAUD
CYBER FRAUD CATEGORIES
a. SPOOFING OR PHISHING
b. VIRUS HOAX EMAILS
c. LOTTERY FRAUDS
d. CREDIT CARD FRAUD
e. THEFT OF INTERNET HOURS
f. CYBER TERRORISM
g. CYBER PORNOGRAPHY
i. CYBER-LIBEL OR CYBER DEFAMATION
j. CYBER STALKING
k. DENIAL OF SERVICE ATTACKS
l. DISTRIBUTED DENIAL-OF-SERVICE ATTACK (DDoS attack)
m. SALAMI SLICING ATTACK/ SALAMI FRAUD
n. MALWARE ATTACK
is a type of scam in which criminals attempt to obtain someone’s personal information by pretending to be a legitimate source.
SPOOFING OR PHISHING
SPOOFING OR PHISHING FORM
· EMAIL SPOOFING
· TEXT MESSAGE SPOOFING
· URL Spoofing
is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.
EMAIL SPOOFING
the sender forges email headers so that client software displays the fraudulent sender address, which most users take at face value.
EMAIL SPOOFING
making an email address the same as in his bank account wherein nagsend ka ng message na kailangan niyang iclick itong link kundi mab’block yung account niya without him knowing na may mali sa email address na imbes .com ay – or dash ang nakalagay
EMAIL SPOOFING
- Sometimes referred to as SMISHING.
TEXT MESSAGE SPOOFING
-The text message may appear to come from a legitimate source, such as your bank.
TEXT MESSAGE SPOOFING
-It may request that you call a certain phone number or click on a link within the message, with the goal of getting you to divulge personal information.
TEXT MESSAGE SPOOFING
–there are people who enjoys to exploit others
VIRUS HOAX EMAILS
–sending text message
TEXT MESSAGE SPOOFING
happens when scammers set up a fraudulent website to obtain information from victims or to install malware on their computers.
URL Spoofing
–most common form of phishing
URL Spoofing
are false reports about non-existent viruses, often claiming to do impossible things like blow up the recipient’s computer and set it on fire, or less sensationally, delete everything on the user’s computer.
VIRUS HOAX EMAILS
–it is chain email that tells to forward this message to anyone they know
VIRUS HOAX EMAILS
- These are emails, which inform the recipient that he/ she has won a prize in a lottery.
LOTTERY FRAUDS
–in order for them to get the money, the recipients need to reply so once nagreply ang tao ay may isesend ulit sila na email requiring them to input all their information on your bank account
LOTTERY FRAUDS
is the unauthorized use of a credit or debit card, or similar payment tool to fraudulently obtain money or property.
CREDIT CARD FRAUD
can be stolen from unsecured websites or can be obtained in an identity theft scheme.
Credit and debit card numbers
-is the scheme of obtaining the personal, financial information or other information of another person to use their identity to commit fraud or other illegal activities.
IDENTITY THEFT
–is a vehicle for perpetrating other fraud crimes or schemes
IDENTITY THEFT
–online transaction became the online thing nowadays
CREDIT CARD FRAUD
- Unauthorized use of Internet hours paid for by another person.
THEFT OF INTERNET HOURS
- It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
CYBER TERRORISM
–flooding viruses and malware para ipakita sa government na ito yung pinaglalaban mo
CYBER TERRORISM
–creating fear to the people in online
CYBER TERRORISM
–nowadays, it is attractive option for modern terrorist or traditional terrorism since this is much more cheaper than the usual one
CYBER TERRORISM
–more anonymous than the modern one since nagagawa nila ito ng hindi sila nakikilala or napaglalaban nila kung ano ang gusto nila
CYBER TERRORISM
–the variety or number of targets are enormous or mas marami silang natatarget
CYBER TERRORISM
REPUBLIC ACT NO. 11479
ANTI-TERRORISM ACT OF 2020
– is the act of using cyberspace to create, display, distribute, import, or publish pornography or obscene materials, especially materials depicting children engaged in sexual acts with adults.
CYBER PORNOGRAPHY
- making sexual acts like mga nakahubad na bata then publishing it thru books, journals, newspaper
PORNOGRAPHY
- is a term used when someone has posted or emailed something that is untrue and damaging about someone else on the social media, including blogs, chat rooms, personal websites, social media, social networking sites, or other published articles.
CYBER-LIBEL OR CYBER DEFAMATION
refers to the use of the Internet, e-mail, or other electronic communications device to stalk and later on harass another person.
CYBER STALKING
also called as CYBER SMEARING.
CYBER-LIBEL OR CYBER DEFAMATION
RA 10627
ANTI BULLYING ACT OF 2013
accomplish this by flooding the target with traffic, or sending many information that triggers a crash on someone’s computer or computer network.
DENIAL OF SERVICE ATTACKS
–deny or shut down the service of this source sa legitimate sources niya
DENIAL OF SERVICE ATTACKS
–can cause the organization both time and money while their resources are inaccessible
DENIAL OF SERVICE ATTACKS
–hitting the target resource or the website server with two many request at the same time to the extent na bumabagal or hindi na makapag-respond ng maayos or hindi niya ma-accommodate yung mga legitimate sources niya
DENIAL OF SERVICE ATTACKS
–disrupt or damage the business
–one source lang or one computer lang ang ginagamit mo
DENIAL OF SERVICE ATTACKS
- occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
DISTRIBUTED DENIAL-OF-SERVICE ATTACK (DDoS attack)
–the server cannot connect to the server quickly enough if madami or flooded na sila
–the server may not respond to the real users because busy sila sa mga fake users
DISTRIBUTED DENIAL-OF-SERVICE ATTACK (DDoS attack)
is a technique by which cyber-criminals steal money or resources a bit at a time so that it will be remain unnoticeable.
SALAMI SLICING ATTACK/ SALAMI FRAUD
–pieces by pieces
SALAMI SLICING ATTACK/ SALAMI FRAUD
- is a common cyberattack where malware executes unauthorized actions on the victim’s computer system.
MALWARE ATTACK
-The malicious software encompasses many specific types of attacks like infecting computers.
MALWARE ATTACK
COMMON TYPES OF MALWARES
a. ADWARE/ ADVERTISING-SUPPORTED SOFTWARE
b. RANSOMWARE
c. ROOTKIT
d. TROJAN HORSE
e. VIRUS
f. WORM
SOME PREVENTIVE MEASURES AGAINST CYBERCRIMES
- KEEP SOFTWARE AND OPERATING SYSTEM UPDATED
- USE ANTI-VIRUS SOFTWARE and keep it UPDATED
- USE STRONG PASSWORDS
- NEVER OPEN ATTACHMENTS IN SPAM EMAILS
- HANDS TYPING ON LAPTOP KEYBOARD
- DO NOT GIVE OUT PERSONAL INFORMATION unless secure
- CONTACT COMPANIES DIRECTLY about suspicious requests
- BE MINDFUL of which website URLS YOU VISIT
- KEEP AN EYE ON YOUR BANK STATEMENTS
-is a type of malware that automatically delivers advertisements.
ADWARE/ ADVERTISING-SUPPORTED SOFTWARE
–bigla nalang nagpopop out sa ating computer like porn
ADWARE/ ADVERTISING-SUPPORTED SOFTWARE
–can collect or steal your data by directing to the advertisement
ADWARE/ ADVERTISING-SUPPORTED SOFTWARE
–it can change your internet browsing settings or home page
–nangyayari ito kapag nagdodownload tayo tas wala kang anti virus ay may chance na mangyari sayo ito
ADWARE/ ADVERTISING-SUPPORTED SOFTWARE
ADWARE MEANS
ADVERTISING-SUPPORTED SOFTWARE
-is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
RANSOMWARE
–it will hold your file or data as stage or your data are encrypted so need mo muna ng encryption key from the hacker
RANSOMWARE
–criminal money making scheme dahil di mo magagamit yung files mo then hihingian ka ng pera bago mo magamit ulit
RANSOMWARE
–once paid, your identity ay tatatak na sa hacker and there is a possibility na he can target you again
RANSOMWARE
is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
ROOTKIT
-Once it has been installed it is possible for the malicious party behind the rootkit to remotely execute files, access/steal information.
ROOTKIT
can modify system configurations, alter software.
ROOTKIT
–gain access without being detected
ROOTKIT
–KIT OR SOFTWARE na nasa computer mo
ROOTKIT
commonly known as a “TROJAN,”
TROJAN HORSE
can give a malicious party remote access to an infected computer.
TROJAN HORSE
is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware.
TROJAN HORSE
-Once an attacker has access to an infected computer, it is possible for the attacker to steal data.
TROJAN HORSE
–genuine software or application
TROJAN HORSE
–named after human viruses that spread person to person
VIRUS
-cannot replicate itself or hindi dumadami unlike sa worm
TROJAN HORSE
are designed to damage the target computer or device by corrupting data, reformatting your hard disk, or completely shutting down your system.
VIRUS
–cannot replicate itself without human intervention
VIRUS
–made from malicious code that can propagate itself from device to device
VIRUS
is a type of malware that spreads copies of itself from computer to computer.
WORM
–might be triggered by the activation of host or the user
VIRUS
can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
WORM
–they can stand alone
WORM
–best example for this is I LOVE YOU VIRUS, once na sinend ito sa tao then inopen tas lahat ng mga contacts mo sa email ay masesendan din neto without sending it directly to them
WORM