3 Flashcards
The Budapest Convention on Cyber Crime provided the four general types of cybercrime:
• Offenses against the confidentiality, integrity and availability of computer data and systems,
• Computer-related offenses
• Content-related offenses
• Copyright-related offenses
It is when someone gains access to a website, program, server, service, or other system using someone else’s account.
Through usual means
Unauthorized Access
General Classification of Cybercrime:
Unauthorized Access
Hacking
Cracking
Cyberfraud
- Any attempt to intrude into a computer or a network without authorization. This involves changing of system or security features in a bid to accomplish a goal that differs from the intended purpose of the system. It can also refer to non-malicious activities, usually involving unusual or improvised alterations to equipment or processes.
Hacking
An individual who involves themselves in hacking activities is known as a?.
hacker
It records everything you type (keyboard strokes)
Keylogger
can be described as gaining unauthorized access to a computer system by improper means.
Hacking
can be describes as gaining access to a computer system using usual means of access but without consent.
Unauthorized access
- also known as ethical hackers, strive to operate in the publics best interest, rather than to create turmoil. Many hackers work doing penetration, to attempt to break into the company’s networks to find and report on security vulnerabilities.
White hats
White hat hackers is also known as?
Ethical hackers
– this kind of hackers, hack to take control over the system for personal gains. They destroy, steal and even prevent authorized users from accessing the system
Black hat hackers
- They belong to the neutral zone. They act in the middle ground between white hat hackers, who operate on behalf of those maintaining secure systems, and sometimes act as black hat hackers who act maliciously to exploit vulnerabilities in systems.
Gray hat hackers
What are the various kinds of hackers?
White hat hackers
Black hat hackers
Gray hat hackers
It is the highest form of hacking
Cracking
– is breaking into a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.
Cracking
they also act as Black Hats by gaining access to the accounts of people maliciously and misusing this information across networks.
Crackers
is the process of intruding computer systems without authorization in order to gain access to them, for good or bad purposes
Hacking
is breaking into the security system for criminal and illegal reasons or for personal gains only.
cracking
Common types of Cracking
Software cracking
Network cracking
Password cracking
- Usually, software cracking is done to remove paid software requirements or pop-up purchase reminders so that people can access the software for free. “Cracked” software is a paid program that has had its copy protections removed.
Software cracking
is the act of infiltrating a local area network (LAN). Sometimes referred to as web cracking or wired equivalent privacy (WEP) cracking, this usually involves accessing poorly secure networks.
Network cracking
is the act of stealing people’s passwords from databases.
Password cracking
- is the crime committed via a computer and internet with the intent to corrupt another individual’s personal and financial information stored online from people illegally by deceiving them.
Cyber Fraud
- is a type of scam in which criminals attempt to obtain someone’s personal information by pretending to be a legitimate source.
Spoofing or Phishing
Spoofing or Phising can be in the form of:
Email spoofing
Text message spoofing
URL spoofing
is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.
Email spoofing
in this spoofing attacks, the sender forges email headers so that client software displays the fraudulent sender address, which most users take at face value
email spoofing
Text Message Spoofing is sometimes referred to as?
smishing
in this spoofing attack It may request that you call a certain phone number or click on a link within the message, with the goal of getting you to divulge personal information.
Text Message Spoofing
URL meaning
United resource location
based kay google (UNIFORM RESOURCE LOCATOR)
happens when scammers set up a fraudulent website to obtain information from victims or to install malware on their computers.
URL Spoofing - URL spoofing
https meaning
hyper text transfer protocol secure
if you are doubting that the site you in is not secure or not safe, you should for for this symbol. This symbol means that URL is safe and encrypted
Lock Symbol
- are false reports about non-existent viruses, often claiming to do impossible things like blow up the recipient’s computer and set it on fire, or less sensationally, delete everything on the user’s computer.
Virus hoax emails
it is usually done by Chain emails.
They usually commit this for thrill, fun and to annoy people.
Virus hoax email
- These are emails, which inform the recipient that he/ she has won a prize in a lottery.
Lottery Frauds
is the unauthorized use of a credit or debit card, or similar payment tool to fraudulently obtain money or property. it can be stolen from unsecured websites or can be obtained in an identity theft scheme.
Credit card fraud
is the scheme of obtaining the personal, financial information or other information of another person to use their identity to commit fraud or other illegal activities.
Identity theft
- Unauthorized use of Internet hours paid for by another person.
Theft of Internet Hours
- It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
Cyber Terrorism
Cyber Terrorism is punishable under?
Anti-Terrorism Law
– is the act of using cyberspace to create, display, distribute, import, or publish pornography or obscene materials, especially materials depicting children engaged in sexual acts with adults.
Cyber Pornography
Cyber defamation is also called as?.
Cyber smearing
- is a term used when someone has posted or emailed something that is untrue and damaging about someone else on the social media, including blogs, chat rooms, personal websites, social media, social networking sites, or other published articles.
Cyber-libel or cyber defamation
- Cyber-stalking refers to the use of the Internet, e-mail, or other electronic communications device to stalk and later on harass another person.
Cyber Stalking
Cyber Stalking is punishable under?
Anti-Bullying act of 2013
RA 10627
- attacks accomplish this by flooding the target with traffic, or sending many information that triggers a crash on someone’s computer or computer network.
- uses on computer only
Denial of Service attacks
- occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
Distributed denial-of-service attack (DDoS attack)
is a technique by which cyber-criminals steal money or resources a bit at a time so that it will be remain unnoticeable.
Salami Slicing Attack
- is a common cyberattack where malware executes unauthorized actions on the victim’s computer system. The malicious software encompasses many specific types of attacks like infecting computers.
Malware attack
BOTNET means?
Robot Network
person who uses BOTNET is called?
Bot Herder
What are the common types of Malwares?
Adware
Ransomware
Rootkit
Trojan Horse
Virus
Worm
Adware means?
Advertising-supported software
is a type of malware that automatically delivers advertisements.
Adware
is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
Ransomware
is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs. Once it has been installed it is possible for the malicious party behind this to remotely execute files, access/steal information. this can modify system configurations, alter software.
Rootkit
is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware. it can give a malicious party remote access to an infected computer. Once an attacker has access to an infected computer, it is possible for the attacker to steal data.
Trojan horse
- are designed to damage the target computer or device by corrupting data, reformatting your hard disk, or completely shutting down your system.
Virus
is a type of malware that spreads copies of itself from computer to computer. it can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
Worm
It must be triggered by the activation of the host or user in order to spread.
Virus
It is stand alone programs that can replicate it self and propagate independently
Worm
LOVE BUG VIRUS is considered as what type of Malware?
Worm
What is the main element of CYBERFRAUD?
Deception