CHAPTER 1 Flashcards
“Ever since men began to modify their lives by using technology, they have found themselves in a series of technological traps”
Roger Revelle
-are essentially a combination of the elements of COMPUTER AND NET CRIME
CYBER-CRIMES
can be best defined as “Offenses that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly using modem telecommunication networks such as the Internet and mobile phones.
CYBER-CRIMES
is criminal activity that either targets or uses a computer, a computer network or a networked device.
CYBERCRIME
– two or more computers that are connected with one another for the purpose of communicating data electronically
COMPUTER NETWORK
–kind of device that are used to connect devices or computers together to transfer resources or files
NETWORK DEVICE
common sources being shared today is CONNECTION TO THE
INTERNET
- is criminal activity in computer alone
COMPUTER CRIME
–no help or no internet
COMPUTER CRIME
–online or illegal activity which is committed on/ through internet without the use of computer
NET CRIME
-is the study of causation of crimes that occur in the cyberspace and its impact in the physical space (Jaishankar, 2007).
CYBER CRIMINOLOGY
–coined the term CYBER CRIMINOLOGY, he did not only define it
JAISHANKAR
–known as the Founding Father of Cyber Criminology
JAISHANKAR
REASONS OF JAISHANKAR ON COINING THE CYBER CRIMINOLOGY
- According to him, the body of knowledge that deals with cybercrime should not be confused with investigations and it should be merged with the CYBER FORENSIC OR DIGITAL FORENSIC in terms of investigating cybercrimes
- There should be an independent discipline to study and explore cybercrimes from a social science perspective
–process of preservation, identification, extraction, and documentation of computer evidence which can be used by the court of law
DIGITAL FORENSIC
is the cause why people commit cybercrime and traditional crime
ECONOMIC GAIN
some people commit cybercrime because of
THRILL OR TO SIMPLY SHOW THEIR TALENT
- study of crimes, criminals and victims
CRIMINOLOGY
– environment of the internet
CYBERSPACE
GENERAL CATEGORIES OF CYBER CRIME:
- COMPUTER AS A TARGET
- COMPUTER AS A WEAPON
– illegal activity that attack other computers or the direct target is the computer itself
COMPUTER AS A TARGET
- The computer as we know it today had its beginning on
19TH CENTURY.
designed the ANALYTICAL ENGINE and this design was used as basic framework of the computers of today are based on.
CHARLES BABBAGE
CHARLES BABBAGE designed the
ANALYTICAL ENGINE
this design was used as basic framework of the computers of today are based on.
ANALYTICAL ENGINE
-during that time, when this engine was made it is considered as the first era of modern computers
ANALYTICAL ENGINE
–it is a fully controlled and an automatic mechanical digital computer
ANALYTICAL ENGINE
- The first recorded cybercrime in the history took place in the year
1820.
-he is a textile manufacturer in France
JOSEPH MARIE JACQUARD
-later on, he devised a loom or device allowed the repetition of series of steps in weaving special fabrics
JOSEPH MARIE JACQUARD
-there was indeed a device to facilitate the production of fabric, the Jacquard employees were afraid or threatened because there was a chance they would lose their jobs. With that his employees committed acts of sabotage to the technology that was made in order to discourage Jacquard to further use that new technology
JOSEPH MARIE JACQUARD
–despite of what they did, the employees were not convicted
JOSEPH MARIE JACQUARD
- The first person to be found guilty of cybercrime in history was
IAN MURPHY
also known as CAPTAIN ZAP
IAN MURPHY
- The first person to be found guilty of cybercrime was IAN MURPHY, also known as CAPTAIN ZAP, and that happened in the year?
1981.
- The first unsolicited bulk commercial email was sent by a
DIGITAL EQUIPMENT CORP MARKETING
- The first unsolicited bulk commercial email was sent by a DIGITAL EQUIPMENT CORP MARKETING representative to every
ARPANET (ADVANCED RESEARCH PROJECTS AGENCY NETWORK)
- The first unsolicited bulk commercial email was sent by a DIGITAL EQUIPMENT CORP MARKETING representative to every ARPANET (ADVANCED RESEARCH PROJECTS AGENCY NETWORK) address on the west coast of the United States on
May 3, 1978.
ARPANET MEANS
ADVANCED RESEARCH PROJECTS AGENCY NETWORK
The message promoted the availability of a new model of computer and was sent by
GARY THUERK
The message promoted the availability of a new model of computer and was sent by GARY THUERK to
393 RECIPIENTS
unsolicited bulk commercial email is a formal name for
SPAM OR JUNK EMAILS
-was the first wide-area packet-switching network with distributed control and one of the first networks to implement the TCP/IP protocol suite.
ADVANCED RESEARCH PROJECTS AGENCY NETWORK (ARPANET)
-This technology became the technical foundation of the Internet.
ADVANCED RESEARCH PROJECTS AGENCY NETWORK (ARPANET)
- suite of communication protocol use to interconnect network devices on the internet
TCP/IP OR TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL
-also known as a LOVE BUG VIRUS
I LOVE YOU VIRUS
-was a type of computer virus that attacked billions of computers with windows operating systems.
I LOVE YOU VIRUS
-It started the attack MAY 2000 from the PHILIPPINES.
I LOVE YOU VIRUS
-It started the attack MAY 2000 from the PHILIPPINES.
I LOVE YOU VIRUS
-This virus was created by computer programmer student of AMA namely ONEL DE GUZMAN.
I LOVE YOU VIRUS
I LOVE YOU VIRUS STARTED THE ATTACK ON?
MAY 2000 from the PHILIPPINES
I LOVE YOU VIRUS spread through internet network as an ?
EMAIL ATTACHMENT
The virus spread through internet network as an EMAIL ATTACHMENT, with the subject line as ____ and an attachment _____
“ILOVEYOU”
“LOVE-LETTER-FOR-YOU.txt.vbs”.
I LOVE YOU VIRUS WAS CREATED BY
ONEL DE GUZMAN.
–he created this because his thesis was rejected, the reason why his professor rejected his thesis is about a virus then therefore for them, it is unethical since he is a student
ONEL DE GUZMAN.
–once it was opened, a VISUAL BASIC SCRIPT OR VBS will be executed or ito na yung virus itself then the computer will be infected and finds the recipient outlook address book and resend the note to everyone in it then it will destroy every file of your computer including the jpeg, mp3
I LOVE YOU VIRUS
–the virus target is the MICROSOFT OUTLOOK
I LOVE YOU VIRUS
WITHIN 10 DAYS, HOW MANY NETWORKS WERE DESTROYED?
50 MILLION
WHAT HAPPENED TO THE CASE OF ONEL DE GUZMAN?
NOTHING HAPPENED
_____ filed cases against him, but even at the first stage, the indictment was _____ because there was no law penalizing the said act during the time of commission in the Philippines.
GOVERNMENT PROSECUTORS
DISMISSED
“NULLUM CRIMEN, NULLA POENA SINE LEGE” MEANS
“THERE IS NO CRIME IF THERE IS NO LAW PUNISHING IT.”
WHAT WAS THE EFFECT OF I LOVE YOU VIRUS CASE ON THE PHILIPPINE LEGISLATION?
the Philippine Congress enacted REPUBLIC ACT (RA) 8792, otherwise known as the “Electronic Commerce Act of 2000”. This was signed into law on JUNE 14, 2000.
otherwise known as the “Electronic Commerce Act of 2000”
REPUBLIC ACT (RA) 8792
This was signed into law on JUNE 14, 2000.
REPUBLIC ACT (RA) 8792
THE SALIENT FEATURES OF THE ACT ARE AS FOLLOWS:
*Provides for the ADMISSIBILITY OF ELECTRONIC DOCUMENTS in court cases
*PENALIZES LIMITED ONLINE CRIME, such as hacking, introduction of viruses and copyright violations of AT LEAST PHP 100,000 and a maximum commensurate to the damage incurred, and imprisonment of six months to three years, among others;
- PROMOTES E-COMMERCE in the country
*Aims to REDUCE GRAFT AND CORRUPTION IN GOVERNMENT
PENALIZES LIMITED ONLINE CRIME, such as __________ and a maximum commensurate to the damage incurred, and imprisonment of _____, among others;
hacking, introduction of viruses and copyright violations of AT LEAST PHP 100,000
six months to three years
-is considered the landmark law in the history of the Philippines since it has placed the Philippines among the countries penalizing cybercrime.
RA 8792
-Likewise, the Supreme Court drafted the RULES ON ELECTRONIC EVIDENCE, which took effect on AUGUST 1, 2000, to emphasize the admissibility of evidence in electronic form, subject to its AUTHENTICITY AND RELIABILITY.
RA 8792
Likewise, the Supreme Court drafted the RULES ON ELECTRONIC EVIDENCE, which took effect on ______, to emphasize the admissibility of evidence in electronic form, subject to its _____
AUGUST 1, 2000
AUTHENTICITY AND RELIABILITY.
The first Filipino to be convicted of cybercrime, was
JJ MARIA GINER
JJ MARIA GINER He was convicted in ____ BY _____
SEPTEMBER 2005 by Manila MTC Branch 14 JUDGE ROSALYN MISLOS-LOJA.
Giner pleaded guilty to hacking the
government portal “gov.ph” and other government websites.
He was sentenced to ONE TO TWO YEARS of imprisonment and fined Php100,000. However, he immediately APPLIED FOR PROBATION, which was eventually granted by the court.
JJ MARIA GINER
is considered a landmark case, as he is the first local hacker to be convicted under SECTION 33A OF THE E-COMMERCE LAW OR REPUBLIC ACT 8792.
CONVICTION OF GINER
The CONVICTION OF GINER is considered a landmark case, as he is the first local hacker to be convicted under
SECTION 33A OF THE E-COMMERCE LAW OR REPUBLIC ACT 8792.
-electronic machine or device powered by electric wherein its task or function is that it accepts data, stores data, processes data into a useful information.
COMPUTER
is made up of multiple parts and components that facilitate user functionality.
COMPUTER
TWO PRIMARY CATEGORIES OF COMPUTER
- HARDWARE
- SOFTWARE
- The physical components of a computer system
- HARDWARE
- These are the instructions that tell the computer what to do and how to do it.
- SOFTWARE
–a.k.a PROGRAMS
- SOFTWARE
HARDWARE COMPONENTS
- INPUT DEVICES
- OUTPUT DEVICES
- PROCESSING DEVICES
- STORAGE MEDIA
is any hardware component that allows the user to enter data into the computer.
INPUT DEVICES
-one of the pointing device that has a pointer that changes into different shape as we use it
- MOUSE
INPUT DEVICES EXAMPLES
- KEYBOARD
- MOUSE
- SCANNER
- MICROPHONE
- DIGITAL CAMERA
- PC VIDEO CAMERA
is the pointing device in laptop
TOUCH PAD
is any hardware component that gives information to the user
OUTPUT DEVICES
OUTPUT DEVICES EXAMPLES
- MONITOR
- PRINTER
- SPEAKER
-components responsible for the processing of information within the computer system
- PROCESSING DEVICES
–core function of the any computer
- PROCESSING DEVICES
–raw data is transformed into information
- PROCESSING DEVICES
2 COMMON EXAMPLE OF PROCESSING DEVICES
- CPU/ CENTRAL PROCESSING UNIT
- MOTHERBOARD
-considered as the brain of the computer
- CPU/ CENTRAL PROCESSING UNIT
-is considered as the backbone of the computer
- MOTHERBOARD
-it connect some of the parts of a computer together
- MOTHERBOARD
THE TWO MAIN CATEGORIES OF SOFTWARE:
- SYSTEM SOFTWARE
- APPLICATION SOFTWARE
also called the OPERATING SYSTEM (OS) which actually runs the computer.
- SYSTEM SOFTWARE
–common system software is
WINDOWS OPERATING SYSTEM, MacOS, IOS, ANDROID
is a program that allows users to a specific task on the computer.
- APPLICATION SOFTWARE
EXAMPLES OF APPLICATION SOFTWARE
- WORD PROCESSING APPLICATION
- SPREADSHEET APPLICATION
- E-MAIL APPLICATION
- INTERNET APPLICATION
-keeps data, information and instructions for use in the future.
STORAGE DEVICE/ MEDIUM OR MEDIA
STORAGE MEDIA/ STORAGE MEDIUM/ STORAGE DEVICE HAS
WRITING
READING
– when the user saves information or data in storage devices, the process is
WRITING
- once we open the data or information that we saved in the storage devices, the process is
READING
PRIMARY STORAGE
- RAM (RANDOM ACCESS MEMORY)
- is the primary storage of a computer.
- RAM (RANDOM ACCESS MEMORY)
-When you’re working on a file on your computer, it will temporarily store data in your
- RAM (RANDOM ACCESS MEMORY)
-It allows you to perform everyday tasks like opening applications, loading webpages, editing a document or playing games, and allows you to quickly jump from one task to another without losing your progress.
- RAM (RANDOM ACCESS MEMORY)
–considered as VOLATILE MEMORY means that it is unstable so once i-off yung laptop ay mawawala lahat ng data since it is TEMPORARILY STORED
- RAM (RANDOM ACCESS MEMORY)
RAM MEANS
- RAM (RANDOM ACCESS MEMORY)
ROM MEANING
READ ONLY MEMORY
–stores the application software and operating system
ROM/READ ONLY MEMORY
–considered as NON- VOLATILE MEMORY
ROM/READ ONLY MEMORY
SECONDARY STORAGE
HARD DISK DRIVES (HDD) & SOLID-STATE DRIVES (SSD)
are commonly used as the main storage device in a computer.
- HARD DISK DRIVES (HDD)
often store operating system, software programs and other files.
- HARD DISK DRIVES (HDD)
-These are magnetic storage devices
- HARD DISK DRIVES (HDD)
–takes longer to gather information due to the mechanical nature which is it needs to rotate first
- HARD DISK DRIVES (HDD)
–many intricate moving parts so it is vulnerable to damage and wet
- HARD DISK DRIVES (HDD)
- is a new generation of storage device used in computers.
- SOLID-STATE DRIVES (SSD)
replace traditional mechanical hard disks by using flash-based memory, which is significantly faster.
- SOLID-STATE DRIVES (SSD)
don’t rely on magnets and disks, instead they use a type of flash memory called NAND OR NOT AND
- SOLID-STATE DRIVES (SSD)
SSDs don’t rely on magnets and disks, instead they use a type of flash memory called
NAND OR NOT AND
EXTERNAL STORAGE DEVICES
- EXTERNAL HARD DRIVE
- FLOPPY DISKS
- CDs, DVDs, and Blu-Ray disks
- FLASH MEMORY DEVICES
- is a device which is plugged into your machine to give almost-immediate storage space, without the need to open or use your computer’s internal storage.
- EXTERNAL HARD DRIVE
-were the first widely available portable, removable storage devices.
- FLOPPY DISKS
-They work in the same way as hard disk drives, although at a much smaller scale.
FLOPPY DISKS
was the fist personal computer (PC) release without a floppy disk drive
iMac
-are used for a lot more than just playing music and videos
- CDs, DVDs, and Blu-Ray disks
—they also act as storage devices, and collectively they’re known as OPTICAL STORAGE DEVICES OR OPTICAL DISK MEDIA.
- CDs, DVDs, and Blu-Ray disks
–working through the action of light
- CDs, DVDs, and Blu-Ray disks
- CDs, DVDs, and Blu-Ray disks
-are used for a lot more than just playing music and videos—they also act as storage devices, and collectively they’re known as
OPTICAL STORAGE DEVICES OR OPTICAL DISK MEDIA
–working through the action of light
- CDs, DVDs, and Blu-Ray disks
– are the latest available drive
–reserve with high-definition display
BLU-RAY DISK
CD- ROM MEANS
COMPACT DISC- READ ONLY MEMORY
–is optical storage disk where data written on them is already permanent and cannot be removed or overwritten or palitan
CD- ROM (COMPACT DISC- READ ONLY MEMORY)
–common in software installation program
–cannot be used as personal storage device
CD- ROM (COMPACT DISC- READ ONLY MEMORY)
CD-RW MEANS
COMPACT DISC RE-WRITABLE
CD-R MEANS
COMPACT DISC- RECORDABLE
– recordable but cannot be overwritten; not flexible
CD-R(COMPACT DISC- RECORDABLE)
– you can continuously write data and erase data from them
CD-RW (COMPACT DISC RE-WRITABLE)
– these are small, portable storage devices that have long been a popular choice for extra computer storage.
- FLASH MEMORY DEVICES
-The most recognizable type of flash memory device is the
USB FLASH DRIVE