*Cyber Crime Investigation Flashcards
Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes.
Cybercrime
Cybercrime is an unlawful acts wherein the computer is either a:
- TOOL
- TARGET
- or Both
provides a target rich environment for criminals
Cyberspace
Profile of Criminals Children and adolescents between the age group of \_\_\_\_\_\_ years Organized Hackers (Political Hactivist) Professional Hackers/Crackers Disgruntled employees Business Rival. Ex-Boy Friend. Divorced Husband. etc
6 – 18
Victims
Gullible
Greedy people
Unskilled & Inexperienced
Unlucky people
Cybercrime are vulnerable
Because of :
Anonymity Computer’s storage capacity Weakness in Operation System Lack of user Awareness Negligence of user
(Cybercrime Prevention Act of 2012)
Republic Act 10175
-Section 33 of the law has two (2) provisions that enumerates and penalizes the following acts:
Computer hacking,
Introduction of computer virus, and
Copyright infringement
Republic Act 8792 Electronic Commerce Act of 2000
– Access Devices Regulation Act
RA.8484
– Anti Child Porn of 2009
•RA.9775
– Anti Photo and Video Voyeurism
•Revised Penal Code (RPC) and other Special Laws.
•RA.9995
Cybercrime Offenses
I. Offense against Confidentiality, Integrity, and Availability (CIA) of computer data and system: such as;
- Computer Related Offenses: such as;
- Content-related Offenses: such as;
Offense against Confidentiality, Integrity, and Availability (CIA) of computer data and system: such as;
- Illegal Access
- Illegal Interception
- Data Interference
- System Interference
- Misuse of Devices
2 – Computer Related Offenses: such as;
- Computer-related Forgery
* Computer-related Fraud
Content-related Offenses: such as;
- Cybersex
- Child Pornography
- Unsolicited Commercial Communications
Mode and Manner of Committing Cybercrime
Hacking/Illegal Access Denial Of Service Attack Malware Dissemination Software Piracy Pornography Credit Card Fraud Phishing Website Defacement Net Extortion Cyber Defamation Threatening Salami Attack
is simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
Hacking
This is an act by the criminal, who floods the bandwidth of the victim’s network of fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.
Denial of Service Attack (DoS)
Malicious software that attaches itself to other software .
Virus, Worms, Trojan Horse, Rootkits, Logic Bomb are the malicious software “Malware”
Malware Dissemination
Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
Retail revenue losses worldwide are ever increasing due to this crime
Can be done in various ways –
End user copying, Hard disk loading, Counterfeiting, Illegal downloads from the internet etc.
Software Piracy
is the first consistently successful e-commerce product.
Deceptive marketing tactics and mouse trapping technologies _______ encourage customers to access their websites.
Anybody including children can log on to the internet and access websites with pornographic contents with a click of a mouse.
Pornography
You simply have to type credit card number into www page of the vendor for online transaction
If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonation the credit card owner
Credit Card Fraud
(Credit card Skimmer - machine)
Credit card writer
Copying the company’s confidential data in order to extort said company for huge amount.
Net Extortion
Its is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means
Phishing
Actual website
Deceptive Website
Phishing email
is an attack on a website that changes the visual appearance of the site or a webpage.
Website defacement
Active website
Deceptive website
The Criminal sends emails containing defamatory matters to all victim or post the defamatory matters on a website.
(disgruntled employee may do this against boss, ex-boys friend against girl, divorced husband against wife etc)
Cyber Defamation
The Criminal sends threatening email or comes in contact in chat rooms with victim.
(Any one disgruntled may do this against boss, friend or official)
Threatening
In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed.
Criminal makes such program that deducts small amount like P 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.
Salami attack
Sale & Purchase through net.
There are web site which offer sale and shipment of contrabands drugs.
They may use the techniques of steganography for hiding the message.
Sale of Narcotics