*Cyber Crime Investigation Flashcards

1
Q

Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cybercrime is an unlawful acts wherein the computer is either a:

A
  • TOOL
  • TARGET
  • or Both
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

provides a target rich environment for criminals

A

Cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Profile of Criminals
Children and adolescents between the age group of \_\_\_\_\_\_ years
Organized Hackers (Political Hactivist)
Professional Hackers/Crackers
Disgruntled employees
Business Rival.
Ex-Boy Friend.
Divorced Husband. etc
A

6 – 18

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Victims

A

Gullible
Greedy people
Unskilled & Inexperienced
Unlucky people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cybercrime are vulnerable

A

Because of :

Anonymity
Computer’s storage capacity
Weakness in Operation System
Lack of user Awareness
Negligence of user
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(Cybercrime Prevention Act of 2012)

A

Republic Act 10175

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

-Section 33 of the law has two (2) provisions that enumerates and penalizes the following acts:
Computer hacking,
Introduction of computer virus, and
Copyright infringement

A

Republic Act 8792 Electronic Commerce Act of 2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

– Access Devices Regulation Act

A

RA.8484

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

– Anti Child Porn of 2009

A

•RA.9775

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

– Anti Photo and Video Voyeurism

•Revised Penal Code (RPC) and other Special Laws.

A

•RA.9995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cybercrime Offenses

A

I. Offense against Confidentiality, Integrity, and Availability (CIA) of computer data and system: such as;

  1. Computer Related Offenses: such as;
  2. Content-related Offenses: such as;
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Offense against Confidentiality, Integrity, and Availability (CIA) of computer data and system: such as;

A
  • Illegal Access
  • Illegal Interception
  • Data Interference
  • System Interference
  • Misuse of Devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

2 – Computer Related Offenses: such as;

A
  • Computer-related Forgery

* Computer-related Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Content-related Offenses: such as;

A
  • Cybersex
  • Child Pornography
  • Unsolicited Commercial Communications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mode and Manner of Committing Cybercrime

A
Hacking/Illegal Access
Denial Of Service Attack
Malware Dissemination
Software Piracy
Pornography
Credit Card Fraud
Phishing
Website Defacement
Net Extortion
Cyber Defamation
Threatening
Salami Attack
17
Q

is simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.

A

Hacking

18
Q

This is an act by the criminal, who floods the bandwidth of the victim’s network of fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.

A

Denial of Service Attack (DoS)

19
Q

Malicious software that attaches itself to other software .

Virus, Worms, Trojan Horse, Rootkits, Logic Bomb are the malicious software “Malware”

A

Malware Dissemination

20
Q

Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.

Retail revenue losses worldwide are ever increasing due to this crime

Can be done in various ways –
End user copying, Hard disk loading, Counterfeiting, Illegal downloads from the internet etc.

A

Software Piracy

21
Q

is the first consistently successful e-commerce product.

Deceptive marketing tactics and mouse trapping technologies _______ encourage customers to access their websites.

Anybody including children can log on to the internet and access websites with pornographic contents with a click of a mouse.

A

Pornography

22
Q

You simply have to type credit card number into www page of the vendor for online transaction

If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonation the credit card owner

A

Credit Card Fraud
(Credit card Skimmer - machine)
Credit card writer

23
Q

Copying the company’s confidential data in order to extort said company for huge amount.

A

Net Extortion

24
Q

Its is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means

A

Phishing

Actual website
Deceptive Website
Phishing email

25
Q

is an attack on a website that changes the visual appearance of the site or a webpage.

A

Website defacement

Active website
Deceptive website

26
Q

The Criminal sends emails containing defamatory matters to all victim or post the defamatory matters on a website.

(disgruntled employee may do this against boss, ex-boys friend against girl, divorced husband against wife etc)

A

Cyber Defamation

27
Q

The Criminal sends threatening email or comes in contact in chat rooms with victim.

(Any one disgruntled may do this against boss, friend or official)

A

Threatening

28
Q

In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed.

   Criminal makes such program that deducts small amount like P 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.
A

Salami attack

29
Q

Sale & Purchase through net.

There are web site which offer sale and shipment of contrabands drugs.

They may use the techniques of steganography for hiding the message.

A

Sale of Narcotics