CYBERCRIME Flashcards

1
Q

Also known as computer crime, high-tech crime, internet crime, digital crime, technological crime, electronic crime

A

CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Any crime accomplished through special knowledge of computer technology

A

CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Any crime where computer is used as a tool or a target to the commission of the crime
Any criminal activities that take place within or by utilizing networks of electronic communication such as the internet

A

CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It is the interconnection of many computers like personal computers, mobile phones, tablets, etc. through the internet

A

Cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is the type of community - a giant neighborhood made up of networked computer users around the world - then it is natural that many elements of a traditional society can be seen as bitts and bytes.

A

Cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attackers stole financial market information by accessing the French telegraph system

A

1834- the first cyber attack in the world happened in France

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Allen Scherr launched a cyber attack against the MIT computer networks, stealing passwords from their database via punch card

A

1962- The modern history of cybercrime began

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Criminals broke the telephone network of tone frequencies to make free calls to a long-distance

A

1970- Phreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

1971- The Creeper Program
A program created by ——designed as a security test if the self-replicating program was possible

A

Bob Thomas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ray Tomlinson created the Reaper, the first anti-virus software to delete the creeper.

A

1972- The Reaper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WHO CREATED THE REAPER

A

Ray Tomlinson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The first virus on a computer.

A

1974- Rabbit Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

1981- The First Cybercrime Conviction

A

Ian Murphy “ Captain Zap”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The first major cyber attack on the internet came courtesy of Cornell grad student Robert Morris

A

1988- The Morris Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

“father of Ransomware

A

Joseph Popp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Created by David L. Smith
virus, It was a mass-mailing macro virus that targeted Microsoft Word- and Outlook-based systems.

A

1999- Melissa Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Created by Onel De Guzman
The email was received in inboxes in Hong Kong in 2000 with the subject “ I LOV YOU” and an attachment “ LOVE-LETTER-FOR-YOU. TXT.vbs”

A

2000- The Love Bug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It erases or blurred the computer data and gets the contacts on the computer and sends the same email to all contact to the directory. When it was opened, it duplicate and did like previously

A

2000- The Love Bug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This Act aims to facilitate domestic and international dealings, transactions, arrangements agreements, contracts and exchanges and storage of information through the utilization of electronic, optical and similar medium, mode, instrumentality and technology to recognize the authenticity and reliability of electronic documents related to such activities and to promote the universal use of electronic transaction in the government and general public.

A

REPUBLIC ACT NO 8792 – ELECTRONIC COMMERCE ACT OF 2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

REPUBLIC ACT NO 8792 – ELECTRONIC COMMERCE ACT OF 2000
was approved when?

A

June 14, 2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Fastest spreading e-mail worm ever surpassing the record of I LOVE YOU virus

A

2004 – MyDoom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

WHO WAS THE FIRST FILIPINO CONVICTED OF CYBERCRIME?

A

JJ MARIA GINER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A cybercriminal is a person who conducts some form of illegal activity using computers or other digital technology such as the Internet.

A

cybercriminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Types of Cybercriminals

A

The social engineer
The spear phisher
The hacker
The rouge employee
The ransom artist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

A

The Social Engineer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

attacks manipulate people into sharing information that they shouldn’t share, downloading software that they shouldn’t download, visiting websites they shouldn’t visit, sending money to criminals or making other mistakes that compromise their personal or organizational security.

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Types of Social Engineering Attacks

A

Phishing
Spear phishing
Tailgating
Baiting
Scareware
Watering hole attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

is an attack that targets an individual, organization or business.

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Is an individual who uses computer, networking or other skills to overcome a technical problem

A

The Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Types of Hackers

A

White hats (blue hats)
Black hats
Gray hats
Green hats
Red hats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

engage in legal hacking to improve digital security for those who contract them.

A

White hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

are white hat hackers who are employed by an organization.

Their job is to maintain the cybersecurity of the organization and prevent attacks.

A

Blue Hat Hcakers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

are cybercriminals who orchestrate scams and exploit vulnerabilities with the intent to cause harm. The aim of black hat hackers is usually to make money.

A

Black hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Hackers that fall between black and white hat hackers who have been sitting or changing ethics depending on the specific situation

A

Gray hats hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

It is interchangeably referred to as script kiddies. They are both inexperienced and have little knowledge about hacking.

A

Green Hat Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

are mostly inspired to be white hat hackers or black hat hackers. While the script kiddies want to rely on the malicious software done by other hackers because they don’t have enough knowledge.

A

Green Hat Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

consider themselves the “superheroes” of the hacking community. They frequently target black hat hackers to disrupt or counter their attacks.

A

Red hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

are people who hack into systems to fight back against perceived political or social injustice

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

engages in harmful activities like data theft and intellectual property leakage. They steal valuable data or information.

A

rogue employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

They possess intimate knowledge of the organization’s procedures, systems, and sensitive data.

A

rogue employee

41
Q

This type of cybercriminals use malicious software, or malware, that prevents you from accessing your computer files, systems, or networks.

A criminal group will then demand a ransom in exchange for decryption. The computer itself may become locked, or the data on it might be encrypted, stolen or deleted.

A

The Ransom Arist

42
Q

is any software intentionally designed to disrupt a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive users of access to information, or which unknowingly interferes with the user’s computer security and privacy.

A

Malware (malicious software)

43
Q

is a type of malware that encrypts a victim’s data where the attacker demands a “ransom”, or payment, to restore access to files and network. Typically, the victim receives a decryption key once payment is made to restore access to their files.

A

Ransomware

44
Q

a type of malware that poses as legitimate code or software. Once inside the network, attackers can carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.

A

Trojan ( Trojan malware) ( Trojan Virus)

45
Q

are tools that record what a person types on a device while there are legitimate and legal users for keyloggers, many uses for keyloggers are malicious.

A

Keyloggers (Keystroke Loggers)

46
Q

A type of malware that can reproduce or self-replicate on its own without human interaction

A

Worm

47
Q

Type of malware that enables the remote monitoring of a computer user’s activities or information on an individuals computer where the software has been installed.

A

Spyware

48
Q

Networks of compromised computers or devices that under are the control of a malicious actor, often referred to as the “botmaster” or “bot herder” . These compromised devices called as “bots” or “zombies” are typically infected with malware that allows the botmaster to control them remotely without the knowledge or consent of their owners.

A

Botnet and Zombie (bots)

49
Q

Type of cybercrime that uses email, SMS, phone, social media, and social engineering techniques to induce a victim to share sensitive information — such as passwords or account numbers — or to download a malicious file that will install viruses on their computer or phone.

A

Phishing

50
Q

is a type of phishing attack that targets specific individuals or organizations typically through malicious emails. The goal of is to steal sensitive information such as login credentials or infect the targets’ device with malware.

A

Spear-phishing

51
Q

attack is a type of social engineering attack specifically targeting senior or C-level executive employees with the purpose of stealing money or information, or gaining access to the person’s computer in order to execute further cyberattacks.

A

whaling

52
Q

the act of sending fraudulent text messages designed to trick individuals into sharing sensitive data such as passwords, usernames and credit card numbers.

A

Smishing

53
Q

a voice phishing attack, is the fraudulent use of phone calls and voice messages pretending to be from a reputable organization to convince individuals to reveal private information such as bank details and passwords.

A

Vishing

54
Q

attacks
a malicious, targeted attack that floods a network with false requests to disrupt business operation

A

Denial-of-service (DoS)

55
Q

also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver’s license numbers, to impersonate someone else. The stolen information can be used to run up debt purchasing credit, goods and services in the name of the victim or to provide the thief with false credentials.

A

Identity Theft

56
Q

is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization.

It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, doxing, or blackmail. This online harassment, which is an extension of cyberbullying and in-person stalking, can take the form of e-mails, text messages, social media posts, and more and is often methodical, deliberate, and persistent.

A

Cyber Stalking

57
Q

is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorized access to or control over computer network security systems for some illicit purpose.

A

Hacking

58
Q

Is a higher form of hacking in which the unauthorized access culminates with the process of defeating the security system to acquire money or information and /or avail free services.

A

Cracking

59
Q

The distribution, posting, trafficking, and disseminating of obscene material including children’s nude pictures, indecent exposure, and child sex slavery posted on the internet, live streaming videos aired through the internet

A

Child Pornography

60
Q

Is a type of cybercrime that is used by attackers or hackers to commit financial crimes. Small amount of money is subtracted from the customer’s accounts and added to the account of the thief.

A

Salami Attack (embezzlement)

61
Q

A malicious code intentionally inserted into the system of the target will be set off until the specified conditions are met.

A

Logic Bomb

62
Q

An authorized modification of a website

A

Website Defacement

63
Q

Is a collection of entities( hardware, software and liveware ) that are designed to receive, process, manage, and present information in a meaningful format.

A

COMPUTER SYSTEM

64
Q

– These are physical parts/ intangible parts of a computer eg. Input devices, output devices, central processing units, and storage devices

A

Computer hardware

65
Q

=- also known as programs or applications. They are classified into two classes namely - system software and application software

A

Computer software

66
Q
  • is the computer user. Also known as orgware or the humanware. The user commands the computer system to execute on instructions.
A

Liveware

67
Q

, a French merchant and inventor invented a loom that uses punched wooden cards to automatically weave fabric designs. Early computers would use similar punch cards.

A

1801: Joseph Marie Jacquard

68
Q

1821: English mathematician HE conceives of a steam-driven calculating machine that would be able to compute tables of numbers. Funded by the British government, the project, called the “Difference Engine” fails due to the lack of technology at the time

A

Charles Babbage

69
Q

1853: Swedish inventor designed the world’s first printing calculator. The machine is significant for being the first to “compute tabular differences and print the results,” according to Uta C. Merzbach’s book, “Georg Scheutz and the First Printing Calculator” (Smithsonian Institution Press, 1977).

A

Per Georg Scheutz and his son Edvard

70
Q

1937- THEY built the first electronic digital computer. It was called the Atanasoff-Berry Computer (ABC)

A

Dr. John V. Atanasoff and Clifford Berry

71
Q

1943- for the military, an electronic computer namedwas built

A

Colossus

72
Q

1946- the first digital computer was built.

A

The Electronic Numerical Integrator And Computer (ENIAC)

73
Q

Physical and visible structure that houses the computer’s processor, memory, storage, communication ports and peripheral devices.

A

Hardware

74
Q

These are the instructions that tell the computer what to do and how to do it. The two categories the operating system and application software

A

Software

75
Q

, also known as main memory, is a computer component that stores data, programs, and instructions currently in use. It’s located on the motherboard, allowing fast reading and writing to primary storage and providing processors with speedier access to the data and instructions it holds. Primary storage temporarily stores data that is actively in use or being processed by the system.

A

Primary storage

76
Q

A form of electronic computer memory that can be read and changed in any order, typically used to store working data and machine code. It is a temporary memory bank where your computer stores data it needs to retrieve quickly. keeps data easily accessible so your processor can quickly find it without having to go into long-term storage to complete immediate processing tasks.

A

Random Access Memory

77
Q

Is a type of computer storage containing non-volatile, permanent data that, normally, can only be read, not written to. This means it receives data and permanently writes it on a chip, and it lasts even after you turn off your computer.

A

Read Only Memory

78
Q

Also known as external memory

devices primarily refer to storage devices that serve as an addition to the computer’s primary storage, RAM and cache memory. Since they always consist of non-volatile memory, they allow the user to permanently store data on them.

A

Secondary Storage ( auxiliary devices)

79
Q

AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES

A

REPUBLIC ACT NO. 10175

80
Q

refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.

A

Access

81
Q

refers to the modification or change, in form or substance, of an existing computer data or program.

A

Alteration

82
Q

refers to the transmission of information through ICT media, including voice, video and other forms of data
Computer

A

Communication

83
Q

refers to a set of instructions executed by the computer to achieve intended results.

A

Computer program

84
Q

refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system including a program suitable to cause a computer system to perform a function and includes electronic documents and/or electronic data messages whether stored in local computer systems or online.

A

Computer data

85
Q

refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data.

A

Computer system

86
Q

refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.

A

Cybersecurity

87
Q

refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.

A

Database

88
Q

refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.

A

Interception

89
Q

refers to any computer data other than the content of the communication including, but not limited to, the communication’s origin, destination, route, time, date, size, duration, or type of underlying service.

A

Traffic data or non-content data

90
Q

. – The access to the whole or any part of a computer system without right.

A

Illegal Access

91
Q

. – The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.

A

Illegal Interception

92
Q

— The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.

A

Data Interference.

93
Q

. — The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses.

A

System Interference

94
Q

. – Any person who willfully abets or aids in the commission of any of the offenses enumerated in this Act shall be held liable.

A

Aiding or Abetting in the Commission of Cybercrime

95
Q

the unit of PNP responsible for the investigation of all cybercrimes and other crimes in which Information and Communications Technology (ICT) was used in the commission of criminal acts or the object of attack

A

PNP Anti-Cybercrime Group (ACG)

95
Q

. — Any person who willfully attempts to commit any of the offenses enumerated in this Act shall be held liable.

A

Attempt in the Commission of Cybercrime

95
Q

within the DOJ is designated as the Central Authority in all matters relating to international mutual assistance and extradition for cybercrime and cyber-related matters;
It also acts as the focal agency in formulating and implementing law enforcement investigation and prosecution strategies in curbing cybercrime and cyber-related offenses nationwide

A

OFFICE OF CYBERCRIME (OOC)

96
Q

Law enforcement authorities, upon securing a court warrant, shall issue an order requiring any person or service provider to disclose or submit subscriber’s information, traffic data or relevant data in his/its possession or control within seventy-two (72) hours from receipt of the order in relation to a valid complaint officially docketed and assigned for investigation and the disclosure is necessary and relevant for the purpose of investigation.

A

Section 14. Disclosure of Computer Data.