CYBERCRIME Flashcards
Also known as computer crime, high-tech crime, internet crime, digital crime, technological crime, electronic crime
CYBERCRIME
Any crime accomplished through special knowledge of computer technology
CYBERCRIME
Any crime where computer is used as a tool or a target to the commission of the crime
Any criminal activities that take place within or by utilizing networks of electronic communication such as the internet
CYBERCRIME
It is the interconnection of many computers like personal computers, mobile phones, tablets, etc. through the internet
Cyberspace
is the type of community - a giant neighborhood made up of networked computer users around the world - then it is natural that many elements of a traditional society can be seen as bitts and bytes.
Cyberspace
Attackers stole financial market information by accessing the French telegraph system
1834- the first cyber attack in the world happened in France
Allen Scherr launched a cyber attack against the MIT computer networks, stealing passwords from their database via punch card
1962- The modern history of cybercrime began
Criminals broke the telephone network of tone frequencies to make free calls to a long-distance
1970- Phreaking
1971- The Creeper Program
A program created by ——designed as a security test if the self-replicating program was possible
Bob Thomas
Ray Tomlinson created the Reaper, the first anti-virus software to delete the creeper.
1972- The Reaper
WHO CREATED THE REAPER
Ray Tomlinson
The first virus on a computer.
1974- Rabbit Virus
1981- The First Cybercrime Conviction
Ian Murphy “ Captain Zap”
The first major cyber attack on the internet came courtesy of Cornell grad student Robert Morris
1988- The Morris Worm
“father of Ransomware
Joseph Popp
Created by David L. Smith
virus, It was a mass-mailing macro virus that targeted Microsoft Word- and Outlook-based systems.
1999- Melissa Worm
Created by Onel De Guzman
The email was received in inboxes in Hong Kong in 2000 with the subject “ I LOV YOU” and an attachment “ LOVE-LETTER-FOR-YOU. TXT.vbs”
2000- The Love Bug
It erases or blurred the computer data and gets the contacts on the computer and sends the same email to all contact to the directory. When it was opened, it duplicate and did like previously
2000- The Love Bug
This Act aims to facilitate domestic and international dealings, transactions, arrangements agreements, contracts and exchanges and storage of information through the utilization of electronic, optical and similar medium, mode, instrumentality and technology to recognize the authenticity and reliability of electronic documents related to such activities and to promote the universal use of electronic transaction in the government and general public.
REPUBLIC ACT NO 8792 – ELECTRONIC COMMERCE ACT OF 2000
REPUBLIC ACT NO 8792 – ELECTRONIC COMMERCE ACT OF 2000
was approved when?
June 14, 2000
Fastest spreading e-mail worm ever surpassing the record of I LOVE YOU virus
2004 – MyDoom
WHO WAS THE FIRST FILIPINO CONVICTED OF CYBERCRIME?
JJ MARIA GINER
A cybercriminal is a person who conducts some form of illegal activity using computers or other digital technology such as the Internet.
cybercriminal
Types of Cybercriminals
The social engineer
The spear phisher
The hacker
The rouge employee
The ransom artist
It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.
The Social Engineer
attacks manipulate people into sharing information that they shouldn’t share, downloading software that they shouldn’t download, visiting websites they shouldn’t visit, sending money to criminals or making other mistakes that compromise their personal or organizational security.
Social engineering
Types of Social Engineering Attacks
Phishing
Spear phishing
Tailgating
Baiting
Scareware
Watering hole attack
is an attack that targets an individual, organization or business.
Spear Phishing
Is an individual who uses computer, networking or other skills to overcome a technical problem
The Hacker
Types of Hackers
White hats (blue hats)
Black hats
Gray hats
Green hats
Red hats
engage in legal hacking to improve digital security for those who contract them.
White hat hackers
are white hat hackers who are employed by an organization.
Their job is to maintain the cybersecurity of the organization and prevent attacks.
Blue Hat Hcakers
are cybercriminals who orchestrate scams and exploit vulnerabilities with the intent to cause harm. The aim of black hat hackers is usually to make money.
Black hat hackers
Hackers that fall between black and white hat hackers who have been sitting or changing ethics depending on the specific situation
Gray hats hackers
It is interchangeably referred to as script kiddies. They are both inexperienced and have little knowledge about hacking.
Green Hat Hackers
are mostly inspired to be white hat hackers or black hat hackers. While the script kiddies want to rely on the malicious software done by other hackers because they don’t have enough knowledge.
Green Hat Hackers
consider themselves the “superheroes” of the hacking community. They frequently target black hat hackers to disrupt or counter their attacks.
Red hat hackers
are people who hack into systems to fight back against perceived political or social injustice
Hacktivists
engages in harmful activities like data theft and intellectual property leakage. They steal valuable data or information.
rogue employee
They possess intimate knowledge of the organization’s procedures, systems, and sensitive data.
rogue employee
This type of cybercriminals use malicious software, or malware, that prevents you from accessing your computer files, systems, or networks.
A criminal group will then demand a ransom in exchange for decryption. The computer itself may become locked, or the data on it might be encrypted, stolen or deleted.
The Ransom Arist
is any software intentionally designed to disrupt a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive users of access to information, or which unknowingly interferes with the user’s computer security and privacy.
Malware (malicious software)
is a type of malware that encrypts a victim’s data where the attacker demands a “ransom”, or payment, to restore access to files and network. Typically, the victim receives a decryption key once payment is made to restore access to their files.
Ransomware
a type of malware that poses as legitimate code or software. Once inside the network, attackers can carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.
Trojan ( Trojan malware) ( Trojan Virus)
are tools that record what a person types on a device while there are legitimate and legal users for keyloggers, many uses for keyloggers are malicious.
Keyloggers (Keystroke Loggers)
A type of malware that can reproduce or self-replicate on its own without human interaction
Worm
Type of malware that enables the remote monitoring of a computer user’s activities or information on an individuals computer where the software has been installed.
Spyware
Networks of compromised computers or devices that under are the control of a malicious actor, often referred to as the “botmaster” or “bot herder” . These compromised devices called as “bots” or “zombies” are typically infected with malware that allows the botmaster to control them remotely without the knowledge or consent of their owners.
Botnet and Zombie (bots)
Type of cybercrime that uses email, SMS, phone, social media, and social engineering techniques to induce a victim to share sensitive information — such as passwords or account numbers — or to download a malicious file that will install viruses on their computer or phone.
Phishing
is a type of phishing attack that targets specific individuals or organizations typically through malicious emails. The goal of is to steal sensitive information such as login credentials or infect the targets’ device with malware.
Spear-phishing
attack is a type of social engineering attack specifically targeting senior or C-level executive employees with the purpose of stealing money or information, or gaining access to the person’s computer in order to execute further cyberattacks.
whaling
the act of sending fraudulent text messages designed to trick individuals into sharing sensitive data such as passwords, usernames and credit card numbers.
Smishing
a voice phishing attack, is the fraudulent use of phone calls and voice messages pretending to be from a reputable organization to convince individuals to reveal private information such as bank details and passwords.
Vishing
attacks
a malicious, targeted attack that floods a network with false requests to disrupt business operation
Denial-of-service (DoS)
also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver’s license numbers, to impersonate someone else. The stolen information can be used to run up debt purchasing credit, goods and services in the name of the victim or to provide the thief with false credentials.
Identity Theft
is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization.
It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, doxing, or blackmail. This online harassment, which is an extension of cyberbullying and in-person stalking, can take the form of e-mails, text messages, social media posts, and more and is often methodical, deliberate, and persistent.
Cyber Stalking
is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorized access to or control over computer network security systems for some illicit purpose.
Hacking
Is a higher form of hacking in which the unauthorized access culminates with the process of defeating the security system to acquire money or information and /or avail free services.
Cracking
The distribution, posting, trafficking, and disseminating of obscene material including children’s nude pictures, indecent exposure, and child sex slavery posted on the internet, live streaming videos aired through the internet
Child Pornography
Is a type of cybercrime that is used by attackers or hackers to commit financial crimes. Small amount of money is subtracted from the customer’s accounts and added to the account of the thief.
Salami Attack (embezzlement)
A malicious code intentionally inserted into the system of the target will be set off until the specified conditions are met.
Logic Bomb
An authorized modification of a website
Website Defacement
Is a collection of entities( hardware, software and liveware ) that are designed to receive, process, manage, and present information in a meaningful format.
COMPUTER SYSTEM
– These are physical parts/ intangible parts of a computer eg. Input devices, output devices, central processing units, and storage devices
Computer hardware
=- also known as programs or applications. They are classified into two classes namely - system software and application software
Computer software
- is the computer user. Also known as orgware or the humanware. The user commands the computer system to execute on instructions.
Liveware
, a French merchant and inventor invented a loom that uses punched wooden cards to automatically weave fabric designs. Early computers would use similar punch cards.
1801: Joseph Marie Jacquard
1821: English mathematician HE conceives of a steam-driven calculating machine that would be able to compute tables of numbers. Funded by the British government, the project, called the “Difference Engine” fails due to the lack of technology at the time
Charles Babbage
1853: Swedish inventor designed the world’s first printing calculator. The machine is significant for being the first to “compute tabular differences and print the results,” according to Uta C. Merzbach’s book, “Georg Scheutz and the First Printing Calculator” (Smithsonian Institution Press, 1977).
Per Georg Scheutz and his son Edvard
1937- THEY built the first electronic digital computer. It was called the Atanasoff-Berry Computer (ABC)
Dr. John V. Atanasoff and Clifford Berry
1943- for the military, an electronic computer namedwas built
Colossus
1946- the first digital computer was built.
The Electronic Numerical Integrator And Computer (ENIAC)
Physical and visible structure that houses the computer’s processor, memory, storage, communication ports and peripheral devices.
Hardware
These are the instructions that tell the computer what to do and how to do it. The two categories the operating system and application software
Software
, also known as main memory, is a computer component that stores data, programs, and instructions currently in use. It’s located on the motherboard, allowing fast reading and writing to primary storage and providing processors with speedier access to the data and instructions it holds. Primary storage temporarily stores data that is actively in use or being processed by the system.
Primary storage
A form of electronic computer memory that can be read and changed in any order, typically used to store working data and machine code. It is a temporary memory bank where your computer stores data it needs to retrieve quickly. keeps data easily accessible so your processor can quickly find it without having to go into long-term storage to complete immediate processing tasks.
Random Access Memory
Is a type of computer storage containing non-volatile, permanent data that, normally, can only be read, not written to. This means it receives data and permanently writes it on a chip, and it lasts even after you turn off your computer.
Read Only Memory
Also known as external memory
devices primarily refer to storage devices that serve as an addition to the computer’s primary storage, RAM and cache memory. Since they always consist of non-volatile memory, they allow the user to permanently store data on them.
Secondary Storage ( auxiliary devices)
AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES
REPUBLIC ACT NO. 10175
refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
Access
refers to the modification or change, in form or substance, of an existing computer data or program.
Alteration
refers to the transmission of information through ICT media, including voice, video and other forms of data
Computer
Communication
refers to a set of instructions executed by the computer to achieve intended results.
Computer program
refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system including a program suitable to cause a computer system to perform a function and includes electronic documents and/or electronic data messages whether stored in local computer systems or online.
Computer data
refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data.
Computer system
refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.
Cybersecurity
refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
Database
refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
Interception
refers to any computer data other than the content of the communication including, but not limited to, the communication’s origin, destination, route, time, date, size, duration, or type of underlying service.
Traffic data or non-content data
. – The access to the whole or any part of a computer system without right.
Illegal Access
. – The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
Illegal Interception
— The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
Data Interference.
. — The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses.
System Interference
. – Any person who willfully abets or aids in the commission of any of the offenses enumerated in this Act shall be held liable.
Aiding or Abetting in the Commission of Cybercrime
the unit of PNP responsible for the investigation of all cybercrimes and other crimes in which Information and Communications Technology (ICT) was used in the commission of criminal acts or the object of attack
PNP Anti-Cybercrime Group (ACG)
. — Any person who willfully attempts to commit any of the offenses enumerated in this Act shall be held liable.
Attempt in the Commission of Cybercrime
within the DOJ is designated as the Central Authority in all matters relating to international mutual assistance and extradition for cybercrime and cyber-related matters;
It also acts as the focal agency in formulating and implementing law enforcement investigation and prosecution strategies in curbing cybercrime and cyber-related offenses nationwide
OFFICE OF CYBERCRIME (OOC)
Law enforcement authorities, upon securing a court warrant, shall issue an order requiring any person or service provider to disclose or submit subscriber’s information, traffic data or relevant data in his/its possession or control within seventy-two (72) hours from receipt of the order in relation to a valid complaint officially docketed and assigned for investigation and the disclosure is necessary and relevant for the purpose of investigation.
Section 14. Disclosure of Computer Data.