CYBERCRIME Flashcards
Also known as computer crime, high-tech crime, internet crime, digital crime, technological crime, electronic crime
CYBERCRIME
Any crime accomplished through special knowledge of computer technology
CYBERCRIME
Any crime where computer is used as a tool or a target to the commission of the crime
Any criminal activities that take place within or by utilizing networks of electronic communication such as the internet
CYBERCRIME
It is the interconnection of many computers like personal computers, mobile phones, tablets, etc. through the internet
Cyberspace
is the type of community - a giant neighborhood made up of networked computer users around the world - then it is natural that many elements of a traditional society can be seen as bitts and bytes.
Cyberspace
Attackers stole financial market information by accessing the French telegraph system
1834- the first cyber attack in the world happened in France
Allen Scherr launched a cyber attack against the MIT computer networks, stealing passwords from their database via punch card
1962- The modern history of cybercrime began
Criminals broke the telephone network of tone frequencies to make free calls to a long-distance
1970- Phreaking
1971- The Creeper Program
A program created by ——designed as a security test if the self-replicating program was possible
Bob Thomas
Ray Tomlinson created the Reaper, the first anti-virus software to delete the creeper.
1972- The Reaper
WHO CREATED THE REAPER
Ray Tomlinson
The first virus on a computer.
1974- Rabbit Virus
1981- The First Cybercrime Conviction
Ian Murphy “ Captain Zap”
The first major cyber attack on the internet came courtesy of Cornell grad student Robert Morris
1988- The Morris Worm
“father of Ransomware
Joseph Popp
Created by David L. Smith
virus, It was a mass-mailing macro virus that targeted Microsoft Word- and Outlook-based systems.
1999- Melissa Worm
Created by Onel De Guzman
The email was received in inboxes in Hong Kong in 2000 with the subject “ I LOV YOU” and an attachment “ LOVE-LETTER-FOR-YOU. TXT.vbs”
2000- The Love Bug
It erases or blurred the computer data and gets the contacts on the computer and sends the same email to all contact to the directory. When it was opened, it duplicate and did like previously
2000- The Love Bug
This Act aims to facilitate domestic and international dealings, transactions, arrangements agreements, contracts and exchanges and storage of information through the utilization of electronic, optical and similar medium, mode, instrumentality and technology to recognize the authenticity and reliability of electronic documents related to such activities and to promote the universal use of electronic transaction in the government and general public.
REPUBLIC ACT NO 8792 – ELECTRONIC COMMERCE ACT OF 2000
REPUBLIC ACT NO 8792 – ELECTRONIC COMMERCE ACT OF 2000
was approved when?
June 14, 2000
Fastest spreading e-mail worm ever surpassing the record of I LOVE YOU virus
2004 – MyDoom
WHO WAS THE FIRST FILIPINO CONVICTED OF CYBERCRIME?
JJ MARIA GINER
A cybercriminal is a person who conducts some form of illegal activity using computers or other digital technology such as the Internet.
cybercriminal
Types of Cybercriminals
The social engineer
The spear phisher
The hacker
The rouge employee
The ransom artist
It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.
The Social Engineer
attacks manipulate people into sharing information that they shouldn’t share, downloading software that they shouldn’t download, visiting websites they shouldn’t visit, sending money to criminals or making other mistakes that compromise their personal or organizational security.
Social engineering
Types of Social Engineering Attacks
Phishing
Spear phishing
Tailgating
Baiting
Scareware
Watering hole attack
is an attack that targets an individual, organization or business.
Spear Phishing
Is an individual who uses computer, networking or other skills to overcome a technical problem
The Hacker
Types of Hackers
White hats (blue hats)
Black hats
Gray hats
Green hats
Red hats
engage in legal hacking to improve digital security for those who contract them.
White hat hackers
are white hat hackers who are employed by an organization.
Their job is to maintain the cybersecurity of the organization and prevent attacks.
Blue Hat Hcakers
are cybercriminals who orchestrate scams and exploit vulnerabilities with the intent to cause harm. The aim of black hat hackers is usually to make money.
Black hat hackers
Hackers that fall between black and white hat hackers who have been sitting or changing ethics depending on the specific situation
Gray hats hackers
It is interchangeably referred to as script kiddies. They are both inexperienced and have little knowledge about hacking.
Green Hat Hackers
are mostly inspired to be white hat hackers or black hat hackers. While the script kiddies want to rely on the malicious software done by other hackers because they don’t have enough knowledge.
Green Hat Hackers
consider themselves the “superheroes” of the hacking community. They frequently target black hat hackers to disrupt or counter their attacks.
Red hat hackers
are people who hack into systems to fight back against perceived political or social injustice
Hacktivists
engages in harmful activities like data theft and intellectual property leakage. They steal valuable data or information.
rogue employee