Cybercrime and Social Engineering- Lesson 1 Flashcards
what is R.A. No. 10175?
The Cybercrime Prevention Act
Encompasses a wide range of criminal activities that are carried out using digital devices and/or networks.
Cybercrime
These crimes involve the use of technology to commit fraud, identity theft, data
breaches, computer viruses, scams, and expanded upon in other malicious acts.
Cybercrime
what is the guideline/ law that penalize acts like cybersex,
child pornography, identity theft
and unsolicited electronic
communication in the country?
R.A. No. 10175: The
Cybercrime Prevention
Act
sept. 12 2012
by President Benigno Aquino
is the art of exploiting human psychology, rather than
technical hacking techniques, to gain access to buildings, systems, or data.
Social Engineering
what lifecycle where the cybercriminal choose current event, identify potential targets and gather information about their targets?
Research
1st step
what lifecycle where the cybercriminal enagage targets using a fake but believable story to build a relationship to their victim?
Hook
2nd step
what lifecycle where the cybercriminal obtain personal information and convince target to send money?
Extract
3rd step
what lifecycle where the cybercriminal end the relationship or cover tracks?
Exit
4th/ final step
is the most common type of social engineering tactic. Emails that include links that install malware on your devices.
PHISHING
text based phishing?
Smishing
voice based phishing?
Vishing
occur
when hackers target a specific individual or organization.
Spear Phishing
is a term used to describe phishing attacks that target a specific, high-profile person. Usually, an executive, government official, or celebrity.
Whaling
occurs when someone creates a fake persona or misuses their actual
role. Establish trust using their title, then convince victims to give
them sensitive data.
Pretexting