Discussion 1 Flashcards

1
Q

involves illegal activities conducted through digital devices or the internet. These acts can target individuals, organizations, or entire networks, and may include hacking, identity theff, fraud, or distributing harmful content. Unlike traditional crimes, cybercrimes often transcend physical borders, making them complex to investigate.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Offenses where technology is the primary tool (e.g., online scams, phishing).

A

Digital-Facilitated Crimes:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Crimes aimed at compromising systems or data (e.g., malware, ransomware).

A

Targeted Cyber attacks:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Devices holding evidence of unrelated crimes (e.g., messages planning a robbery).

A

Incidental Use:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Republic Act No. 10175

A

(Cybercrime Prevention Act of 2012),

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

emerged in the 1990s as internet use expanded globally. In response, the G8 nations formed a task force (later known as the Lyon Group) to address growing online criminal activities. This group highlighted how falling technology costs enabled new forms of transnational crime.

A

“cybercrime”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Examples: Hacking, Denial-of-Service (DoS) attacks, data breaches.

Goal: Disrupt or steal from a specific system.

A
  1. Target-Based Attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

• Examples: Identity theft, cyberstalking, financial fraud.

Goal: Use technology to enable traditional crimes.

A
  1. Tool-Based Crimes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

• Examples: Call logs proving a suspect’s location, browser history revealing motives.

Goal: Devices act as passive evidence repositories.

A
  1. Incidental Evidence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Perpetrators can operate from any location, complicating jurisdiction.

A

Borderless Nature:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Requires specialized skills to trace digital footprints.

A

Technical Complexity:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data can be easily altered or deleted if mishandled.

A

Evidence Fragility:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

notes that organized groups increasingly exploit these factors, making cybercrime a global security threat.

A

The United Nations Office on Drugs and Crime (UNODC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Secure devices to prevent data tarnpering.

A
  1. Preserve Evidence:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Extract clues from emails, logs, or financial records.

A
  1. Analyze Data:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Link digital evidence to suspects (e.g., IP addresses, transaction trails).

A
  1. Build Connections:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

is a virtual environment where individuals communicate, transact, and interact using interconnected digital devices. It is not a physical place but a network of computers, servers, and other devices linked through the internet. It is an indefinite, non-physical space where people interact and conduct transactions. It is the network of interconnected computers, routers, and switches that form the backbone of digital infrastructure. It is viewed as an interactional environment created by linking computers into a communication network.

A

Cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

is intangible and cannot be physically entered or exited like a traditional space.

A

cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

was first coined in 1984 by science fiction writer William Gibson. However, the concept predates this, as traditional electronic communications (e.g., telephones) also operated across time and space. The exponential growth of internet users has expanded cyberspace, providing cybercriminals with opportunities to commit crimes remotely and evade detection.

A

“cyberspace”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Perpetrators can hide their identities, making it harder for law enforcement to track them.

A

Anonymity:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Digital data can be easily altered, deleted, or lost, complicating investigations.

A

Ephemeral Evidence:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

refers to information stored, sent, or received by digital devices that can be used in legal cases. According to RA 10175 (Cybercrime Prevention Act of 2012), digital evidence includes data from computers, phones, and other electronic devices.

A

Digital evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is the scientific process of collecting, preserving, analyzing, and presenting digital evidence. It plays a crucial role in cybercrime investigations.

A

Digital Forensics: Uncovering the Truth

Digital forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The use of scientific methods to preserve, collect, validate, and analyze digital evidence for legal purposes.

A

Digital Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A branch of forensic science focused on investigating digital media to uncover evidence for court cases.

A

Digital Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The science of locating, extracting, and analyzing data from devices to serve as legal evidence.

A

Digital Forensics

27
Q
  • Using proven techniques to ensure accuracy.
A
  1. Scientific Methods
28
Q

Safeguarding evidence to prevent tampering.

A
  1. Collection and Preservation -
29
Q
  • Ensuring the integrity of the data.
A
  1. Validation
30
Q

Extracting meaningful insights from the evidence.

A
  1. Analysis and Interpretation:
31
Q

Preparing evidence for legal proceedings.

A
  1. Documentation and Presentation:
32
Q

Focuses on retrieving data from computers and storage devices.

A

Computer Forensics:

33
Q
  • Investigates how attackers access networks and what actions they take.

Examines log files, URLs accessed, and changes made to systems.

A
  1. Network Forensics
34
Q
  • Retrieves accidentally deleted or lost files, differing from forensics, which seeks hidden or deleted evidence for legal purposes.
A
  1. Data Recovery
35
Q
  • Investigators must analyze multiple devices (e.g., smartphones, tablets, cameras).
A

Complexity

36
Q
  • Requires specialized knowledge to handle diverse technologies..
A

Technical Skills

37
Q

-Large amounts of data must be sifted through to find relevant evidence.

A

Volume of Data

38
Q

Investigators must continuously update their skills to keep pace with new devices and software.

A

Evolving Technology:

39
Q

uncovering hidden data and piecing together evidence to reconstruct events.

They:

Identify and interview “digital witnesses” (e.g., registry keys, log files).

Analyze data to corroborate findings and tell the story of what happened.

Differentiate between inculpatory (incriminating) and exculpatory (clearing) evidence.

A

Digital investigators act as “digital archaeologists,”

40
Q

has evolved alongside technological advancements, often intertwined with organized crime and white-collar offenses. While pinpointing its exact origin is challenging, understanding its development helps us grasp its complexity and impact.

A

Cybercrime

42
Q

is a modern challenge that has evolved alongside technology. Unlike traditional crimes, cyber offenses often exploit digital tools for financial gain, power, or personal satisfaction. Cybercriminals can be motivated by a variety of factors, including greed, thrill-seeking, revenge, and the desire to access restricted information.

A

Cybercrime

43
Q
  • Gaining unauthorized access to computer systems.

.

44
Q

-Stealing personal information for fraud.

A

Identity Theft

45
Q
  • Deceptive practices to obtain money or sensitive data.
A

Online Fraud

46
Q

-Bullying or threatening individuals through digital platforms.

A

Cyber Harassment

47
Q
  • Stealing corporate or governmental secrets.
48
Q

vary in skill level, motivation, and the complexity of their attacks. They are generally classified into different groups based on their capabilities and objectives:

A

Cybercriminals

49
Q

These are inexperienced individuals who use pre-written hacking programs to attack systems. They lack deep technical knowledge but can still cause damage by exploiting known vulnerabilities.

A
  1. Script Kiddies -
50
Q

-A term sometimes used by law enforcement to describe individuals engaged in disruptive online activities. This group includes vandals who create viruses and malware for mischief rather than financial gain.

A
  1. Cyberpunks
51
Q

identify security flaws in systems, often out of curiosity or for ethical reasons (e.g., white-hat hackers).

A

• Hackers

52
Q

use their technical skills for illegal activities, such as stealing data or damaging systems.

53
Q
  • These are structured groups that operate with financial, political, or ideological goals. Their attacks range from financial fraud to large-scale data breaches.
A
  1. Cybercriminal Organizations
54
Q

These individuals or groups use hacking techniques to promote a political or social agenda. They often target government institutions, corporations, or influential figures to expose perceived injustices

A
  1. Hacktivists-
55
Q

Just as law enforcement interviews witnesses at a crime scene, digital investigators analyze digital artifacts to uncover the truth.

56
Q

-Disgruntled employees or individuals seek to harm an organization or person due to personal grievances.

57
Q
  • An insider may not initially intend to commit a crime but exploits a discovered vulnerability for personal gain.
A

Opportunity

58
Q

-The desire for financial gain drives many cybercriminals to commit fraud, data theft, or extortion.

59
Q

-Some attackers engage in cybercrime for the excitement and challenge of bypassing security measures.

A

Thrill-Seeking

60
Q
  • Cybercriminals may use their skills to manipulate or dominate others, similar to traditional bullying but in a digital environment.
A

Power and Control

61
Q

Cybercriminals, especially hacktivists and terrorist groups, use cyberattacks to spread propaganda, recruit members, disrupt government operations, or even cause fear through attacks on critical infrastructure.

A

Terrorism -

62
Q

states engage in cyberwarfare, espionage, and sabotage to gain strategic advantages over rival countries. This includes hacking government systems, influencing elections, and stealing sensitive data.

A

Geopolitics-Nation-

63
Q
  • Ethical hackers who help organizations improve cybersecurity.
A

White-Hat Hackers

64
Q
  • Criminal hackers who engage in illegal activities, such as data breaches and financial fraud.
A

Black-Hat Hackers

65
Q
  • Individuals who operate between ethical and unethical hacking, sometimes exposing vulnerabilities without permission.
A

Gray-Hat Hackers