Discussion 3 Flashcards

1
Q

a remote access program that allows hackers to control computer systems.

A

“Deep Throat,”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

originally referred to modifying technology for creative uses, but it has since become associated with cybercrime.

A

“hacking”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is an ever-growing threat, but awareness and good cybersecurity practices can help minimize risks.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is harmful software designed to damage, disrupt, or gain unauthorized access to a computer system.

A
  1. Malware (Malicious Software)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Allow hackers to bypass security and gain unauthorized access.
A

Backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Disguised as legitimate programs but execute hidden malicious functions.
A

Trojan Horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Self-replicating programs that corrupt files and disrupt system functionality.
A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Spread independently through networks, often causing widespread damage.
A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Malicious software hidden within seemingly harmless downloads.
A

Bundlers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • Overload systems to prevent legitimate access.
A

Denial of Service (DoS) Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • Infected devices controlled remotely to carry out large-scale attacks.
A

Botnets and Zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Monitors user activities and collects sensitive data without consent.
A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Record every keystroke to capture login credentials and personal details.
A

Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

-Analyze and intercept network traffic to steal confidential information.

A

Sniffers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cybercriminals often trick people into providing personal information through deception.

A
  1. Phishing and Social Engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Fraudulent emails impersonating legitimate entities to steal data.
A

Email Phishing

17
Q
  • Faking identities, emails, or websites to gain trust and extract sensitive details.
18
Q
  • Redirecting users to fake websites that collect login credentials.
19
Q
  • Malicious programs that alter web traffic to fraudulent sites.
A

Redirectors

20
Q
  • Scams promising large financial rewards in exchange for personal details or payments.
A

Advance-Fee Fraud (419 Scams)

21
Q
  • Fake browser windows that imitate real websites to steal information,
A

Floating Windows

22
Q

A panel of experts was formed to study transnational cybercrime and recommend legal actions.

A

Council of Europe (1985-1989):

23
Q

Adopted a resolution urging member states to ensure their legal systems could handle cybercrimes.

A

United Nations (1990):

24
Q

A UN agency that focuses on information and communication technology laws to combat cybercrime.

A

International Telecommunications Union (ITU):

25
Q

Issued recommendations and later initiated drafting an international treaty on cybercrime.

A

Council of Europe (1995 & 1997):

26
Q

Adopted in 2001 and came into force on July 1, 2004.

First international treaty aimed at addressing cybercrime by:

• Defining offenses such as fraud, copyright violations, child pornography, and breaches of network security.

Establishing legal procedures for investigating and prosecuting cybercrimes, including search and data interception.

• Promoting international cooperation in law enforcement.

A

The Convention on Cybercrime (Budapest Convention)

27
Q

Became the 57th country to join the Convention in 2018 after signing in 2016,

A

Philippines’ Participation:

28
Q

Role of the G7 in Cybercrime Prevention

The Group of 7 (G7) are?

A

Canada, France, Germany, Italy, Japan, the United Kingdom, and the United States.

29
Q

It plays a key role in creating policies and agreements to combat cybercrime.

A

Group 7
Canada, France, Germany, Italy, Japan, the United Kingdom, and the United States.

30
Q

was established to facilitate real-time international cooperation in cybercrime investigations.

A

The G7 24/7 High-Tech Crime Network

31
Q

Year created to preserve digital evidence for legal processes.

A

Created in 1997

32
Q

Operates in over 70 countries with designated contact points available 24/7 for assistance in:

Providing technical guidance.

Preserving electronic evidence.

Locating cybercriminals.

Exchanging legal information.

A

G7 24/7 High-Tech Crime

34
Q

the Department of Justice (DOJ) is designated as the main authority for international cooperation through Mutual Legal Assistance Treaty (MLAT) and extradition.

A

Under Republic Act No. 10175 (Cybercrime Prevention Act),