Discussion 3 Flashcards
a remote access program that allows hackers to control computer systems.
“Deep Throat,”
originally referred to modifying technology for creative uses, but it has since become associated with cybercrime.
“hacking”
is an ever-growing threat, but awareness and good cybersecurity practices can help minimize risks.
Cybercrime
is harmful software designed to damage, disrupt, or gain unauthorized access to a computer system.
- Malware (Malicious Software)
- Allow hackers to bypass security and gain unauthorized access.
Backdoors
- Disguised as legitimate programs but execute hidden malicious functions.
Trojan Horses
- Self-replicating programs that corrupt files and disrupt system functionality.
Viruses
- Spread independently through networks, often causing widespread damage.
Worms
- Malicious software hidden within seemingly harmless downloads.
Bundlers
- Overload systems to prevent legitimate access.
Denial of Service (DoS) Attacks
- Infected devices controlled remotely to carry out large-scale attacks.
Botnets and Zombies
- Monitors user activities and collects sensitive data without consent.
Spyware
- Record every keystroke to capture login credentials and personal details.
Keyloggers
-Analyze and intercept network traffic to steal confidential information.
Sniffers
Cybercriminals often trick people into providing personal information through deception.
- Phishing and Social Engineering
- Fraudulent emails impersonating legitimate entities to steal data.
Email Phishing
- Faking identities, emails, or websites to gain trust and extract sensitive details.
Spoofing
- Redirecting users to fake websites that collect login credentials.
Pharming
- Malicious programs that alter web traffic to fraudulent sites.
Redirectors
- Scams promising large financial rewards in exchange for personal details or payments.
Advance-Fee Fraud (419 Scams)
- Fake browser windows that imitate real websites to steal information,
Floating Windows
A panel of experts was formed to study transnational cybercrime and recommend legal actions.
Council of Europe (1985-1989):
Adopted a resolution urging member states to ensure their legal systems could handle cybercrimes.
United Nations (1990):
A UN agency that focuses on information and communication technology laws to combat cybercrime.
International Telecommunications Union (ITU):
Issued recommendations and later initiated drafting an international treaty on cybercrime.
Council of Europe (1995 & 1997):
Adopted in 2001 and came into force on July 1, 2004.
First international treaty aimed at addressing cybercrime by:
• Defining offenses such as fraud, copyright violations, child pornography, and breaches of network security.
Establishing legal procedures for investigating and prosecuting cybercrimes, including search and data interception.
• Promoting international cooperation in law enforcement.
The Convention on Cybercrime (Budapest Convention)
Became the 57th country to join the Convention in 2018 after signing in 2016,
Philippines’ Participation:
Role of the G7 in Cybercrime Prevention
The Group of 7 (G7) are?
Canada, France, Germany, Italy, Japan, the United Kingdom, and the United States.
It plays a key role in creating policies and agreements to combat cybercrime.
Group 7
Canada, France, Germany, Italy, Japan, the United Kingdom, and the United States.
was established to facilitate real-time international cooperation in cybercrime investigations.
The G7 24/7 High-Tech Crime Network
Year created to preserve digital evidence for legal processes.
Created in 1997
Operates in over 70 countries with designated contact points available 24/7 for assistance in:
Providing technical guidance.
Preserving electronic evidence.
Locating cybercriminals.
Exchanging legal information.
G7 24/7 High-Tech Crime
the Department of Justice (DOJ) is designated as the main authority for international cooperation through Mutual Legal Assistance Treaty (MLAT) and extradition.
Under Republic Act No. 10175 (Cybercrime Prevention Act),