Computer Crime and Cybersecurity
40 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a Denial of Service?

  • A flooded computer system with excessive traffic (correct)
  • A type of virus
  • A form of personal revenge
  • A hacking attempt to exploit a computer system
  • What is the motive behind hacking for personal revenge?

  • Vendetta (correct)
  • Terrorism
  • Political and military espionage
  • Political activism
  • What is the name of the worm created by Robert Tappan Morris in 1988?

  • Morris Worm (correct)
  • NASA Worm
  • Melissa virus
  • Mitnick Worm
  • Who was captured in 1995 for hacking into NASA and military systems?

    <p>Kevin Mitnick</p> Signup and view all the answers

    What is the term for promoting or advancing a political agenda through computer crimes?

    <p>Political activism</p> Signup and view all the answers

    What is a virus in the context of computer crimes?

    <p>A self-propagating computer program</p> Signup and view all the answers

    What is the primary motivation behind COMPUTER SYSTEM ATTACKS driven by PERSONAL GAIN/FAME/FUN?

    <p>Selfishness of individuals</p> Signup and view all the answers

    What is the consequence of computer system attacks on individuals?

    <p>Individual reclusion</p> Signup and view all the answers

    What is the name of the virus that was discovered in 1999?

    <p>Melissa virus</p> Signup and view all the answers

    What is the term for the use of technology or online platforms to perpetrate hate speech, harassment, and discrimination?

    <p>HATE</p> Signup and view all the answers

    What is the term for utilizing hacking techniques to cause fear, panic, or harm?

    <p>Cyber terrorism</p> Signup and view all the answers

    What is an example of a devastating computer network attack that occurred in the year 2000?

    <p>Mel-lisa</p> Signup and view all the answers

    What is the term for the illegal activities carried out to gather proprietary information?

    <p>Business and industrial espionage</p> Signup and view all the answers

    What is the result of the 'I Love You' worm released in 2000?

    <p>Significant damage by overwriting files</p> Signup and view all the answers

    What is the term for the breaking into a computer system using known security vulnerabilities?

    <p>Penetration</p> Signup and view all the answers

    What is the entity involved in a computer crime that is the source of crime?

    <p>Criminal</p> Signup and view all the answers

    What is the term for the use of hacking techniques and cyberattacks to promote a political or social cause?

    <p>Hacktivism</p> Signup and view all the answers

    What is the primary goal of organized crime groups?

    <p>To engage in illegal activities for financial gain</p> Signup and view all the answers

    What is the term for the ability to restrict the collection, use, and sale of confidential personal information?

    <p>Privacy</p> Signup and view all the answers

    Who coined the term 'cyberspace'?

    <p>William Gibson</p> Signup and view all the answers

    What is the primary purpose of a detection system deployed around a computer system or network?

    <p>To alert the owner of potential security breaches</p> Signup and view all the answers

    What is the term for the rights given to persons over the creations of their minds?

    <p>Intellectual Property Rights</p> Signup and view all the answers

    What is a major problem in cyberspace due to the rapid advances in computer and telecommunication technology?

    <p>Anonymity</p> Signup and view all the answers

    What is the term for the process of investigating and analyzing cybercrime evidence?

    <p>Cyberspace Forensics</p> Signup and view all the answers

    What is the main focus of DepEd Memo no. 94 s. 2016?

    <p>Online child protection and prevention of online child abuse</p> Signup and view all the answers

    What type of cyberbullying involves posting insults and profanity online?

    <p>Flaming</p> Signup and view all the answers

    What is the approach that involves promoting education and awareness programs for digital citizenship and online safety?

    <p>Awareness</p> Signup and view all the answers

    What is the area of society most affected by cyberbullying?

    <p>School</p> Signup and view all the answers

    What type of cyberbullying involves creating a fake profile?

    <p>Masquerading</p> Signup and view all the answers

    What approach deals with enacting policies, statues, and laws with corresponding enforcement to prevent cyberbullying?

    <p>Legislations</p> Signup and view all the answers

    What type of cyberbullying involves intentionally leaving someone out?

    <p>Exclusion</p> Signup and view all the answers

    What is the approach that involves including cyberbullying public awareness activities in community public activities?

    <p>Community Support</p> Signup and view all the answers

    What is a patent?

    <p>A license that gives the holder exclusive rights to a process, design, or new invention for a designated period of time</p> Signup and view all the answers

    What is the primary focus of RA 10175 (Cybercrime Prevention Act of 2012)?

    <p>Combating cybercrimes, including offenses such as hacking, identity theft, and online fraud</p> Signup and view all the answers

    What is cyberbullying?

    <p>The use of communication technologies to support deliberate, repeated, and hostile behavior</p> Signup and view all the answers

    What is the main goal of RA 10173 (Data Privacy Act of 2012)?

    <p>To protect the privacy of individuals' personal information</p> Signup and view all the answers

    What is cyberstalking?

    <p>Stalking or harassment carried out over the internet</p> Signup and view all the answers

    What is the role of the Department of Education (DepEd) in addressing cyberbullying?

    <p>To issue policies and guidelines to address bullying, which can extend to cyberbullying incidents</p> Signup and view all the answers

    What is cyber harassment?

    <p>To harass someone continuously and persistently over the internet</p> Signup and view all the answers

    What is the main goal of RA 10627 (Anti-Bullying Act of 2013)?

    <p>To address bullying in educational institutions, including cyberbullying</p> Signup and view all the answers

    Study Notes

    Computer Crimes

    • Denial of Service (DoS) attack: flooding a computer system with excessive traffic
    • Sources of computer crimes:
    • Virus (self-propagating computer program)
    • Hacking (attempt to exploit a computer system)
    • The era of Viruses and Hacking (1980s-1990s):
    • Rise of computer viruses
    • Notorious Morris Worm (1988) and hacking of NASA and military systems by Kevin Mitnick (1995)

    Motives of Computer Crimes

    • Political Activism: promoting or advancing a political agenda
    • Vendetta: personal revenge
    • Joke/Hoax: spreading false warnings or scare alerts
    • Hacker Ethics: a collection of motives that make up the hacker character
    • Terrorism: using hacking techniques to cause fear, panic, or harm
    • Political and Military Espionage: covert activities to gather proprietary information
    • Business and Industrial Espionage: illegal activities to gather proprietary information
    • Hate: using technology to perpetuate hate speech, harassment, or discrimination
    • Personal Gain/Fame/Fun: selfish motives driving individuals to commit computer crimes

    Computer System Attacks

    • Penetration Attack: breaking into a computer system using known security vulnerabilities
    • Insider Threats: in-house employees compromising security
    • Hackers: penetrating a computer system for various reasons
    • Criminal Groups: organized associations engaging in illegal activities for financial gain
    • Hacktivism: using hacking techniques and cyberattacks to promote or advance political or social causes

    Social and Ethical Consequences

    • Psychological Effects: individual reclusion
    • Moral Decay: erosion of moral values
    • Loss of Privacy: invasion of privacy
    • Trust: loss of trust in individuals or systems

    Entities Involved in a Computer Crime

    • Computer: tool used to commit crimes
    • Criminal: source of crime
    • Victim: innocent victim of the crime
    • Cyberspace: a global artificial reality environment based on interconnected computer networks
    • Telepresence: a feeling of being in a location other than one's actual location
    • Cyberethics: moral rules or code of behavior applied to the online environment
    • Intellectual Property Rights: rights given to persons over creations of their minds

    Cyberspace Problems

    • Anonymity: rapid advances in computer and telecommunication technology
    • Internet Paradox: conflicting ideas and muddle in the online environment
    • Browsing Rights: nature of cyberspace requires Web site materials and user control
    • Lack of Control over Cyberspace Services: difficulty in knowing who will use services and how they will be used
    • Distributed Liability: unclear responsibility for online activities

    IPR in Cyberspace

    • Copyright: protects original works of authorship
    • Patent: exclusive rights to a process, design, or new invention
    • Trade Secrets: confidential information that may be sold or licensed
    • Trademark: distinctive sign or symbol
    • Personal Identity: ability to control the use of personal information and attributes

    Cyberbullying

    • Actions that use information and communication technologies to support deliberate, repeated, and hostile behavior
    • Types of Cyberbullying:
    • Harassment: sustained and constant pattern of hurtful or threatening online messages
    • Exclusion: deliberately leaving someone out
    • Flaming: posting insults and profanity online
    • Outing: unwanted and uncalled for online display
    • Masquerading: creating a fake profile to bully others

    Approaches in Dealing with Cyberbullying

    • Awareness: promoting education and awareness programs on digital citizenship, online safety, and responsible internet use
    • Legislations: laws and policies with corresponding enforcement to prevent cyberbullying
    • Community Support: public awareness activities and community programs to address cyberbullying

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers the basics of computer crime, including types of cyber attacks and illegal activities. Learn about denial of service, viruses, and more.

    More Like This

    Hackers: White Hat, Grey Hat, Black Hat
    20 questions
    Computer Crime and Notable Cyber Attacks
    40 questions

    Computer Crime and Notable Cyber Attacks

    PermissibleTropicalRainforest avatar
    PermissibleTropicalRainforest
    Use Quizgecko on...
    Browser
    Browser