40 Questions
What is a Denial of Service?
A flooded computer system with excessive traffic
What is the motive behind hacking for personal revenge?
Vendetta
What is the name of the worm created by Robert Tappan Morris in 1988?
Morris Worm
Who was captured in 1995 for hacking into NASA and military systems?
Kevin Mitnick
What is the term for promoting or advancing a political agenda through computer crimes?
Political activism
What is a virus in the context of computer crimes?
A self-propagating computer program
What is the primary motivation behind COMPUTER SYSTEM ATTACKS driven by PERSONAL GAIN/FAME/FUN?
Selfishness of individuals
What is the consequence of computer system attacks on individuals?
Individual reclusion
What is the name of the virus that was discovered in 1999?
Melissa virus
What is the term for the use of technology or online platforms to perpetrate hate speech, harassment, and discrimination?
HATE
What is the term for utilizing hacking techniques to cause fear, panic, or harm?
Cyber terrorism
What is an example of a devastating computer network attack that occurred in the year 2000?
Mel-lisa
What is the term for the illegal activities carried out to gather proprietary information?
Business and industrial espionage
What is the result of the 'I Love You' worm released in 2000?
Significant damage by overwriting files
What is the term for the breaking into a computer system using known security vulnerabilities?
Penetration
What is the entity involved in a computer crime that is the source of crime?
Criminal
What is the term for the use of hacking techniques and cyberattacks to promote a political or social cause?
Hacktivism
What is the primary goal of organized crime groups?
To engage in illegal activities for financial gain
What is the term for the ability to restrict the collection, use, and sale of confidential personal information?
Privacy
Who coined the term 'cyberspace'?
William Gibson
What is the primary purpose of a detection system deployed around a computer system or network?
To alert the owner of potential security breaches
What is the term for the rights given to persons over the creations of their minds?
Intellectual Property Rights
What is a major problem in cyberspace due to the rapid advances in computer and telecommunication technology?
Anonymity
What is the term for the process of investigating and analyzing cybercrime evidence?
Cyberspace Forensics
What is the main focus of DepEd Memo no. 94 s. 2016?
Online child protection and prevention of online child abuse
What type of cyberbullying involves posting insults and profanity online?
Flaming
What is the approach that involves promoting education and awareness programs for digital citizenship and online safety?
Awareness
What is the area of society most affected by cyberbullying?
School
What type of cyberbullying involves creating a fake profile?
Masquerading
What approach deals with enacting policies, statues, and laws with corresponding enforcement to prevent cyberbullying?
Legislations
What type of cyberbullying involves intentionally leaving someone out?
Exclusion
What is the approach that involves including cyberbullying public awareness activities in community public activities?
Community Support
What is a patent?
A license that gives the holder exclusive rights to a process, design, or new invention for a designated period of time
What is the primary focus of RA 10175 (Cybercrime Prevention Act of 2012)?
Combating cybercrimes, including offenses such as hacking, identity theft, and online fraud
What is cyberbullying?
The use of communication technologies to support deliberate, repeated, and hostile behavior
What is the main goal of RA 10173 (Data Privacy Act of 2012)?
To protect the privacy of individuals' personal information
What is cyberstalking?
Stalking or harassment carried out over the internet
What is the role of the Department of Education (DepEd) in addressing cyberbullying?
To issue policies and guidelines to address bullying, which can extend to cyberbullying incidents
What is cyber harassment?
To harass someone continuously and persistently over the internet
What is the main goal of RA 10627 (Anti-Bullying Act of 2013)?
To address bullying in educational institutions, including cyberbullying
Study Notes
Computer Crimes
- Denial of Service (DoS) attack: flooding a computer system with excessive traffic
- Sources of computer crimes:
- Virus (self-propagating computer program)
- Hacking (attempt to exploit a computer system)
- The era of Viruses and Hacking (1980s-1990s):
- Rise of computer viruses
- Notorious Morris Worm (1988) and hacking of NASA and military systems by Kevin Mitnick (1995)
Motives of Computer Crimes
- Political Activism: promoting or advancing a political agenda
- Vendetta: personal revenge
- Joke/Hoax: spreading false warnings or scare alerts
- Hacker Ethics: a collection of motives that make up the hacker character
- Terrorism: using hacking techniques to cause fear, panic, or harm
- Political and Military Espionage: covert activities to gather proprietary information
- Business and Industrial Espionage: illegal activities to gather proprietary information
- Hate: using technology to perpetuate hate speech, harassment, or discrimination
- Personal Gain/Fame/Fun: selfish motives driving individuals to commit computer crimes
Computer System Attacks
- Penetration Attack: breaking into a computer system using known security vulnerabilities
- Insider Threats: in-house employees compromising security
- Hackers: penetrating a computer system for various reasons
- Criminal Groups: organized associations engaging in illegal activities for financial gain
- Hacktivism: using hacking techniques and cyberattacks to promote or advance political or social causes
Social and Ethical Consequences
- Psychological Effects: individual reclusion
- Moral Decay: erosion of moral values
- Loss of Privacy: invasion of privacy
- Trust: loss of trust in individuals or systems
Entities Involved in a Computer Crime
- Computer: tool used to commit crimes
- Criminal: source of crime
- Victim: innocent victim of the crime
Cyberspace and Related Concepts
- Cyberspace: a global artificial reality environment based on interconnected computer networks
- Telepresence: a feeling of being in a location other than one's actual location
- Cyberethics: moral rules or code of behavior applied to the online environment
- Intellectual Property Rights: rights given to persons over creations of their minds
Cyberspace Problems
- Anonymity: rapid advances in computer and telecommunication technology
- Internet Paradox: conflicting ideas and muddle in the online environment
- Browsing Rights: nature of cyberspace requires Web site materials and user control
- Lack of Control over Cyberspace Services: difficulty in knowing who will use services and how they will be used
- Distributed Liability: unclear responsibility for online activities
IPR in Cyberspace
- Copyright: protects original works of authorship
- Patent: exclusive rights to a process, design, or new invention
- Trade Secrets: confidential information that may be sold or licensed
- Trademark: distinctive sign or symbol
- Personal Identity: ability to control the use of personal information and attributes
Cyberbullying
- Actions that use information and communication technologies to support deliberate, repeated, and hostile behavior
- Types of Cyberbullying:
- Harassment: sustained and constant pattern of hurtful or threatening online messages
- Exclusion: deliberately leaving someone out
- Flaming: posting insults and profanity online
- Outing: unwanted and uncalled for online display
- Masquerading: creating a fake profile to bully others
Approaches in Dealing with Cyberbullying
- Awareness: promoting education and awareness programs on digital citizenship, online safety, and responsible internet use
- Legislations: laws and policies with corresponding enforcement to prevent cyberbullying
- Community Support: public awareness activities and community programs to address cyberbullying
This quiz covers the basics of computer crime, including types of cyber attacks and illegal activities. Learn about denial of service, viruses, and more.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free