Computer Crime and Cybersecurity

FluentStrait avatar
FluentStrait
·
·
Download

Start Quiz

Study Flashcards

40 Questions

What is a Denial of Service?

A flooded computer system with excessive traffic

What is the motive behind hacking for personal revenge?

Vendetta

What is the name of the worm created by Robert Tappan Morris in 1988?

Morris Worm

Who was captured in 1995 for hacking into NASA and military systems?

Kevin Mitnick

What is the term for promoting or advancing a political agenda through computer crimes?

Political activism

What is a virus in the context of computer crimes?

A self-propagating computer program

What is the primary motivation behind COMPUTER SYSTEM ATTACKS driven by PERSONAL GAIN/FAME/FUN?

Selfishness of individuals

What is the consequence of computer system attacks on individuals?

Individual reclusion

What is the name of the virus that was discovered in 1999?

Melissa virus

What is the term for the use of technology or online platforms to perpetrate hate speech, harassment, and discrimination?

HATE

What is the term for utilizing hacking techniques to cause fear, panic, or harm?

Cyber terrorism

What is an example of a devastating computer network attack that occurred in the year 2000?

Mel-lisa

What is the term for the illegal activities carried out to gather proprietary information?

Business and industrial espionage

What is the result of the 'I Love You' worm released in 2000?

Significant damage by overwriting files

What is the term for the breaking into a computer system using known security vulnerabilities?

Penetration

What is the entity involved in a computer crime that is the source of crime?

Criminal

What is the term for the use of hacking techniques and cyberattacks to promote a political or social cause?

Hacktivism

What is the primary goal of organized crime groups?

To engage in illegal activities for financial gain

What is the term for the ability to restrict the collection, use, and sale of confidential personal information?

Privacy

Who coined the term 'cyberspace'?

William Gibson

What is the primary purpose of a detection system deployed around a computer system or network?

To alert the owner of potential security breaches

What is the term for the rights given to persons over the creations of their minds?

Intellectual Property Rights

What is a major problem in cyberspace due to the rapid advances in computer and telecommunication technology?

Anonymity

What is the term for the process of investigating and analyzing cybercrime evidence?

Cyberspace Forensics

What is the main focus of DepEd Memo no. 94 s. 2016?

Online child protection and prevention of online child abuse

What type of cyberbullying involves posting insults and profanity online?

Flaming

What is the approach that involves promoting education and awareness programs for digital citizenship and online safety?

Awareness

What is the area of society most affected by cyberbullying?

School

What type of cyberbullying involves creating a fake profile?

Masquerading

What approach deals with enacting policies, statues, and laws with corresponding enforcement to prevent cyberbullying?

Legislations

What type of cyberbullying involves intentionally leaving someone out?

Exclusion

What is the approach that involves including cyberbullying public awareness activities in community public activities?

Community Support

What is a patent?

A license that gives the holder exclusive rights to a process, design, or new invention for a designated period of time

What is the primary focus of RA 10175 (Cybercrime Prevention Act of 2012)?

Combating cybercrimes, including offenses such as hacking, identity theft, and online fraud

What is cyberbullying?

The use of communication technologies to support deliberate, repeated, and hostile behavior

What is the main goal of RA 10173 (Data Privacy Act of 2012)?

To protect the privacy of individuals' personal information

What is cyberstalking?

Stalking or harassment carried out over the internet

What is the role of the Department of Education (DepEd) in addressing cyberbullying?

To issue policies and guidelines to address bullying, which can extend to cyberbullying incidents

What is cyber harassment?

To harass someone continuously and persistently over the internet

What is the main goal of RA 10627 (Anti-Bullying Act of 2013)?

To address bullying in educational institutions, including cyberbullying

Study Notes

Computer Crimes

  • Denial of Service (DoS) attack: flooding a computer system with excessive traffic
  • Sources of computer crimes:
  • Virus (self-propagating computer program)
  • Hacking (attempt to exploit a computer system)
  • The era of Viruses and Hacking (1980s-1990s):
  • Rise of computer viruses
  • Notorious Morris Worm (1988) and hacking of NASA and military systems by Kevin Mitnick (1995)

Motives of Computer Crimes

  • Political Activism: promoting or advancing a political agenda
  • Vendetta: personal revenge
  • Joke/Hoax: spreading false warnings or scare alerts
  • Hacker Ethics: a collection of motives that make up the hacker character
  • Terrorism: using hacking techniques to cause fear, panic, or harm
  • Political and Military Espionage: covert activities to gather proprietary information
  • Business and Industrial Espionage: illegal activities to gather proprietary information
  • Hate: using technology to perpetuate hate speech, harassment, or discrimination
  • Personal Gain/Fame/Fun: selfish motives driving individuals to commit computer crimes

Computer System Attacks

  • Penetration Attack: breaking into a computer system using known security vulnerabilities
  • Insider Threats: in-house employees compromising security
  • Hackers: penetrating a computer system for various reasons
  • Criminal Groups: organized associations engaging in illegal activities for financial gain
  • Hacktivism: using hacking techniques and cyberattacks to promote or advance political or social causes

Social and Ethical Consequences

  • Psychological Effects: individual reclusion
  • Moral Decay: erosion of moral values
  • Loss of Privacy: invasion of privacy
  • Trust: loss of trust in individuals or systems

Entities Involved in a Computer Crime

  • Computer: tool used to commit crimes
  • Criminal: source of crime
  • Victim: innocent victim of the crime
  • Cyberspace: a global artificial reality environment based on interconnected computer networks
  • Telepresence: a feeling of being in a location other than one's actual location
  • Cyberethics: moral rules or code of behavior applied to the online environment
  • Intellectual Property Rights: rights given to persons over creations of their minds

Cyberspace Problems

  • Anonymity: rapid advances in computer and telecommunication technology
  • Internet Paradox: conflicting ideas and muddle in the online environment
  • Browsing Rights: nature of cyberspace requires Web site materials and user control
  • Lack of Control over Cyberspace Services: difficulty in knowing who will use services and how they will be used
  • Distributed Liability: unclear responsibility for online activities

IPR in Cyberspace

  • Copyright: protects original works of authorship
  • Patent: exclusive rights to a process, design, or new invention
  • Trade Secrets: confidential information that may be sold or licensed
  • Trademark: distinctive sign or symbol
  • Personal Identity: ability to control the use of personal information and attributes

Cyberbullying

  • Actions that use information and communication technologies to support deliberate, repeated, and hostile behavior
  • Types of Cyberbullying:
  • Harassment: sustained and constant pattern of hurtful or threatening online messages
  • Exclusion: deliberately leaving someone out
  • Flaming: posting insults and profanity online
  • Outing: unwanted and uncalled for online display
  • Masquerading: creating a fake profile to bully others

Approaches in Dealing with Cyberbullying

  • Awareness: promoting education and awareness programs on digital citizenship, online safety, and responsible internet use
  • Legislations: laws and policies with corresponding enforcement to prevent cyberbullying
  • Community Support: public awareness activities and community programs to address cyberbullying

This quiz covers the basics of computer crime, including types of cyber attacks and illegal activities. Learn about denial of service, viruses, and more.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Computer Forensics and Incident Response
10 questions
Cybercrime and Cybercrime Laws Quiz
5 questions
Hackers: White Hat, Grey Hat, Black Hat
20 questions
Online Crime and Cybersecurity
10 questions
Use Quizgecko on...
Browser
Browser