Podcast
Questions and Answers
What is a Denial of Service?
What is a Denial of Service?
What is the motive behind hacking for personal revenge?
What is the motive behind hacking for personal revenge?
What is the name of the worm created by Robert Tappan Morris in 1988?
What is the name of the worm created by Robert Tappan Morris in 1988?
Who was captured in 1995 for hacking into NASA and military systems?
Who was captured in 1995 for hacking into NASA and military systems?
Signup and view all the answers
What is the term for promoting or advancing a political agenda through computer crimes?
What is the term for promoting or advancing a political agenda through computer crimes?
Signup and view all the answers
What is a virus in the context of computer crimes?
What is a virus in the context of computer crimes?
Signup and view all the answers
What is the primary motivation behind COMPUTER SYSTEM ATTACKS driven by PERSONAL GAIN/FAME/FUN?
What is the primary motivation behind COMPUTER SYSTEM ATTACKS driven by PERSONAL GAIN/FAME/FUN?
Signup and view all the answers
What is the consequence of computer system attacks on individuals?
What is the consequence of computer system attacks on individuals?
Signup and view all the answers
What is the name of the virus that was discovered in 1999?
What is the name of the virus that was discovered in 1999?
Signup and view all the answers
What is the term for the use of technology or online platforms to perpetrate hate speech, harassment, and discrimination?
What is the term for the use of technology or online platforms to perpetrate hate speech, harassment, and discrimination?
Signup and view all the answers
What is the term for utilizing hacking techniques to cause fear, panic, or harm?
What is the term for utilizing hacking techniques to cause fear, panic, or harm?
Signup and view all the answers
What is an example of a devastating computer network attack that occurred in the year 2000?
What is an example of a devastating computer network attack that occurred in the year 2000?
Signup and view all the answers
What is the term for the illegal activities carried out to gather proprietary information?
What is the term for the illegal activities carried out to gather proprietary information?
Signup and view all the answers
What is the result of the 'I Love You' worm released in 2000?
What is the result of the 'I Love You' worm released in 2000?
Signup and view all the answers
What is the term for the breaking into a computer system using known security vulnerabilities?
What is the term for the breaking into a computer system using known security vulnerabilities?
Signup and view all the answers
What is the entity involved in a computer crime that is the source of crime?
What is the entity involved in a computer crime that is the source of crime?
Signup and view all the answers
What is the term for the use of hacking techniques and cyberattacks to promote a political or social cause?
What is the term for the use of hacking techniques and cyberattacks to promote a political or social cause?
Signup and view all the answers
What is the primary goal of organized crime groups?
What is the primary goal of organized crime groups?
Signup and view all the answers
What is the term for the ability to restrict the collection, use, and sale of confidential personal information?
What is the term for the ability to restrict the collection, use, and sale of confidential personal information?
Signup and view all the answers
Who coined the term 'cyberspace'?
Who coined the term 'cyberspace'?
Signup and view all the answers
What is the primary purpose of a detection system deployed around a computer system or network?
What is the primary purpose of a detection system deployed around a computer system or network?
Signup and view all the answers
What is the term for the rights given to persons over the creations of their minds?
What is the term for the rights given to persons over the creations of their minds?
Signup and view all the answers
What is a major problem in cyberspace due to the rapid advances in computer and telecommunication technology?
What is a major problem in cyberspace due to the rapid advances in computer and telecommunication technology?
Signup and view all the answers
What is the term for the process of investigating and analyzing cybercrime evidence?
What is the term for the process of investigating and analyzing cybercrime evidence?
Signup and view all the answers
What is the main focus of DepEd Memo no. 94 s. 2016?
What is the main focus of DepEd Memo no. 94 s. 2016?
Signup and view all the answers
What type of cyberbullying involves posting insults and profanity online?
What type of cyberbullying involves posting insults and profanity online?
Signup and view all the answers
What is the approach that involves promoting education and awareness programs for digital citizenship and online safety?
What is the approach that involves promoting education and awareness programs for digital citizenship and online safety?
Signup and view all the answers
What is the area of society most affected by cyberbullying?
What is the area of society most affected by cyberbullying?
Signup and view all the answers
What type of cyberbullying involves creating a fake profile?
What type of cyberbullying involves creating a fake profile?
Signup and view all the answers
What approach deals with enacting policies, statues, and laws with corresponding enforcement to prevent cyberbullying?
What approach deals with enacting policies, statues, and laws with corresponding enforcement to prevent cyberbullying?
Signup and view all the answers
What type of cyberbullying involves intentionally leaving someone out?
What type of cyberbullying involves intentionally leaving someone out?
Signup and view all the answers
What is the approach that involves including cyberbullying public awareness activities in community public activities?
What is the approach that involves including cyberbullying public awareness activities in community public activities?
Signup and view all the answers
What is a patent?
What is a patent?
Signup and view all the answers
What is the primary focus of RA 10175 (Cybercrime Prevention Act of 2012)?
What is the primary focus of RA 10175 (Cybercrime Prevention Act of 2012)?
Signup and view all the answers
What is cyberbullying?
What is cyberbullying?
Signup and view all the answers
What is the main goal of RA 10173 (Data Privacy Act of 2012)?
What is the main goal of RA 10173 (Data Privacy Act of 2012)?
Signup and view all the answers
What is cyberstalking?
What is cyberstalking?
Signup and view all the answers
What is the role of the Department of Education (DepEd) in addressing cyberbullying?
What is the role of the Department of Education (DepEd) in addressing cyberbullying?
Signup and view all the answers
What is cyber harassment?
What is cyber harassment?
Signup and view all the answers
What is the main goal of RA 10627 (Anti-Bullying Act of 2013)?
What is the main goal of RA 10627 (Anti-Bullying Act of 2013)?
Signup and view all the answers
Study Notes
Computer Crimes
- Denial of Service (DoS) attack: flooding a computer system with excessive traffic
- Sources of computer crimes:
- Virus (self-propagating computer program)
- Hacking (attempt to exploit a computer system)
- The era of Viruses and Hacking (1980s-1990s):
- Rise of computer viruses
- Notorious Morris Worm (1988) and hacking of NASA and military systems by Kevin Mitnick (1995)
Motives of Computer Crimes
- Political Activism: promoting or advancing a political agenda
- Vendetta: personal revenge
- Joke/Hoax: spreading false warnings or scare alerts
- Hacker Ethics: a collection of motives that make up the hacker character
- Terrorism: using hacking techniques to cause fear, panic, or harm
- Political and Military Espionage: covert activities to gather proprietary information
- Business and Industrial Espionage: illegal activities to gather proprietary information
- Hate: using technology to perpetuate hate speech, harassment, or discrimination
- Personal Gain/Fame/Fun: selfish motives driving individuals to commit computer crimes
Computer System Attacks
- Penetration Attack: breaking into a computer system using known security vulnerabilities
- Insider Threats: in-house employees compromising security
- Hackers: penetrating a computer system for various reasons
- Criminal Groups: organized associations engaging in illegal activities for financial gain
- Hacktivism: using hacking techniques and cyberattacks to promote or advance political or social causes
Social and Ethical Consequences
- Psychological Effects: individual reclusion
- Moral Decay: erosion of moral values
- Loss of Privacy: invasion of privacy
- Trust: loss of trust in individuals or systems
Entities Involved in a Computer Crime
- Computer: tool used to commit crimes
- Criminal: source of crime
- Victim: innocent victim of the crime
Cyberspace and Related Concepts
- Cyberspace: a global artificial reality environment based on interconnected computer networks
- Telepresence: a feeling of being in a location other than one's actual location
- Cyberethics: moral rules or code of behavior applied to the online environment
- Intellectual Property Rights: rights given to persons over creations of their minds
Cyberspace Problems
- Anonymity: rapid advances in computer and telecommunication technology
- Internet Paradox: conflicting ideas and muddle in the online environment
- Browsing Rights: nature of cyberspace requires Web site materials and user control
- Lack of Control over Cyberspace Services: difficulty in knowing who will use services and how they will be used
- Distributed Liability: unclear responsibility for online activities
IPR in Cyberspace
- Copyright: protects original works of authorship
- Patent: exclusive rights to a process, design, or new invention
- Trade Secrets: confidential information that may be sold or licensed
- Trademark: distinctive sign or symbol
- Personal Identity: ability to control the use of personal information and attributes
Cyberbullying
- Actions that use information and communication technologies to support deliberate, repeated, and hostile behavior
- Types of Cyberbullying:
- Harassment: sustained and constant pattern of hurtful or threatening online messages
- Exclusion: deliberately leaving someone out
- Flaming: posting insults and profanity online
- Outing: unwanted and uncalled for online display
- Masquerading: creating a fake profile to bully others
Approaches in Dealing with Cyberbullying
- Awareness: promoting education and awareness programs on digital citizenship, online safety, and responsible internet use
- Legislations: laws and policies with corresponding enforcement to prevent cyberbullying
- Community Support: public awareness activities and community programs to address cyberbullying
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz covers the basics of computer crime, including types of cyber attacks and illegal activities. Learn about denial of service, viruses, and more.