Podcast
Questions and Answers
What are the two main categories of computer crime?
What are the two main categories of computer crime?
- Internal misuse and external attacks
- Crimes facilitated by a computer and crimes where the computer is the target (correct)
- Cyberbullying and identity theft
- Crimes involving hacking and crimes involving theft
What is the primary focus of physical security in computer safety?
What is the primary focus of physical security in computer safety?
- Backing up data on external drives
- Using antivirus software to protect files
- Setting strong passwords for user accounts
- Locking the computer behind doors and monitoring access (correct)
What consequences may arise from internal misuse of a computer?
What consequences may arise from internal misuse of a computer?
- Unauthorized external attacks
- Increased data storage costs
- Hardware failure
- Permanent deletion of files and system crashes (correct)
What is a script kiddie in the context of computer crime?
What is a script kiddie in the context of computer crime?
How did the Morris Worm affect the Internet in 1988?
How did the Morris Worm affect the Internet in 1988?
What did Vladimir Levin accomplish during his break-ins at Citibank?
What did Vladimir Levin accomplish during his break-ins at Citibank?
What distinguishes elite hackers from script kiddies?
What distinguishes elite hackers from script kiddies?
What security incident occurred in February 1998 involving U.S. military installations?
What security incident occurred in February 1998 involving U.S. military installations?
What defines a patent?
What defines a patent?
Which is NOT a method used in internet filtering?
Which is NOT a method used in internet filtering?
What is the primary role of ergonomics in technological design?
What is the primary role of ergonomics in technological design?
What are the elements required to prove libel?
What are the elements required to prove libel?
What is the greatest threat that hackers pose to a company’s trade secrets?
What is the greatest threat that hackers pose to a company’s trade secrets?
Which of the following best describes open source code?
Which of the following best describes open source code?
What does layered security involve in a technological environment?
What does layered security involve in a technological environment?
What is plagiarism primarily concerned with?
What is plagiarism primarily concerned with?
What was the average number of hops that attackers made between different systems before reaching their target?
What was the average number of hops that attackers made between different systems before reaching their target?
What is the primary purpose of the Freedom of Information Act of 1970?
What is the primary purpose of the Freedom of Information Act of 1970?
What does RA 10173 primarily protect?
What does RA 10173 primarily protect?
Under the Cybercrime Prevention Act of 2012, which of the following actions can result in arrest and imprisonment?
Under the Cybercrime Prevention Act of 2012, which of the following actions can result in arrest and imprisonment?
Which of the following best describes cyber-squatting?
Which of the following best describes cyber-squatting?
What term refers to accessing a computer system without authorization?
What term refers to accessing a computer system without authorization?
What characterizes attacks by criminal organizations in the structured threat category?
What characterizes attacks by criminal organizations in the structured threat category?
Which provision ensures the inviolability of communication and correspondence?
Which provision ensures the inviolability of communication and correspondence?
What constitutes personal information?
What constitutes personal information?
Under which conditions can libel be committed according to Article 355 of the Revised Penal Code?
Under which conditions can libel be committed according to Article 355 of the Revised Penal Code?
What is the penalty for acts committed against critical infrastructure as stated in Section 4(a) of Article III?
What is the penalty for acts committed against critical infrastructure as stated in Section 4(a) of Article III?
What defines computer-related forgery?
What defines computer-related forgery?
What does illegal interception refer to?
What does illegal interception refer to?
How is the right to privacy characterized within the Constitution?
How is the right to privacy characterized within the Constitution?
What typically classifies content as obscene?
What typically classifies content as obscene?
What is the function of the Internet Content Rating Association (ICRA)?
What is the function of the Internet Content Rating Association (ICRA)?
What does the Integrity principle of security require?
What does the Integrity principle of security require?
Which act regulates government access to certain records held by financial institutions?
Which act regulates government access to certain records held by financial institutions?
What is a macro virus?
What is a macro virus?
How are viruses different from worms?
How are viruses different from worms?
What does non-repudiation ensure in a communication context?
What does non-repudiation ensure in a communication context?
What is the primary goal of network security?
What is the primary goal of network security?
Which term describes the use of keywords to block access to certain websites?
Which term describes the use of keywords to block access to certain websites?
What is the primary reason some users want to ban web anonymity?
What is the primary reason some users want to ban web anonymity?
Study Notes
Computer Crime
- Two main categories: Crimes facilitated by a computer, and Crimes where the computer is the target.
- Physical Security: Treat computer security like home security, keep computers attended, watched, or locked.
- Internal Misuse: Intentional or unintentional deletion of files can lead to data loss and system crashes.
Notable Cyber Attacks
- Shamoon (2012): A virus that attacks Microsoft Windows systems, capable of wiping files and rendering networks unusable.
- The Morris Worm (1988): The first large-scale internet attack, infected 10% of internet-connected machines and caused $100 million in damages.
- Citibank and Vladimir Levin (1994): Levin gained access to Citibank's cash management system, allowing him to initiate unauthorized fund transfers.
- Solar Sunrise (1998): A series of intrusions targeting US military installations, compromising over 500 domain name servers and utilizing multiple systems to obscure the origin.
Hacker Types
- Script Kiddie: Inexperienced hackers who use pre-made scripts to compromise systems.
- Elite Hacker: Skilled hackers capable of discovering and exploiting new vulnerabilities.
- Criminal Hacker (Cracker): Hackers motivated by fun, excitement, or illegal gain.
Cybercrime Laws
- Freedom of Information Act of 1970 (USA): Ensures individuals' access to personal data collected by federal agencies.
- RA 10173 (Philippines): Protects customer data confidentiality, setting rules for companies to regulate data collection, handling, and disposal.
- Cybercrime Prevention Act of 2012 (Philippines): Upholds the constitutionality of punishing online libel.
- Article III, Section 3.(1) of the Philippine Constitution: Guarantees the privacy of communication and correspondence except under lawful order or for public safety.
Additional Cybercrime Topics
- Cybersex: Engaging in sexually explicit activities online for consideration.
- Cyber-squatting: Registering domain names in bad faith to profit or harm others.
- Illegal access: Accessing computer systems without authorization.
- Criminal Organizations: Structured cyberattacks with extensive planning, resources, and potential collusion with insiders.
Cyber Security Measures
- Anonymous Remailers: Services that strip originating addresses from emails, enabling anonymous communication.
- Internet Filters: Software used to block access to websites containing inappropriate content.
- Mandatory Access Control: Restricts access to objects based on pre-defined security attributes.
- Layered Security: Employing multiple security methods like routers, firewalls, encryption, and authentication to fortify systems.
Cyber Security Threats
- Hackers: Pose the greatest threat to trade secrets, potentially disclosing or stealing information for profit.
- Plagiarism: Stealing and passing off someone's ideas or words as one's own.
- Open Source Code: While beneficial, open source code increases the risk of vulnerabilities being discovered and exploited.
- Bugs and Misconfiguration: Errors allowing unauthorized remote users to steal data, execute commands, gain information, or launch denial of service attacks.
Cyber Security Principles
- Ergonomics: Designing tech systems with human needs and capabilities in mind.
- Integrity: Ensuring information is not modified without authorization.
- Confidentiality: Preventing unauthorized disclosure of information.
- Authentication: Verifying individuals' identities.
- Non-repudiation: Providing proof of message sender and receipt.
Additional Cyber Security Concepts
- Viruses: Self-replicating programs that spread by inserting copies into other files.
- Worms: Self-replicating malware similar to viruses.
- Macro Virus: A virus that utilizes an application's macro language for distribution.
- Keyword Filtering: Blocking websites based on specific keywords or phrases.
- Network Security: Protecting networks and services from unauthorized access, modification, or disruption.
Controversial Topics
- Web Anonymity: Some advocate for banning web anonymity due to concerns about its use in defamation, fraud, libel, and child exploitation.
- Information Warfare: Using information and information technology as a weapon against adversaries.
Legal Considerations
- Libel: False statements intended to harm someone's reputation.
- Personal Information: Any information that identifies an individual.
- Article 355 of the Revised Penal Code (Philippines): Defines libel and outlines its methods of commission.
- Section 4(a) of Article III of the Cybercrime Prevention Act (Philippines): Imposes penalties for crimes against critical infrastructure.
- Section 4(c)(1) of Article III of the Cybercrime Prevention Act (Philippines): Punishes acts related to illegal interception of computer data.
- Rights to Financial Privacy Act of 1978 (USA): Regulates government access to financial records.
- Computer Abuse Amendments Act of 1994 (USA): Prohibits the transmission of harmful computer programs, including viruses.
Privacy and Security
- Right to privacy: A constitutional right recognized independently of liberty.
- Obscenity: Highly offensive content, often with sexual or prurient themes.
- Internet Content Rating Association (ICRA): A nonprofit organization that provides internet content filtering systems.
- Data Protection: Companies must protect customer information from collection to disposal, preventing unauthorized access.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the fundamentals of computer crime, including its two main categories and the critical aspect of physical security. Additionally, it examines some of the most notable cyber attacks in history, detailing their impact and methodologies. Test your knowledge on these vital topics in cybersecurity.