*Cyber Crime Investigation Flashcards Preview

CIC Module 4 > *Cyber Crime Investigation > Flashcards

Flashcards in *Cyber Crime Investigation Deck (29)
Loading flashcards...
1
Q

Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes.

A

Cybercrime

2
Q

Cybercrime is an unlawful acts wherein the computer is either a:

A
  • TOOL
  • TARGET
  • or Both
3
Q

provides a target rich environment for criminals

A

Cyberspace

4
Q
Profile of Criminals
Children and adolescents between the age group of \_\_\_\_\_\_ years
Organized Hackers (Political Hactivist)
Professional Hackers/Crackers
Disgruntled employees
Business Rival.
Ex-Boy Friend.
Divorced Husband. etc
A

6 – 18

5
Q

Victims

A

Gullible
Greedy people
Unskilled & Inexperienced
Unlucky people

6
Q

Cybercrime are vulnerable

A

Because of :

Anonymity
Computer’s storage capacity
Weakness in Operation System
Lack of user Awareness
Negligence of user
7
Q

(Cybercrime Prevention Act of 2012)

A

Republic Act 10175

8
Q

-Section 33 of the law has two (2) provisions that enumerates and penalizes the following acts:
Computer hacking,
Introduction of computer virus, and
Copyright infringement

A

Republic Act 8792 Electronic Commerce Act of 2000

9
Q

– Access Devices Regulation Act

A

RA.8484

10
Q

– Anti Child Porn of 2009

A

•RA.9775

11
Q

– Anti Photo and Video Voyeurism

•Revised Penal Code (RPC) and other Special Laws.

A

•RA.9995

12
Q

Cybercrime Offenses

A

I. Offense against Confidentiality, Integrity, and Availability (CIA) of computer data and system: such as;

  1. Computer Related Offenses: such as;
  2. Content-related Offenses: such as;
13
Q

Offense against Confidentiality, Integrity, and Availability (CIA) of computer data and system: such as;

A
  • Illegal Access
  • Illegal Interception
  • Data Interference
  • System Interference
  • Misuse of Devices
14
Q

2 – Computer Related Offenses: such as;

A
  • Computer-related Forgery

* Computer-related Fraud

15
Q

Content-related Offenses: such as;

A
  • Cybersex
  • Child Pornography
  • Unsolicited Commercial Communications
16
Q

Mode and Manner of Committing Cybercrime

A
Hacking/Illegal Access
Denial Of Service Attack
Malware Dissemination
Software Piracy
Pornography
Credit Card Fraud
Phishing
Website Defacement
Net Extortion
Cyber Defamation
Threatening
Salami Attack
17
Q

is simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.

A

Hacking

18
Q

This is an act by the criminal, who floods the bandwidth of the victim’s network of fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.

A

Denial of Service Attack (DoS)

19
Q

Malicious software that attaches itself to other software .

Virus, Worms, Trojan Horse, Rootkits, Logic Bomb are the malicious software “Malware”

A

Malware Dissemination

20
Q

Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.

Retail revenue losses worldwide are ever increasing due to this crime

Can be done in various ways –
End user copying, Hard disk loading, Counterfeiting, Illegal downloads from the internet etc.

A

Software Piracy

21
Q

is the first consistently successful e-commerce product.

Deceptive marketing tactics and mouse trapping technologies _______ encourage customers to access their websites.

Anybody including children can log on to the internet and access websites with pornographic contents with a click of a mouse.

A

Pornography

22
Q

You simply have to type credit card number into www page of the vendor for online transaction

If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonation the credit card owner

A

Credit Card Fraud
(Credit card Skimmer - machine)
Credit card writer

23
Q

Copying the company’s confidential data in order to extort said company for huge amount.

A

Net Extortion

24
Q

Its is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means

A

Phishing

Actual website
Deceptive Website
Phishing email

25
Q

is an attack on a website that changes the visual appearance of the site or a webpage.

A

Website defacement

Active website
Deceptive website

26
Q

The Criminal sends emails containing defamatory matters to all victim or post the defamatory matters on a website.

(disgruntled employee may do this against boss, ex-boys friend against girl, divorced husband against wife etc)

A

Cyber Defamation

27
Q

The Criminal sends threatening email or comes in contact in chat rooms with victim.

(Any one disgruntled may do this against boss, friend or official)

A

Threatening

28
Q

In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed.

   Criminal makes such program that deducts small amount like P 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.
A

Salami attack

29
Q

Sale & Purchase through net.

There are web site which offer sale and shipment of contrabands drugs.

They may use the techniques of steganography for hiding the message.

A

Sale of Narcotics