Untitled Flashcards Set

Cybercrime – a crime that involves a computer and a network.

-          criminal activities carried out by means of computer or the internet.

Cyber – refers to a computer or a computer network, the electronic medium in which online communication takes place.

 

Salient Historical Events

1834 – first cyberattack in the world – a couple of robbers hack the French Telegraph System and steal information from the stock market.

1878 – Early Mobile Calls – young boys repeatedly and purposely misdirecting and disconnecting customer calls of Bell Telephone Company two years after Alexander Graham Bell invented the machine.

1969 – RABBITS Virus – The University of Washington Data Center downloads a program on a computer from an unknown user. The inconspicuous machine creates copies of itself before the machine overloads and ceases running (breeding like a rabbit). It is known to be the first virus on a computer.

1970-1995 – Kevin Mitnick – penetrates some of the highest-guarded networks in the world, including Nokia and Motorola, tricking insiders into handing codes and passwords.

1981 – First Cybercrime Conviction – Ian Murphy, aka “Captain Zap” breaks into the network of AT&T and alteration the internal clock at peak hours to charge off-hours prices.

1982 – The Logic Bomb – The CIA blows up a Siberian gas pipeline by injecting a code into the network and the operating system to monitor the gas pipeline without using a bomb or a missile.

1988 – The Morris Worm – Robert Morris releases what on the internet will be considered the first worm. To show that the author is a student there, the worm is released from a computer at MIT.

1989 – Trojan Horse Program – A diskette that appears to be an AISDS information archive is mailed to a UK electronic journal to thousand of AIDS researchers and subscribers.

1999 – The Melissa Virus – A virus infects Microsoft Word records, transmitting itself via email as an attachment automatically. It mails out to the first 50 names mentioned in the Outlook email address box of an infected device.

2010 – The Stuxnet Worm – The worlds first software bomb is a destructive computer virus that can attack control systems used for controlling manufacturing facilities.

2016 – DNC Email Leaks – Emails from the Democratic National Committee were leaked to and released by Wikileaks prior to the 2016 US Presidential election.

I love You Virus – sometimes referred to as Love Bug or Love Letter for you, is a computed worm that infected over ten million Windows personal computers on and after May 5, 2000. It started spreading as an email message with the subject line “ILOVEYOU” and the attachment “LOVE-LETTER-FOR-YOU.TXT.vbs.”

-          created by Onel De Guzman

 

Meaning of Internet

The Internet, sometimes called simply "the Net," is a worldwide system of computer networks a network of networks in which users at any one computer can, if they have permission, get information from any other computer.

Different Types of Internet Connections

There are many ways a personal electronic device can connect to the internet. They all use different hardware and each has a range of connection speeds. As technology changes, faster internet connections are needed to handle those changes. I thought it would be interesting to list some of the different types of internet connections that are available for home and personal use, paired with their average speeds.

1.      Dial-Up (Analog 56K). - Dial-up access is cheap but slow. A modem (internal or external) connects to the Internet after the computer dials a phone number. This analog signal is converted to digital via the modem and sent over a land-line serviced by a public telephone network.

2.      DSL. DSL stands for Digital Subscriber Line. It is an internet connection that is always "on". This uses 2 lines so your phone is not tied up when your computer is connected. There is also no need to dial a phone number to connect. DSL uses a router to transport data and the range of connection speed, depending on the service offered, is between 128K to 8 Mbps.

3.      Cable. Cable provides an internet connection through a cable modem and operates over cable TV lines. There are different speeds depending on if you are uploading data transmissions or downloading. Since the coax cable provides a much greater bandwidth over dial-up or DSL telephone lines, you can get faster access. Cable speeds range from 512K to 20 Mbps.

4.      Wireless. Wireless, or Wi-Fi, as the name suggests, does not use telephone lines or cables to connect to the internet. Instead, it uses radio frequency. Wireless is also an always on connection and it can be accessed from just about anywhere. Wireless networks are growing in coverage areas by the minute so when I mean access from just about anywhere, I really mean it. Speeds will vary, and the range is between 5 Mbps to 20 Mbps.

5.      Satellite. Satellite accesses the internet via a satellite in Earth's orbit. The enormous distance that a signal travels from earth to satellite and back again, provides a delayed connection compared to cable and DSL. Satellite connection speeds are around 512K to 2.0 Mbps.

6.      Cellular. Cellular technology provides wireless Internet access through cell phones. The speeds vary depending on the provider, but the most common are 3G and 4G speeds. A 3G is a term that describes a 3rd generation cellular network obtaining mobile speeds of around 2.0 Mbps. 4G is the fourth generation of cellular wireless standards. The goal of 4G is to achieve peak mobile speeds of 100 Mbps but the reality is about 21 Mbps currently.

Basic Function of a Computer

1.      Input Function – the process of entering any type of data and instruction into a computer system. Uses the input devices such as keyboard, mouse, Scanner, Microphone, etc., in order to receive user signals to the computer.

2.      Central Processing Unit – it processes data of the computer. It takes data and instruction from the input devices and performs all types of calculations based on the instructions given. Called “the brain of computer” as it controls operation of all parts of computer.

3.      Data Storage – records and preserves digital information.

 

Types of CPU Storage

 

Random Access Memory – is a computer’s short-term-memory, where he data that the processor is currently using is stored. A volatile memory used to hold instructions and data of current running programs.

 

Read Only Memory – a non-volatile memory type. This means it receives data and permanently writes it on a chip, and it last even after you turn off your computer. The data that remains on the ROM cannot be changed and remains forever.

 

Other Storage

 

Hard Disk Drive (HDD) – a re-writable permanent memory

Solid State Drive (SSD) – a new generation of storage device used in computers. It stores data using flash-based memory, which is much faster than the traditional hard disk they’ve come to replace

Pen Drives – a plug-and-play portable storage device that uses flash memory that is lightweight.

 

4.      Output Function – means the results generated by the computer once the processing of CPU is completed, based on the instruction given by the user.

-          The output is in the form of documents, videos, audio, graphs, image, etc. results are displayed on your computer screen.

 

Important notes to remember:

-          Computers use binary numbers

-          Hash value – can be thought as a fingerprint for files. The content of a file are processed through a cryptographic algorithm, and a unique numerical value is produced that identifies the content of the file.

-          The word “bit” is an abbreviation for binary digit

1 Byte

8 Bits

1 Kilobyte

1,024 Bytes

1 Megabyte

1,024 Kilobytes

1Gigabyte

1,024 Megabytes

1Terrabyte

1,024 Gigabytes

1Petabyte

1,024 Terabytes

1Exabyte

1,024 Petabytes

1Zettabyte

1,024 Exabytes

1Yottabyte

1,024 Zettabytes

 

Other Components of Computer System

Computer Case – This is the part that holds all of the parts of a computer to make up the computer system.

Motherboard – the main printed circuit board within a computer, which means it’s the primary piece of circuit that all of the other pieces plug in to create a cohesive whole.

Graphics Card – is an output device that processes the data from the motherboard and send the appropriate information to the computer’s screen for display.

Power Supply Unit – converts the alternating current (AC) mains supply from the power cord from a wall socket and supplies the correct Direct current (DC) voltage to all the components inside the computer.

Monitor – is an output device used to visualize the graphics data sent from the computer’s graphic card.

Keyboard – device that enables a user to input text into a computer or any other electronic machinery.

Mouse – small device that a computer user pushes across a desk surface in order to point to a place on a display screen and to select one or more actions to take from that position.

 

 

 

Cybercrime Offenses

Republic Act 10175 – Cybercrime Prevention Act of 2012

Categories

a.       Offenses against the confidentiality, integrity and availability of computer data and systems

b.      Computer-related Offenses

c.       Content-related Offenses

d.      Other Cybercrime Offenses

 

A) Offenses against the confidentiality, integrity and availability of computer data and systems

1)      Illegal Access – the access to the whole or any part of a computer system without right.

2)      Illegal Interception – the interception made by the technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emission from a computer system carrying such computer data.

3)      Data Interference – the intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.

4)      System Interference – the intention alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, or suppressing computer data or program, electronic document or electronic data message, without right or authority, including the introduction or transmission of viruses.

Note: Computer Data any representation of facts, information, concepts in a form suitable for processing in a computer system; this includes electronic and digital information and programs.

B) Computer-related Offenses

1)      Computer-related Forgery – the input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, or the act of knowingly using computer data which is the product of computer-related forgery as defined herein, for the purpose of perpetuating or dishonest design.

2)      Computer-related Fraud – the unauthorized input, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.

3)      Computer-related Identity Theft – the intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or judicial, without right.

C) Content-related Offenses

1)      Cybersex – the willful engagement, maintenance, control, or operation, direct or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.

2)      Child Pornography – the unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system.

3)      Unsolicited Commercial Communications – the transmission of commercial electronic communication with the use of computer system which seeks to advertise, sell, or offer for sale products and services are prohibited unless. Also known as spam.

4)      Libel – the unlawful or prohibited acts of libel as defined in article 355 of the Revised Penal Code, as amended, committed through a computer system.

D) Other Cybercrime Offenses

1)      Aiding or Abetting in the Commission of Cybercrime – any person who willfully abets or aids in the commission of any of the offenses enumerated in this Act shall be held liable.

2)      Attempt in the Commission of Cybercrime – any person willfully attempts to commit any of the offenses enumerated in this Act shall be held liable.

Common Types of Internet Fraud

a)      Boiler Room – refers to an outbound call center selling questionable investments by telephone. It typically refers to a room where salesman work using unfair, dishonest sales tactics, sometimes selling foreign currency stock, private placements or committing outright stock fraud. The term carries a negative connotation, and is often used to imply high-pressure sales.

b)      Romance Scam/Cat phishing – false or misleading promises of love and companionship.

c)      Lottery Scam – involves email, letter or text message you receive about your winnings will ask you to respond quickly or risk missing out.

d)      Card Skimming – illegal copying of information from the magnetic strip of a credit or ATM card. The scammers later create a fake or cloned card with your details on it. The scammer is then able to run up charges on your account.

e)      Phishing – comes from the analogy that internet scammers are using email lures to fish for passwords and financial data from the sea of internet users. Phishing, also called brand spoofing is the creation of email messages and Web page that are replicas of existing, legitimate sites and businesses. These Web sites and email are used to trick users into submitting personal, financial, or password data.

f)       Email Spoofing – is the creation of email messages with a forged sender address. The word “spoof” means “falsified”. A spoofed email is when the sender purposely alters parts of the email to masquerade as though it was authorized by someone else.

g)      Nigerian Scam – also called 419 scams, are type of fraud and one of the most common types of confidence trick. The number “419” refers to the article of the Nigeria Criminal Code dealing with fraud. A consumer receives a letter concerning the “request for urgent business transaction”. Typically, after receiving the letter a consumer would respond either by phone, fax, or email. The response would be a request for further information on the requirements and procedure for the transaction. Once contact is established, the writer of the letter will normally ask for an upfront processing fee.

h)      Check Overpayment Scam – receiving an offer from a potential buyer which issues a check with overpayment. The scammer will then ask you to refund the excess amount. The scammer is hoping that you will do this before you discover that their check has bounced.

i)       Inheritance Scam – is when a scammer contacts you out of the blue to tell you that you’ve been left, or are entitled to claim, a large inheritance from a distant relative or wealthy benefactor who has died overseas.

j)       Emergency Scam – sometimes referred to as the Grandparent Scam. In the typical scenario, a grandparent receives a phone call from a con-artist claiming to be one of his or her grandchildren. The caller goes on to say that they are in some kind of trouble and need money immediately. Typically, they claim being in a car accident, trouble returning from a foreign country or they need bail money.

robot