問題一覧
1
The Convention on Cyber Crime Distinguish between four different types of offenses
Computer-related offenses, such as computer-related forgery and computer-related Fraud Content-related offenses, such as offenses related to child pornography, and Copyright-related offenses, such as offenses related to copyright infringements and related rights
2
An attacker may commit a criminal offense against a company after a perceived injustice against themselves
REVENGE
3
This attacker understake their duties they may identify vulnerability or loopholes in the internal systems where money or data could be removed without anyone else being able to identify their actions.
OPPORTUNITY
4
This is the most motivation of hackers whether internal or external to the company. The potential to enrich thejr lives at the expense of others is an enticing option to them, with little to no concern as to the damage they do to others.
GREED
5
Some cyber criminals may commit technical attacks against others as a training exercise for MORE FINANCIALLY LUCRATIVE ATTACK. EX. ROBERT MORRIS
TEST OF SKILL
6
This motive steals the competitors IP through computer hacking to competitor's REPUTATION.
BUSINESS COMPETITOR
7
They are professional hacker, they seek personal financial advantage.The attack is rarely personal but nothing than a business venture to make money
PROFESSIONAL CRIMINAL
8
TERRORISM came from what word which means to CAUSE FEAR-POLITICALLY MOTIVATED and "NO MONITARY INTEREST"
TERIRI
9
Designed to cause terror. Like CONVENTIONAL TERRORISM, E-TERRORISM is utilize is utilize hacking to cause enoigh harm to generate fear
CYBER-TERRORIZM
10
Is someone who intimidates or coerces a government to advance his/her political or social objectives by launching a COMPUTER-BASED ATTACK against computers, networks, or the information stored on them.
CYBERTERRORIST
11
It is a State Sanction Illegal Activity who conducts cyber activities in behalf on that government. Their motivation is to seek the IP of specific industries in foreign countries to gain competitive advantage. They seek to target the infrastructure of a hostile company.
GEOPOLITICS
12
This occurs when a WEBSITE, EMAIL SERVER, COMPUTER SYSTEM is subjected or threatened with repeated denial of service or other attacks by malicious hacker. These hackers demand money to the attacks and to offer PROTECTION
EXTORSION
13
The category of cybercrime that use computer ro attack other computer. Ex Hacking, virus , worms attack , dos attack
COMPUTER AS A TARGET
14
Tye category of crime that use computer to commit reak world crime. Ex. Cyber terrorism, credit card fraud, and pornography
COMPUTER AS A WEAPON
15
Someone who is proficient at SOFTWARE PROGRAMMING, DEBUGGING SYSTEMS, or Identifying Vulnerabilities in a given computer.
HACKER
16
Also known as ethical hackers, they work doing penetration, hired to attempt to break and test into the company's network. They are sa safetiest hacker.
WHITE HAT HACKER
17
The most dangerous hacker that has a malicious intent, spread MALWARE or RANSOMWARE. They are criminals by definition because they violate laws against accessing systems without authorization engage in illegal activity like IDENTIFY THEFT.
BLACK HAT HACKER
18
It is paying for the files in order that to be disclosed to the public
RANSOMWARE
19
They access system at the same time, they aren't typically motivated by money, they may offer to fix vulnerabilities they have discovered through their own and use their knowledge fir profit.
GRAY HAT HACKERS
20
Considered as UNPREDICTABLE, they shift to back and white depending on their PURPOSE or NEEDS.
GRAY HAT HACKERS
21
is an electronic device that manipulates information, or data. It has the ability store, retrieve, and process data. You may already know that you can use a computer to type documents, send email, play games, and browse the Web. You can also use it to edit or create spreadsheets, presentations, and even videos
COMPUTER
22
the process of entering any type of data and instructions into a computer system. Uses the input devices such as Keyboard, Mouse, Scanner, Microphone, etc., in order to receive user signals to the computer
INPUT FUNCTION
23
processes data of the computer It takes data and instructions from the input devices and performs all types of calculations based on the instructions given. It is also known as the "Brain of Computer" as it controls operation of all parts of computer.
CENTRAL PROCESSING UNIT
24
Records and preserves digital information
DATA STORAGE
25
is a computer's short-term memory, where the data that the processor is currently using is stored. A volatile memory used to hold instructions and data of currently running programs
RANDOM ACCESS MEMORY (RAM)
26
non-volatile memory type. This means it receives data and permanently writes it on a chip, and it lasts even after your turn off your computer. The data that remains on the ROM cannot be changed and remains forever.
READ ONLY MEMORY (ROM)
27
2 types of Data Storage
RANDOM ACCESS MEMORY (RAM) READ ONLY MEMORY (ROM)
28
a re-writable permanent memory
HARD DISK DRIVE(HDD)
29
a new generation of storage device used in computers. It stores data using flash-based memory, which is much faster than the traditional hard disks they've come to replace
SOLID STATE DRIVE(SSD)
30
a plug-and-play portable storage device that uses flash memory that is lightweight
PEND DRIVES/FLASH DRIVES/THUMB DRIVE
31
means the results generated by the computer once the processing of CPU is completed, based on the instruction given by the user. The output is in the form of documents, videos, audio, graphs, images, etc. Results are displayed on your computer screen
OUTPUT FUNCTION
32
What are Input function tools of computer
SCANNER MOUSE CAMERA KEYBOARD BARCODE READER BIOMETRIC SENSOR
33
What are output function tools of computer
MONITOR PRINTER SPEAKER PLOTTER
34
This is a part that holds all of the parts of the computer system
COMPUTER CASE
35
the main printed circuit board within a computer, which means it's the primary piece of circuitry that all of the other pieces plug into to create a cohesive whole.
MOTHERBOARD
36
is an output device that processes the data from the motherboard and sends the appropriate information to the computer's screen for display.
GRAPHICS CARD
37
converts the Alternating current (AC) mains supply from the power cord from a wall socket and supplies the correct Direct current (DC) voltages to all the components inside the computer.
POWER SUPPLY UNIT
38
an output device used to visualize the graphics data sent from the computer's graphic card
MONITOR
39
device that enables a user to input text into a computer or any other electronic machinery
KEYBOARD (QWERTY)
40
small device that a computer user pushes across a desk surface in order to point to a place on a display screen and to select one or more actions to take from that position
MOUSE
41
can be thought of as fingerprints for files. The contents of a file are processed through a cryptographic algorithm, and a unique numerical value is produced that identifies the contents of the file. The fingerprint of any files.
HASH VALUES
42
The hash values that are utilized in cybercrime investigation are
SHA-1 MD5
43
Is an abbreviation for binary digit
BIT
44
Legal Access is also known as
HACKING