問題一覧
1
Any devices that has chip in it
COMPUTER
2
This is a crime that involves a computer and a network.This is carried out by computer or the internet.
CYBERCRIME
3
Where does cybercrime takes place?
ONLINE
4
What are cyber crimes?
IDENTIFY THEFT REVENGE PORN CYBER-STALKING HARASSMENT BULLYING CHILD EXPLOITATION
5
Cybercrime is also called?
COMPUTER CRIME
6
It is the use of computer as an instrument to further illegal ends
COMPUTER CRIME
7
They define cybercrime as a crime committed with or through the use of information and communication technologies, such as RADIO, TELEVISION,CELLULAR PHONES, COMPUTER NETWORK.
THE OFFICE OF CYBERCRIME OF THE PHILIPPINES DEPARTMENT OF JUSTICE
8
According to them cybercrime is any illegal behavior committed by means of, or in relation to a computer system or network including crimes as ILLEGAL POSSESSION, OFFERING OR DISTRIBUTING INFORMATION by means of computer
PNP REVISED CRIMIMAL INVESTIGATION MANUAL OF 2011
9
According to him the term cybercrime means TECHNOLOGICAL CRIME, HIGH TECHNOLOGY CRIME, HIGH TECH CRIME, INTERNET CRIME, DIGITAL CRIME, ELECTRONIC CRIME.
McQUADE 2009
10
This refers to a computer or computer network, the electronic medium in which the online communication takes place.
CYBER
11
The first cyber attack in the world. Which robbers hacked the FRENCH TELEGRAPH SYSTEM and steal information from the STOCK MARKET.
1834 FIRST CYBER ATTACK
12
The year which young boys repeatedly and purposely misdirecting and disconnecting customer calls of BELLS TELEPHONE COMPANY two years after.
1878 EARLY MOBILE CALLS
13
Who invented the telephone in 1876?
ALEXANDER GRAHAM BELL
14
The year where the University of Washington Data Center downloads a program on a computer from an unknown user. It is known as the first virus on computer.
1969 RABBIT VIRUS
15
They usually affect the data on a computer, either by altering or deleting it.
VIRUS
16
He penetrates some of the highest guarded networks in the world, NOKIA and MOTOROLA tracking codes and passwords
1970-1995 KEVIN MITNICK
17
Are programs that attach themselves to a computer of a file and then circulate themselves to other files.
VIRUS
18
He is the first to be convicted of Cybercrime
1981 IAN "CAPTAIN" ZAP MURPHY
19
The year which CIA blows up a siberian gas pipeline by injecting code into the network and the operating system monitor the gas pipeline without using a bomb.
1982- THE LOGIC BOMB
20
These are dependent programs where programs kick into action only when a certain event (known as TRIGGER EVENT) occurs.
LOGIC BOMBS
21
He releases the first worm on the internet.
ROBERT MORRIS
22
The year which a worm was relaese by a student Robert Morris of Massachusetts Institute of Technology.
1988-THE MORRIS WORM
23
They do not need the host to attach themselves to. They merely make FUNCTIONAL COPIES of themselves and do this repeatedly.
WORM
24
A diskette that appears to be and AIDS INFO DISK(AIDS) information archive is mailed to a UK electronic JOURNAL to thousands of AIDS.
TROJAN HORSE
25
They invented TROJAN HORSE
BASIT ALVI AND AMJAD FAROOQ ALVI
26
An unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing.
TROJAN ATTACKS
27
It is a virus that infects microsoft word records, transmitting itself via email as an automatic document.
1999- THE MELLISA VIRUS by DAVID L. SMITH
28
Also known as LOVE BUT or LOVE LETTER FOR YOU is a computer worn that infected over 10 million windows personal on MAY 5, 2000
2000- I LOVE YOU VIRUS by ONEL DE GUZMAN
29
Hired by companies to prevent hackers or black hackers
WHITE HACKERS
30
It is the bridge of Cybercrime
LOGIC BOMB
31
It is the link use transaction of syndicate
PIPELINE
32
Worms replicate slowly while___ eat up all the networks connected to it.
VIRUS
33
This is hard to detect by the anti-virus
TROJAN HORSE
34
The world's first software bomb is a destructive computer virus that can control systems used for controlling manufacturing facilities.
2010 STUXNET WORM
35
CIA
CENTRAL INTELLIGENCE AGENCY
36
AT&T
AMERICAN TELEPHONE AND TELEGRAPH SYSTEM
37
Damages of Iloveyou virus
315 BILLION DAMAGES
38
4 types of warrant
1. WARRANT TO DISCLOSE COMPUTER DATA 2. WARRANT TO SEARCH, SEIZE, AND EXAMINE COMPUTER DATA 3. WARRANT TO INTERCEPT COMPUTER DATA 4. WARRANT TO EXAMINE COMPUTER DATA