You are on page 1of 6

Activity 2

Dan Rico P. Navarro Crim 3D

1. Explain the term “cybercrime”


 cybercrime, also called computer crime, the use of a computer as an instrument to further
illegal ends, such as committing fraud, trafficking in child pornography
and intellectual property, stealing identities, or violating privacy.  Cybercrime, especially
through the Internet, has grown in importance as the computer has become central to
commerce, entertainment, and government.

2. What are the 2 elements of computer crime? Explain

 (Legal term) As in traditional crimes, for a cybercrime to exist four elements must be
present: actus reus (the prohibited act or failing to act when one is supposed to be under
duty to do so);
 mens rea (a culpable mental state); attendant circumstances (the existence of certain
necessary conditions); and harm resulting to persons or property.
3. Differentiate cybercrime from computer crime.

4. What is stalking?

 Cyberstalking refers to the use of the internet and other technologies to harass or stalk
another person online, and is potentially a crime. This online harassment, which is an
extension of cyberbullying and in-person stalking, can take the form of e-mails, text
messages, social media posts, and more and is often methodical, deliberate, and persistent.

5. What are the types of cybercrime?


 Distributed Denial of Service - These are used to make an online service unavailable and
take the network down by overwhelming the site with traffic from a variety of sources.
Large networks of infected devices known as Botnets are created by depositing malware on
users’ computers. The hacker then hacks into the system once the network is down.
 Botnets are networks from compromised computers that are controlled externally by
remote hackers. The remote hackers then send spam or attack other computers through
these botnets. Botnets can also be used to act as malware and perform malicious tasks.
 Identity theft - This cybercrime occurs when a criminal gains access to a user’s personal
information to steal funds, access confidential information, or participate in tax or health
insurance fraud. They can also open a phone/internet account in your name, use your name
to plan a criminal activity and claim government benefits in your name. They may do this by
finding out user’s passwords through hacking, retrieving personal information from social
media, or sending phishing emails.
 Cyber stalking - This kind of cybercrime involves online harassment where the user is
subjected to a plethora of online messages and emails. Typically, cyberstalkers use social
media, websites and search engines to intimidate a user and instill fear. Usually, the
cyberstalker knows their victim and makes the person feel afraid or concerned for their
safety.
 Social engineering involves criminals making direct contact with you usually by phone or
email. They want to gain your confidence and usually pose as a customer service agent so
you’ll give the necessary information needed. This is typically a password, the company you
work for, or bank information. Cybercriminals will find out what they can about you on the
internet and then attempt to add you as a friend on social accounts. Once they gain access
to an account, they can sell your information or secure accounts in your name.
 PUPS or Potentially Unwanted Programs are less threatening than other cybercrimes, but
are a type of malware. They uninstall necessary software in your system including search
engines and pre-downloaded apps. They can include spyware or adware, so it’s a good idea
to install an antivirus software to avoid the malicious download.
 Phishing - This type of attack involves hackers sending malicious email attachments or URLs
to users to gain access to their accounts or computer. Cybercriminals are becoming more
established and many of these emails are not flagged as spam. Users are tricked into emails
claiming they need to change their password or update their billing information, giving
criminals access.
 Prohibited or Illegal Content - This cybercrime involves criminals sharing and distributing
inappropriate content that can be considered highly distressing and offensive. Offensive
content can include, but is not limited to, sexual activity between adults, videos with intense
violent and videos of criminal activity. Illegal content includes materials advocating
terrorism-related acts and child exploitation material. This type of content exists both on the
everyday internet and on the dark web, an anonymous network.
 Online Scam - These are usually in the form of ads or spam emails that include promises of
rewards or offers of unrealistic amounts of money. Online scams include enticing offers that
are “too good to be true” and when clicked on can cause malware to interfere and
compromise information.
 Exploit kits need a vulnerability (bug in the code of a software) in order to gain control of a
user’s computer. They are readymade tools criminals can buy online and use against anyone
with a computer. The exploit kits are upgraded regularly similar to normal software and are
available on dark web hacking forums.

6. Explain what is Cyber security


 It is the application of technologies, processes and controls to protect systems,
networks, programs, devices and data from cyber-attacks. It aims to reduce the risk of
cyber-attacks and protect against the unauthorized exploitation of systems, networks
and technologies.
7. What are the different types of stalkers
 False Accusations. The perpetrator sets up a website or blog for the purpose of posting
false information about the victim. They may also enter newsgroups, chat rooms, or
other public sites that allow users to make posts.
 Gathering Information. The victim’s family, friends, and co-workers are approached by
the perpetrator to obtain personal information. This information is then used against
the victim later.
 Monitoring. The perpetrator monitors the victims’ online activities to gather data about
the victim. They might have access to the IP address, passwords, or electronic devices
that can be used to harass the victim or impersonate.
 Flying monkeys. Just like the witch in the Wizard of Oz who uses flying monkeys to do
her dirty work, so the perpetrator solicits others into participating in the harassment of
the victim. This is a form of group harassment.
 Playing the Victim. The perpetrator makes false claims that they are being harassed by
the victim. This is usually done with family, friends, co-workers, and occasionally on
public sites to drum up support for the perpetrator and isolation for the victim.
 Sending viruses. This is unfortunately easy to do as all it takes is for the victim to click on
a photo, video, email, or link that was sent with a virus attached. Within seconds a virus
is downloaded that can erase information and destroy reputations.
 Ordering products. The perpetrator orders embarrassing items or subscribes to
magazines using the victim’s name. They usually have it delivered to the victim’s place
of work to cause more distress and unrest.
 Arranging a meeting. Perpetrators who use false identities such as done on dating
websites to make arrangements to meet their victims in person. Often the perpetrator
does not identify themselves preferring to stand back and watch the victim’s reaction to
a no-show.
 Posting insults. Tweets, social media posts, comments on blog posts or websites are a
few examples of places that a perpetrator might post defamatory, insulting, or
derogatory statements about the victim.
 Physical stalking. Sometimes the cyberstalking turns physical as the perpetrator using
the gathered information to appear in the victims’ locations. This also includes abusive
phone calls, obscene mail, trespassing, vandalism, theft, and assault.
 Obsessive texts. Some perpetrators send hundreds of text messages to the victim to
disrupt their day and torment them with baseless accusations. They might also use
other social media to obsessively post or view messages to constantly remind the victim
of their presence.
 Repetitive harassment. The perpetrator posts harmful rumors, threats, sexual
comments, personal information, and hateful language about the victim. This is done in
a bullying manner designed to scare the victim and cause harm. The victim fears that
there is no escape.
 GPS Tracking. Devices are planted in cars or on personal items that track a victim’s
location. Some cellphones, tablets or computers might also have tracking devices or
location settings that allow a victim to be tracked without their knowledge.
 Geotagging and Metadata. Electronic devices have embedded and unknowingly
enabled metadata that is used by manufacturers. Some of these settings include
location information. A resourceful abuser can access this information without the
victim knowing.
 Social Media. While most social media applications allow a person to be blocked,
sometimes having access to a friend of the victim is enough to gain access. Innocent
posts like where a person is eating dinner can provide an abuser with location and time
information.
 Flaming. This is posting insults usually laced with aggression or profanity to incite the
victim. The purpose is to draw the victim into a discussion to fuel discourse between the
perpetrator and the victim. Flame bait is a post that sparks anger or an argument.
 Monitoring Apps. Sadly, there are numerous monitoring apps and spyware available.
Some don’t even need access to your phone in order to download. Just innocently
clicking on an image can download a monitoring app without a person’s knowledge.
Read articles, change passwords and IDs, remove and reinstall thumbprint recognition.
 Syncing Devices. Some apps sync information between devices to make it easier for
purchases or transfer of information. Unfortunately, if the perpetrator has access to the
device, then they can read text messages, delete pictures, falsify documents, or view
browsing history. This is very harmful to anyone experience domestic violence who
might have evidence stored on a device.
 Spoofing. A perpetrator might pretend to be a representative of the victim’s bank and
ask for them to verify personal information. Then they use the information to gain
access to the victim’s bank account. This is commonly done when the victim has
switched accounts to keep their information private. Always be cautious about providing
any personal information via phone, text, or email.
 Online Scammer. Dating websites are popular territory for online scammers who
misrepresent who they are, what they like, what they do, and how they look. Some
perpetrators will create false profiles that are perfect matches for their victim for the
purpose of stalking, meeting or harassing.
 Identity Theft. This is surprisingly easy when the perpetrator has had an intimate
relationship with the victim. Most partners know personal information like SSN, date of
birth, mother’s maiden name, former addresses, and other common pieces of data.
Abusers use this information to apply for credit cards, mortgages and make purchases
without detection.
 Account Takeover. Many people save passwords for their financial information on their
electronic devices. A perpetrator can gain access to the computer, log onto the
accounts, change passwords or addresses, send embarrassing emails, delete documents,
or destroy the victim’s reputation.
 Catfishing. This is a method of online stalking where the perpetrator poses as someone
else and creates a false social media identity. The name, photos, locations, and basic
information can all be false. Sometimes, the perpetrator poses as the victim with the
intention of fooling others and humiliating the victim.
8. Explain the methodology of cybercrime

 A cybercrime investigation is the process of investigating, analyzing, and recovering


forensic data for digital evidence of a crime. Examples of evidence in a cybercrime
investigation include a computer, cellphone, automobile navigation system, video game
console, or other networked device found at the scene of a crime. This evidence helps
cybercrime investigators determine the perpetrators of a cybercrime and their intent.

9. Categories of cybercrime
 Phishing is one of the main forms of social engineering attacks, and as any social
engineering attack it tries to trick unsuspecting users into giving away personal
information.
 Internet Fraud The victim will be asked to cover a small portion of the cost of moving
the money or asset, and will be promised a bigger cut of the benefits when the process
is over. If the victim falls for it and transfers money, he or she will be told that
complications have arisen and that more money will be required. Of course, the victim
will not recover anything and this will go on until the scammer feels like there’s nothing
to gain from this victim and jump to another one.
 Intellectual property infringements vary from the sale of counterfeit or replica goods,
content piracy, patent infringement and more. In the following article you can find a full
list of every intellectual property infringement type. 
 Counterfeit and replica goods: Product created to look identical to an existing
product made by a third party’s brand; while counterfeits are branded, replicas
are not.
 Piracy: Piracy is the unauthorized reproduction, copying and spreading of
copyrighted materials.
 Patent infringement: These are products which exactly copy the functionality
and mechanism of products protected by utility patents.
 Identity theft is closely related to the phishing scams that were discussed earlier. As
another computer as a tool cybercrime, they existed much earlier than the Internet did,
but it has certainly improved their reach and ease of execution.
 Online harassment and cyberbullying is usually contained within social media in the
form of posts, comments or direct messages; but it could also be sent through email.
These messages’ main form is mostly defamatory or threatening either against one
individual or group.
10. Explain the word fishing
 Phishing is a type of social engineering attack often used to steal user data, including
login credentials and credit card numbers. It occurs when an attacker, masquerading as
a trusted entity, dupes a victim into opening an email, instant message, or text message.
11. Differentiate online harassment from cyberstalking.
 Harassment is an action which is intended to harass, annoy, alarm, abuse, torment, or
embarrass another person. Specifically, a person can be charged with harassment if they
have the intent to annoy, torment or harass another person 
 While harassment typically involves threatening or annoying communications, stalking
charges can be filed for actions that involve making direct, credible threats that place
another person in fear of bodily injury or death.

You might also like