You are on page 1of 5

JOSE RIZAL MEMORIAL STATE UNIVERSITY

Main Campus, Dapitan City

CDI 9 INTRODUCTION TO CYBERCRIME AND


ENVIRONMENTAL LAWS AND PROTECTION

1st Writing Assignment

Submitted by:

Rovelyn S. Credo

Submitted to:

Jessa M. Anghag, RCrim


1. Explain the term “cybercrime”

- Cybercrime is any crime that takes place online or primarily online, in which an
activity done using computers and internet. It may threaten a person’s security and
financial health.

2. What are the two elements of Computer Crime? Explain

- The two elements of Computer Crime are COMPUTER and CRIME, involves the
direct usage of a computer by the criminal as one of the first famous computer
criminals did. However, it can also be indirect, criminal also use a computer to commit
a crime.

3. Differentiate cybercrime from computer crime.

- Cybercrime involves the use of the internet or cyberspace which is an internet crime
along with a computer, while Computer crimes account for criminal acts that are
committed via the use of computer.

4. What is stalking? Explain.

- Stalking is an act or crime of willfully and repeatedly following or harassing another


person in circumstances that would cause a reasonable person to fear injury
especially because of express or implied threats.

5. What are the types of cybercrime? Explain each

FINANCIAL CRIMES- are those crimes committed by an individual or a group of


individuals that involve taking money or other property that belongs to someone else,
to obtain a financial or professional gain.

CYBER PORNOGRAPHY- it is prohibited or unlawful representation of the human


body or human sexual behavior with the goal of sexual arousal over the internet.

ONLINE GAMBLING- an internet gambling, it is typically betting on casino or sports


type games over the Internet. 
IP CRIMES- it is a crime of theft, it refers to someone stealing patents, copyrights,
trademarks, or trade secrets, that is someone steals an idea, creative expression, or
invention from an individual or a company.

EMAIL SPOOFING- it is a way, a technique of a hacker used in spam and phishing


attacks to trick users into thinking a message came from a person or entity they either
know or can trust.

CYBER DEFAMATION- injuring the reputation of a person on the internet by using


social media emails.

CYBER STALKING- it is a way of a person to stalk or harass an individual, group, or


organization with the use of internet and other electronic device.

UNAUTHORIZED ACCESS- it is way of a person gained entry to a computer network,


system, application software, data, or other resources without permission, and any
access to an information system that violates the owner or operator's stated security
policy.

THEFT- it is when any person uses a computer or network with knowledge that such
use is without authority and with the intention of either taking property of another.

EMAIL BOMBING- it is a way of attackers repeatedly sending an email message to a


particular email address at a victim’s site.

SALAMI ATTACKS- a way of an attacker steals the money in small amounts of funds
from multiple bank accounts.

DENIAL OF SERVICE (DNS) ATTACK- it is when legitimate users are unable to


access information systems, devices, or other network resources due to the actions of
a malicious cyber threat actor.

VIRUS/WORM- it is malicious program that replicates itself, automatically spreading


through a network.

LOGIC BOMBS- in a program, it is carrying a malicious payload that can attack an


operating system, program, or network.

TROJAN ATTACKS- it is a way of an attacker to try and gain user’s system access
with their software.

WEB JACKING- it is a way of an attackers in social media where the creator makes a
fake website and when the website open it will direct it to another malicious website
then it harms the user’s system.
CYBER TERRORISM- with the use of an internet, attackers conduct violent acts that
result in, or threaten, the loss of life or significant bodily harm, in order to achieve
political or ideological gains through threat or intimidation.

6. Explain the word Cyber security.

- Cyber Security controls to protect systems, networks, programs, devices and data from
cyber-attacks. However, it aims to reduce the risk of cyber-attacks and protect against the
unauthorized exploitation of systems, networks, and technologies.

7. What are the types of stalkers? Explain each

REJECTED STALKER- they are primarily ex-partners, however, can extend to other
groups whereby there has been a loss of a deeply significant, intimate relationship.
RESENTFUL STALKER- they all had contact with the victim or their work at some
point to initiate their obsession and resentfulness, which they fit into the stranger.

PREDATORY STALKER- they are incredibly rare and considered highly dangerous
due to their deviant desires, at some point, they are obsessed by deviant sexual
desires and unusual practices. 

INTIMACY SEEKER- they usually experience loneliness or a lack of love/partner,


they’re all initiated by attempting to establish an intimate relationship with their chosen
victim.

INCOMPETENT SUITOR- they have a stronger sense of lust, they present as


attempting to establish a friendship or, frequently, a sexual relationship, their advances
are usually insensitive, unaware and crude. Therefore, these stalkers appear oblivious
to their victim’s disinterest and even distress.

EROTOMANIA AND MORBIDLY INFATUATED- it is a relatively uncommon paranoid


condition that is characterized by an individual's delusions of another person being
infatuated with them.

8. Explain the methodology of cybercrime investigation.

- Methodology of cybercrime investigation is an important method for investigation, it


has a form of procedure for accomplishing or approaching investigations, especially in
a case or in a sentence matter.
9. What are the categories of cybercrime? Explain.

1. The computer as a target- which the offender uses the computer to obtain
information or to damage operating programs.

2. The computer as a weapon- attackers use computer as a weapon to commit crimes


such as committing fraud, identity theft, or breaching privacy.

10. Explain the word phishing.

- Phishing is a hacking technique of a hacker, replicates the most-access sites and


traps the victim by sending spoofed link. It is also a fraudulent attempt to obtain
sensitive information such as usernames, passwords and credit card details by
disguising oneself as trustworthy entity in an electronic communication.

11. Differentiate online harassment from cyberstalking.

- Online harassment is threatening behavior or unwanted advances directed at another


using the internet and other forms of computer communications, whereas
Cyberstalking involves the repeated and deliberate use of the internet and electronic
communication tools to frighten, intimidate or harass someone.

You might also like