CD9INCYB
CD9INCYB
CD9INCYB
information. At least one optical processing unit is used in today's computer systems. The creation,
management, or use of systems, especially computer systems, applications, and networks for storing,
retrieving, and transmitting information, is known as information technology. The process of electronically
connecting two or more computing devices to share information through data connections is known as
computer networking.
People's lifestyles have changed all over the world as a result of information technologies and computer
networking. All has access to a computing system, whether it's a smartphone, tablet, or personal computer.
People can function from any location on the planet. Companies may hold video conferences from several
locations at the same time, exchanging information, software, and experience without wasting time and
resources on travel. At the click of a mouse, you can find information about any topic.
There is a downside to the fast-paced, everchanging world of technology and communications: hackers.
Hackers attempt to breach personal and corporate networks on a regular basis; ransomware, identity fraud,
data loss/manipulation, and denial of service attacks are only a handful of the methods employed. As a
result, professional data networking professionals are increasingly being called upon to secure personal,
corporate, and government information through ever-changing security mechanisms.
Computerization and Information System
Computerization may refer to:
Equipping something with or the usage of and associated automation by computers and software.
Business process re-engineering that converts a manual process into one done by a computer.
Equipping with a general-purpose computer, embedded computer, or computer system.
Inputting data(computing) into computers.
Digitizing information for computers.
Creating computer-generated content.
TYPES OF COMPUTERS
Since the invention of the first compute, various kinds and sizes of machines have been used to
provide various services. In handheld and embedded devices computers may be as massive as a large
building or as compact as a laptop or a microcontroller(bynotes.com)
1.Supercomputer - These are the most powerful and largest computers available. Huge companies employ
these devices, which are unique high capacity computers. Usually, they are used to process large volumes
of data, such as in weather forecasts. Supercomputers are very costly and large in scale. It can be housed
in big, airconditioned rooms; certain supercomputers can take up an entire building.
2. Mainframe Computer - These computers are big and powerful, but not quite as powerful as
supercomputers. These can process and store large amounts of data at the same time. A mainframe, for
example, would capture all of the sales data from a large department store. While Mainframes are not as
powerful as supercomputers, they are still very costly, and many large businesses and government
agencies rely on them to operate their operations. Because of their size, mainframe computers can be
housed in huge, air-conditioned spaces.
3. Minicomputer- Small companies and corporations use minicomputers. Midrange computers are another
name for minicomputers. Servers are another name for these. These machines are compact and can fit on
a disk, but they lack the computing and data storage capacities of supercomputers and mainframes.
Servers are used to store data in a single location and to exchange basic devices such as printers and
scanners. A server cluster is a set of servers housed in a single location. Minicomputers are used by
particular divisions of a multinational corporation or organisation for various purposes. Minicomputers, for
example, may be used in a manufacturing department to track specific production processes.
4. Microcomputer- Microcomputers include desktop machines, notebooks, personal digital assistants
(PDAs), tablets, and smartphones. Microcomputers are the most common and fastest-growing computers.
Of the three kinds of machines, these are the least expensive. Microcomputers are designed specifically for
general purposes such as entertainment, education, and function.
THE SOFTWARE
Software is a collection of instructions for a program. The entire collection of programs,
procedures, and routines involved with the operation of a computer system is referred to as software. The
term was coined to distinguish these instructions from the actual elements of a computer machine, which
are known as hardware. A program, or software program, is a series of instructions that tells a computer's
hardware how to execute an operation (www.britannica.com).
TYPES OF SOFTWARE
A software comprises two major categories:
1. System Software
2. Application Software
1. SYSTEM SOFTWARE
The interface, or intermediary, is system software. It allows you to connect with other devices as well as
hardware. Device software is divided into five categories. They are designed to automate the relationship
between software, hardware, and the user by controlling and coordinating the roles and procedures of
computer hardware.
Types Of System Software
1. Operating system (OS):
It is a system software kernel that must be installed first on a computer in order for programs and
computers to be recognized and usable. – time a device is turned on, the first layer of software is loaded
into memory. Real-time operating systems, single-user and single-task operating systems, network
operating systems, and mobile operating systems are examples of operating systems.
2.Device Drivers:
These are what bring electronic peripherals and gadgets to life. Device drivers allow components
and external add-ons to communicate with one another and execute their intended functions. The operating
system will be unable to delegate any tasks without the pilot. Drivers are needed for the operation of
devices such as the mouse, keyboard, speakers, and printer.
3. Firmware:
It is the organizational program that allows the operating system to recognize a ROM, flash, or
EPROM memory chip. It explicitly monitors and oversees all of the operations of a single piece of
hardware. Firmware can be quickly upgraded without the need to replace semiconductor chips
4. Programming language translators:
There are intermediate programs that convert source code written in a high-level language to
computer code. Assemblers, compilers, and interpreters are examples of common language translators.
They can be used to do full program code translation or to translate each instruction one at a time.
5. Utilities:
It is designed to help with device diagnostics and repairs. Their responsibilities could include
anything from computer protection to disk drive defragmentation.
2. APPLICATION SOFTWARE
A computer program that performs a particular purpose, whether educational, personal, or
business related, is known as application software. It's also known as a productivity program or an end-user
program. Consider system software to be a cake, and program software to be the icing on top. When
dealing with applications, it is the device software (frosting) that you, the user, see up front.
Any of the computer application software programs is intended to aid you in a particular process,
such as creativity, competition, or better communication. It helps you complete tasks such as taking notes,
doing online research, setting an alarm, managing your accounts, and even playing games. Unlike
computer software, computer application software systems have their own set of features and execute the
purpose for which they were designed. For example, a browser is a software that allows you to navigate the
Internet. MS PowerPoint, on the other hand, is a presentation specific software. Application software is
another term for non-essential technology.
Choosing the right software for personal or company use will boost functionality and performance.
If you don't educate yourself about your choices, you could end up with something that isn't beneficial to
your business, costing you time and money while reducing efficiency. Knowing what kinds of program
software are available will assist you in making an educated decision.
OUTPUT
a) Monitor
b) Printer
c) Projector
d) Speaker
e) Storage devices
f) Floppy disk drive
g) Flash drive
h) Smartphone or Tablet computer storage interface
i) CD/DVD drive
INPUT/OUTPUT
a) Modern
b) Network interface controller (NIC)
2. Pointing Devices - By accepting physical motions or expressions, these provide a natural interaction with
the device object. The mouse, touch screen, game. pad, and stylus are only a few examples of pointing
instrument.
3. Mouse – This is used to guide a pointer on the board. One (1) or more buttons can be found on a cursor,
and they are used to select command options and monitor the mouse pointer on the keyboard.
THE DIFFEERENT DESIGNS OF MOUSE
a. Optical Mouse
b. Cordless or Wireless Mouse
c. Touch Pad
4. Touch Screen – Touching the screen with a finger or a pen-like interface helps users to choose actions
or command. Touching a multi-touch screen with more than one (1) finger is possible. Tablets and
smartphones, as well as some laptops and desktop computers, frequently use them.
5. Game Controller – These are devices that provide input to computer games.
Four (4) Specialized Game Controllers
a. Joysticks
b. Gaming mouse
c. Gamepads
d. Motion-sensing devices
6. Stylus – A stylus is a pen-like interface that is often used on tablets and smartphones. Handwriting
recognition software converts interfaces with the device using a stylus; this software converts notes into a
format that the machine unit can read.
7. Scanning Device – Translate scanned text and photograph into a format that can be processed by the
machine unit.
FIVE (5) TYPES OF SCCANNING DEVICES
1. Optical Scanners – Scanners are another name for these devices. These accept text and/or image-
based documents and translate them to machine-readable format. Specific letters or pictures are
not recognized by these instruments. Instead, they distinguish between the light, dark, and colored
areas that make up individual letters or pictures.
FOUR (4) BASIC TYPES OF OPTICAL SCANNERS
a) Flatbed Scanner
b) Document scanner
c) Portable scanner
d) 3D Scanner
2. Card Readers – These decode the data stored on credit cards, debit cards, entry cards, and other
forms of identification. The most common form of card reader is the magnetic card reader. On the
back of the card, there is aa thin magnetic strip that stores the encoded data. The details are read
as the card is swiped into the magnetic card reader.
3. Barcode Readers – Handheld wand readers or platform scanners are the machines in question.
Photo-electric cells are used to search or display bar codes.
4. RFID Readers – From several yards away, these will read radio-frequency identification (RFID)
tags. RFID tags are small chips that can be inserted into almost any time. These chips store data in
an electronic format. RFID tags are used on driver’s licenses, visas, and other documents.
5. Character and Mark Recognition Devices – Scanners that can distinguish unique characters and
marking are known as these. These are specialized instruments that are used for specific tasks.
OUTPUT
The term “output” refers to data or information that has been processed.
Devices for Output – All hardware that is used to provide or generate output falls into this category. They
convert the information that has been interpreted by the system device into a human-readable format.
STORAGE
1. Primary Storage – data and program instructions for data processing are stored in primary storage. It
also stores stored data before it is output. Main storage is referred to as RAM.
2. Secondary Storage – which is long-term storage that is used to keep programs and records after the
devices has been switched off. Hard disk drives, solid state drives, CDs, DVDs, and network and cloud-
based computing are also examples of secondary storage.
Data can be saved after the computer has been turned oof by using secondary storage units. Writing and
reading files from recording systems are used to do this. Writing is the act of transferring data from a
primary storage unit to a secondary storage device. Reading is the act of retrieving data from a secondary
storage unit.
DATA STOARGE BASICS
a) Volumes – Volumes are used to store data such as files and directories. Each volume begins with a
letter and ends with a colon, such as (C:) or (D:) (D:).
b) Disk – a platter or collection of platters on which data is stored is referred to as aa disk. A hard disk drive
(HDD) and a DVD are two examples.
c) Drive – the mechanical components that read and write data on a disk are referred to as drives.
STORAGE MEDIUM (STORAGE MEDIA)
A storage medium in a computer is any hardware, including devices and materials, that is used to
store, hold, and retrieve electronic data. It’s a physical unit or component of a computer that collects and
stores information about programs and users. Storage media is the plural from of this word.
Computer paper tape was one of the first types of storage medium. A single piece of data was
represented by a hole punched in the paper. Each punched hole will be interpreted by a paper taper reader
and converted to a number. Magnetic tape later replaced paper tape, leading to the creation of magnetic
floppy disks.
As a speed cache, dual inline memory modules (DIMMS) mount flash next to the motherboard in
dynamic random-access memory (DRAM) slots. In slim laptops, MiniSATA drives and their subsequent
replacement, m.2 SSDs, are included.
SSDs were originally created to work with the Serial-Attached SCSI (SAS) and Serial-Advanced
Technology Attachment (SATA) protocols.
TAPE
Until the 1990s, tape was the most popular backup storage medium, but magnetic disk eventually
moved it aside. Tape services are still in operation, but the emphasis is now on high-capacity archiving for
data preservation. Because of advancements in the Linear Tape-Open (LTO) format, tape systems have
continued to increase in density and resilience. LTO-8 increases compressed bandwidth per tape to 32 TB
and uncompressed data capacity to approximately 13 TB.
Tape libraries are made up of hundreds of physical tapes that are organized in a structure that
allows users to connect and delete tapes, monitor the location of tapes, and set mount points for accessing
data on tape.
COMPUTER COMMUNICATION
Computer communications refers to the exchange of data, commands, and information between
two or more computers or devices.
Electronic systems that relay data from one (1) location to another are known as communication
systems. E-mail, phone calls, video conferencing, electronic banking, and other technologies are supported
by communication networks.
1. Sending and Receiving Devices - a computer or specialized networking system is commonly used for
this. They send (send) and receive (receive) data, information, and instructions in the form of messages.
2. Connection Devices - these devices serve as a link between transmitting and receiving devices as well
as the contact medium. They convert incoming messages into packets that can be sent over a network. For
incoming messages, they even reverse the operation.
Telephone lines were used in almost all computer communications. Telephones, on the other
hand, commonly transmit and receive analog signals, which are steady electric waves. In comparison,
computers transmit and receive digital signals. The presence or absence of an electrical pulse (on/off
binary signals) is represented by these. The modem transforms optical signals into analog signals and vice
versa.
3. Data Transmission Specifications-These are the rules and procedures that coordinate the transmitting
and receiving devices by specifying how the message can be transmitted through the transmission channel
precisely.
4. Communication channel- this is the actual connecting or transmission medium that carries the message
from one computer to another.
NETWORKS
A computer network is a networking device that links two (2) or more computers so they can share
resources and exchange information. The most popular method of connecting computers is via cabling,
such as an Ethernet cable, or wirelessly through radio waves.
NETWORKING WAN It stands for Wide Area Network and refers to a network that spans a large area, as a
city. (LAN) It stands for Local Area Network which refers to a network that serves a specific area, such as a
home or a small office. It binds all of the computers in the building physically.
Internet
It is a virtual network infrastructure that links all of the worlds’ computers. It is usually connected via WAN
and LAN.
Intranet
It's a near room computer network infrastructure since it only spans a limited space and can only be used
by registered users.
Extranet
It's also a kind of Internet to which only a few have access. The World Wide Web (WWW) is a service that
allows you to browse and scan content on the Internet (in the form of web-pages).
Instant Messaging (IM)
It is an online service that allows one to connect or communicate with one another. Skype, Google Talk,
Windows Live Messenger, Yahoo Messenger, among other services offer this feature.
Voice over Internet Protocol (VoIP)
It is a protocol that is used to transmit voice over an IP network. It also allows people to make phone calls
over the internet.
Really Simple Syndication (RSS)
It is a method of disseminating content, articles, and other materials. In order to receive news,
users typically subscribe to the RSS channel. Users do not need to access the website after subscribing;
instead, they will receive notifications about the same.
Web log.
It is a kind of online inventory that consists of a collection of entries (normally on a specialized
topic). These items are listed in reverse chronological order. The person who runs the blog updates it on a
daily basis with new content.
Podcast
It's a digital file that usually includes an audio or video recording that can be accessed through the
Internet.
Chat Rooms
It's a section of the Internet devoted to allowing people to connect with one another.
DOWNLOAD.
It is a method of saving data from the Internet to a server.
Upload
It is a method of transferring saved data from a device to an Internet server.
Dial-up
It is a method of connecting to the Internet by the use of a phone line.
Broadband
It is a high-speed data transfer that transports a variety of signals and traffic modes.
Node
Any computer that is attached to a network. That may be anything from a machine or a printer to a
data storage unit.
Client
A node that asks for and receives services from other nodes. A client is usually a user's personal
computer.
Server
A node that collaborates with other nodes to exchange services. Dedicated servers are dedicated
to completing complex activities. They can be referred to as an application server, contact server, storage
server, file server, printer server, or web server, depending on the role at hand.
Directory Server
A dedicated server that handles a network's infrastructure, such as user accounts
Host
A computing device that is linked to a network that allows users to use its services.
Router
A node that forwards or routes data packets from one network to another network's destination. For
instance, there are two (2) distinct classes of computers, each of which is connected to its own switch.
Instead of using a button, these two (2) sets of computers would be able to connect with one another
through a router. Data packets from the other party would be able to pass through the routers.
SWITCH
A central node that directs messages between sender and receiver nodes to manage data flow.
NETWORK INTERFACE CARDS (NICs)
Are expansion cards that link the device to a network and are stored inside the machine unit.
NETWORK OPERATING SYSTEM (NOS)
The operations of all computers and other machine on a network are regulated and coordinated by
the network operating system (NOS). Electronic networking and the exchange of knowledge and resources
are examples of these practices.
NETWORK ADMINISTRATOR
A network administrator is a technical expert who is in charge of ensuring the networks run
smoothy and that new networks are set up.
A network can be made up entirely of personal computers which can include personal computers
and other machines as well as larger computers. Both nodes can operate together equally to manage a
network or specialized nodes can coordinate and supply all resources.
NETWORK TYPES
Computer networks come in variety of shapes and sizes. The geographic scopes as well as the
function of these networks can be identified. Each can have different hardware configurations, such as
personal computers, mainframes, various peripheral devices, and so on.
NETWORK SECURITY
Large organizations face the task of ensuring that only registered users have access to network
services, which can be accessed from different locations or across the internet. Securing vast computing
networks necessitates the use of sophisticated equipment.
a. Firewall – connections to a company’s intranet and other internal networks is controlled by
hardware and software. All messages between the company’s internal networks and the outside
world are routed via a proxy server, which is a special device. The proxy server determines
whether it is secure to let a single messages or file, flow into or out of the organization’s network by
analyzing the source and quality of each contact.
b. Intrusion Detection systems (IDS) – this is used in conjunction with firewalls to secure a company’s
network. These programs measure both incoming and outgoing network traffic using mathematical
techniques. An IDS can detect signs of a network intrusion and block access before an attacker
can do harm using sophisticated pattern matching and heuristics.
c. Virtual Private Networks (VPN) – Establish a protected private link between a remote user and the
network of an enterprise. Between a user’s home or desktop computer and a business server,
special VPN protocols create the equivalent of a dedicated thread. The link is strongly encrypted,
and from the user’s viewpoint, the workstation seems to be connected to the corporate network.
THE SOCIAL MEDIA
People can connect with each other via social media by building online communities where
they can exchange information, thoughts, messages, and other material, such as images, audio, and
video.
Social Networking Platforms
A social networking website brings together internet users to form an online community
that allows them to overcome challenges such as time, space, and cultural differences. It enables
people to communicate with one another over the internet by sharing their thoughts, ideas,
knowledge, hobbies, and experiences. Members of an social network will use it to communicate
with their peers, families and co-workers. They can engage with people they already know in order
to forge new personal and professional bonds. Facebook, twitter, YouTube, and LinkedIn are all
popular social networking sites.
SOCIAL NETWORKING ETHICAL ISSUES
Online violence, intimidation, stalking, cyber bullying, experiences with sexual predators, the
sharing of pornographic content, and employee involvement in social networking are some of the ethics
challenges that user of social networking sites face.
1. CYBERBULLYING – Harassment, torment, ridicule, or threats directed at a minor by another minor
or a group of minors over the internet or by phone. Females and 15 to 16 years old are most likely
to be victims of cyberbullying. Cyberbullying has also escalated to the point that some children
have attempted suicide as a result of it.
2. CYBER ABUSE – Any physical or mental mistreatment or lack of care caused by the use of an
electronic communications system that causes damage or pain to others. Cyber bullying includes
both cyber assault and cyber stalking, a wide range of activities in which someone behaves in a
manner that causes others hurt or anxiety. Cyberbullying isn’t necessarily obvious, harmful, or
otherwise harmful to a person or group of people, causing significant emotional distress.
3. CYBER STALKING – Is a form of cyber bullying that consists of a long-term pattern of unwelcome,
continuous pursuit and disruptive activity (involving the use of an electronic communications
device) directed at another user, causing fear and anxiety in the victim. For victims, cyber stalking
may be a major issue, frightening them and inducing emotional trauma. Cyber harassment often
leads to aggressive or excessive phone call, threatening or obscene letters, trespassing,
vandalism, actual stalking, and even physical violence.
4. ENCOUNTERS WITH SEXUAL PREDATORS – By incorporating sex talk and then planning to
visit youth in person for sexual encounters, sexual offenders use online messaging to build trust
and faith in their victims, who are usually teenagers. Any social networking sites have been
chastised for failing to protect minors from sexual predators.
5. UPLOADING OF INAPPROPRIATE MATERIAL – Most social networking sites have terms of
service agreements, privacy policies, or material codes of ethics that summarize the platform’s
core legal aspects. In most cases, the terms specify that the sites reserve the right to remove
content and terminate user accounts that breach the platform’s policies. These initiatives can be
challenging to implement. Non-consensual posts that contain private images or videos of people
without their consent are often referred to as “revenge porn”. Ex-partners often share this sort of
material in order to shame, embarrass, and/or annoy their former spouse.
6. EMPLOYEE PARTICIPATION ON SOCIAL MEDIA NETWORKS – To minimize compliance
problems and to set consistent rules and standards for workers, business should implement a
social media strategy. Employees will be encouraged to voice their views and practice imagination
with a framework in place, knowing that what they post on social media would not have a direct
effect on their careers.
7. CYBER HARASSMENT – The abusive behaviors, which includes the use of electronic media, is a
type of cyber harassment.
COMPUTER PRIVACY AND CYBERSECURITY
Cybersecurity awareness encourages basic knowledge of cyber vulnerabilities and risks, as well as
cyber hygiene and effective solution options. When people are faced with cyber threats, it educates them
on pest practices and preventive steps. Cyber understanding about cyber-related risks should be promoted
among the general populations, businesses, and government employees.
A global repository will help improve the number and quality of national cybersecurity awareness
programs by streamlining and facilitating them. The archive should be preserved and revised on a regular
basis to incorporate recent technical advancements and perspectives.
People benefit greatly from technology, but is often necessary to consider the negative, or possibly
negative, effects. Computer technology must be implemented in such a way that its positive effects are
maximized and its negative effects are minimized.
The following are the most pressing concerns:
1. Digital Data – what are the risks to our privacy, and how do we safeguard our identities?
2. Security – How do we keep track of who has access to confidential data and protected hardware
and software?
PRIVACY
Technology makes it possible to collect and use data of all kids, including information about
people.
THE TECHNOLOGIES THAT HAVE IMPACTS ON PRIVACY
1. LARGE DATABASES
Large corporation are continually collecting data on their employees. Every day, information about
us is collected and held in huge databases. Credit card providers, for example, keep track of cardholder
transactions, transfer, and credit histories in costumer directories.
Such personal data is collected, analyzed, and sold by a data gathering industry known as
information resellers or information brokers. Data resellers create electronic identities or extremely
informative and customized accounts of people using publicly accessible datasets and, in many cases,
non-public databases.
You almost definitely have an electronic profile with your name, address, phone number, social
security number, bank account details, and other information. These electronic profiles are sold by
information resellers to targeted advertisers, fund-raisers, and others. Many websites provide these
services for free or at a low discount. This presents a number of critical questions, including:
1. Collecting public, but personally identifying, information.
2. Spreading information without personal consent.
3. Spreading inaccurate information.
2. PRIVATE NETWORKS - any companies use a device called employee-monitoring software to log
a practically everything their computers. An employee, for example, used this company's E-mail to
send a highly personal letter to a neighbor, but his supervisor read it.
3. THE INTERNET AND THE WEB - IP address is used to identify any device on the internet. IP
addresses can be used to track internet activity back to the source, encouraging information
security professionals and law enforcement agents to look at violations like illegal network access
and exchanging copyright data without authorization.
When a user browses the internet, his browser saves important information to his
computer's hard drive without him realizing it. The following items are included in this data, which
provides details of person's online activities:
a. History files contain the location (or addresses) of places accessed recently activities:
b. Temporary Internet archives, also known as the browser cache, store the content of web
pages as well as instructions for viewing them. The browser saves these files if a user
visits a website. These files are used to automatically redisplay. Web content if a user
leaves a site and returns later.
c. Cookies are small data files that websites leave on the user's hard drive when he enters
them. Cookies are often used to save website preference, such as the user's preferred
language or location.
Several other risks could jeopardize personal information. Web bugs are images or HTML code
that are concealed on a web page or in an E-mail address. These are used to send data without the user's
permission. When a user opens an E-mail that might contain a web error, for example, information is
forwarded back to bug's source. This E-mail address is now active, according to the receiving server.
Companies that offer active mailing lists to spammers use web vulnerabilities. Many E-mail services now
reject images and HTML code from anonymous senders as a result of this scam. The user must choose
whether or not to allow such material to be reflected in current and future communications.
Spyware is the most vulnerable kind of privacy attack. Spyware is a term that refers to a variety of
services that are intended to secretly monitor and report an individual's online activities. Unfortunately,
many spyware applications go undetected, owing to users' lack of knowledge of their infection. Spyware
can be installed and run in the background. Spyware is often disguised as practical software, like a
protection application.
Using care accessing unfamiliar websites and installing malware from an undisclosed source is
one (1) of the strongest protections against spyware. Another defense is to use anti- spyware or spy
removal system, which are programs that are programmed to identify and eliminate different forms of
privacy attacks.
MEASURES TO PROTECT COMPUTER SECURITY
Computer networks and data can be hacked in a variety of ways, and there are several ways to
guarantee computer security. Restricting access, encrypting files, forecasting events, and avoiding data
failure are all important steps in ensuring computer security.
RESTRICTING ACCESS
Biometric scanning systems and passwords, as well as code words and phrases, may be used to
limit access. A dictionary attack is form of program that tries thousands of terms to obtain entry. To assist
with compliance activities, use security suites, firewall, and password managers.
ENCRYPTING DATA
Unauthorized access is a risk if information is transmitted over a network or stored on a computer
server. The alternative is cryptography, which encrypts data so that only anyone with a secret piece of
knowledge known as an encryption key, or just a key, can read it.
COMMON USES OF ENCRYTION
a. Hypertext Transfer Protocol Secure (https) requires browsers and websites to encrypt all
messages.
b. Virtual Private Networks (VPNs) encrypt connections between company networks and remote
users.
c. WPA2 (wi-fi protected Access) is the most widely used wireless network encryption for home
wireless networks.
ANTICIPATING DISASTERS
Companies and individuals can prepare for disasters by implementing a disaster response strategy
that ensures physical and computer protection. Protecting hardware from human and natural hazards is the
focus of physical defense. Data protection is concerned with preventing unwanted tampering or harm to
information and data. Most large businesses have crisis recovery programs in place that outline how to
keep processes running before regular computer operations can be restored.
Preventing Data Loss
Data backups can be performed on a regular basis to avoid data failure. To secure data in the event of
burglary, arson, flood, or other events, backups are often kept off-site. Incremental backups save several
copies of data at various points of time to protect against data destruction due to unintentional deletion or
adjustments.
TRUSTWORTHY COMPUTING
Based on sound business practices, trustworthy computing is a form of computing that provides secure,
private, and consistent computing experiences. Any machine or network's protection is a mix of technology,
regulation, and individuals. To be successful, it necessitates a wide variety of activities. A effective
protection policy starts with an assessment of threats to the organization's computers and network, the
identification of measures to fix the most critical vulnerabilities, and the education of end users about the
risks involved and the steps they must take to avoid a security incident. Microsoft has committed to
delivering on a trustworthy computing initiative that will boost confidence its digital products, as shown
below:
Step 2.
Identify the potential failure cases or risks/threats, such as a DDoS attack or insider theft.
Step 3.
Examine the number of incidents or the risk of each imminent threat; certain risks, such as insider theft, are
more likely to occur.
Step 4.
Determine the impact of each threat occurring.
Step 5.
Determine how each hazard can be mitigated so that it is less likely to occur or has a smaller impact on the
organization if it does.
Step 6.
Assess the feasibility of implementing the mitigation options.
Step 7.
Perform a cost-benefit analysis to ensure that one's efforts will be cost-effective.
Step 8.
Decide whether or not to implement a particular counter- measure.
Preventative Measures
Implementing layered-security solution will give difficulty to an attacker to break-in into a computer until
giving-up eventually.
The following are the layers of protective measures:
a. Installing A Corporate Firewall
A firewall protects an organization's internal network from the outside world. It also restricts
network connectivity according to the corporation's access policies.
CYBERCRIME PREVENTION
Protecting operating infrastructure and networks from threats is the first step in combating
cybercrime. While no device can be entirely safe, the purpose of defense is to provide a strong enough
barrier to deter most-if not all-attackers. For any form of device, the components or problems that must be
resolved to build a stable environment are generally the same. However, the details of how to enforce a
security strategy and make individual security improvements varies by operating environment, and various
technology, such as broadband, mainframe systems, and cellular networks, raise their own set of problems.
With the increased use of low-cost high-speed wireless networks, more home and business
devices are vulnerable to long-term Internet threats than ever before. To secure these links from Internet
threats, proper security measures must be taken. Antivirus software should be installed, secure passwords
should be used, file and print sharing should be disabled, and a firewall should be used.
When it comes to encryption, you must understand not just how Internet connectivity is provided to
a device, but also the software programs that are used to communicate with Internet-based services.
CHAPTER 1
THE COMPUTER AND THE INTERNET
“Ever since men began to modify their lives by using technology they have found themselves in a series of
technology traps”- Roger Revelle
The computer was born not for entertainment or email but out of a need to solve a serious number-
crunching crisis. BY 1880, the US population had grown so large that it took more than seven years to
tabulate the US Census results. The government sought a faster way to get job done, giving rise to punch-
card based computers that took up entire rooms.
Today, we carry more computing power on our smartphones than was available in these early
models. The following brief history of computing timeline of how computers evolved from their humble
beginnings to the machines of today that surf the internet play games and stream multimedia in addition to
crunching numbers.
HISTORY OF THE COMPUTER
The computer as we know it today had its beginning with a 19th century English mathematics
professor named Charles Babbage. He designed the analytical engine and it was this design that the basic
framework of the computers of today are based on.
Generally speaking, Computers can be classified into three generations. Each generation lasted
for a certain period of time, and each gave us either a new and improved computer or an improvement to
the existing computer.
First Generation 1937 - 1946 - In 1937 the first electronic digital computer was built by Dr. John V.
Atanasoff and Clifford Berry. It was called the Atanasoff-Berry computer (ABC). In 1943 an electronic
computer named Colossus was built for the military. Other developments continued until in 1946 the first
general-purpose digital computer, the Electronic Numerical Integrator and Computer (ENIAC) was built. It is
said that this computer weighed 30 tons and had 18,000 vacuum tubes which was used for processing.
When this computer was turned on for the first-time lights dim in sections of Philadelphia. Computer of this
generation could only perform single task, and they had no operating system.
Second Generation 1947- 1962 - This generation of computers used transistors instead of vacuum
tubes which were more reliable. In 1951 the first computer first commercial use was introduced to the
public; the Universal Automatic Computer ( UNIVAC 1). In 1953 the International Business machine (IBM)
650 and 700 series Computers made their mark in the computer world .During this generation of computer
over 100 computer programming languages were developed ,computers had memory and operating
system. Storage media such as tape and disk were in use also were printers for output.
Third Generation 1963 - Present - The invention of integrated circuit brought us the third generation
of computer. With this invention computers became smaller, more powerful, more reliable and they are able
to run many different programs at the same time. In 1980 Microsoft Disk Operating System (MS-Dos) was
born and in 1981 IBM introduce the Personal Computer (PC)for home and office use. Three years later
Apple gave us the Macintosh computer with is icon driven interface and the 90s gave us windows operating
system.
As a result of the various improvement to the development of the computer we have seen the
computer being used in all areas of life. It is a very useful tool that will continue to experience new
development as time passes.
What does Computer Mean?
A computer is a machine or device that performs processes, calculations and operations based on
instructions provided by a software or hardware program. It is designed to execute applications and
provides variety of solutions by combining integrated hardware and software components
A computer is made up of multiple parts and components that facilitate user functionality .A
computer has two primary categories:
1. HARDWARE:
Physical structure that houses a computers processor, memory, storage, communication ports and
peripheral devices.
2. SOFTWARE:
Include Operating System (OS) and software application.
A computer works with software programs that are sent to its underlying hardware architecture for
reading, interpretation and execution. Computers are classified according to computing power capacity ,
size, mobility, and other factors , as personal computers (PC), desktop, minicomputers, handheld
computers and devices ,mainframes or supercomputers.
COMPUTER FUNDAMENTALS
A computer is an electronic machine that accepts data, stores and processes data into information.
The computer is able to work because there are instruction in its memory directing it. The parts of the
computer that you can see and touch, such as the keyboard, monitor, and the mouse are called hardware.
The instructions that direct the computer are called software or computer program.
Data which is raw facts that the user enters into the computer is called input. These includes;
words, numbers, sound and pictures When the data is entered into the computer, the computer processes
the data to produce information which is output. For example, you enter 2+2 into the computer as data, the
computer processes it and the result is 4 which is information.
Computers are usually categories into three general categories:
1. Supercomputer - The fastest, largest, most powerful and most expensive computer.
2. Mainframe Computer - This is a little smaller and less powerful than the supercomputer, but, like
the supercomputer it is also expensive.
3. Personal Computer (PC)- This is the computer that most people use in their daily lives. This
computer is much smaller, less powerful and less expensive than the supercomputer and the
mainframe computer.
There are two main types of personal computers. Macintosh (Macs) and the PC compatibles (PC). The
main difference between the two is the operating systems and the processors they use. This category of
computer has two additional types of computers. These are mobile computer and handheld computer. The
most popular type of mobile computer is the notebook or laptop computer, and the handheld computer is a
very small PC that you can hold in your hand.
It is important to note that, any computer; regardless of its size has an input device, output device and a
system unit.
Computer Hardware
You learned earlier that a computer has electronic and mechanical parts known as hardware. Hardware
also includes input devices, output devices, system unit, storage devices and communication devices.
Without these components we would not be able to use the computer.
Input Devices - An input device is any hardware component that allows you the user to enter data into the
computer. There are many input devices.
Six of the most widely used input devices are:
1. Keyboard -- You use the keyboard to type letters, numbers. and symbols into the computer.
2. Mouse-the mouse is the pointing device that has a pointer that changes into different shapes as you use
the mouse. You click the mouse by pressing and releasing the button. This action allows you to enter data
when using a mouse.
3. Scanner-this input device copies from paper into your computer.
4. Microphone- the microphone is usually used for voice input into the computer.
5. Digital Camera-the digital camera allows you to take pictures that you can input into your computer.
6. PC Video Camera- the PC video camera allows you to take both video and still images that you can
input unto your computer.
Output Devices- An to output device is any hardware component that gives information to the user.
Three commonly used output devices are as follow:
1. Monitor - This output device displays your information on a screen.
2. Printer -- This output device prints information on paper.
This type of printed output is called a hard copy
3. Speaker -- Sound is the type of output you will get from a speaker.
Computer Software
The computer will not work without software. Software also call programs. These are the
instructions that tell the computer what to do and how to do it. The two main categories of software are
system software and application software. The system software also called the operating system (OS)
actually runs the computer. This software controls all the operations of the computer and its devices. All
computers use system software and without the system software the application software will not work. The
most common OS on a PC is the Windows operating system and for the Mac computer it would be the Mac
operating system.
Application software is a program that allows users to a specific task on the computer. There are a number
of different types of application software available to do many of the tasks we do daily.
Four examples of common application software and what they are used for are:
1. Word Processing Application: One word processing program is Microsoft Word. This program
allows you to type letters, assignments and do any other written activity on the computer.
2. Spreadsheet Application: Microsoft Excel is an example of a spreadsheet program. One can use
this program to create charts and do calculations.
3. E-mail Application: Outlook Express is an e-mail program that allows you to receive and send e-
mails.
4. Internet Application: Internet Explorer is a program that allows you to get connected to the Internet
and look at Web sites like the one you are reading now.
It is important to note that when you buy a computer the computer comes with the operating system and
some software already installed. You may have to buy more software and install them on the computer.
Install means to load the software onto the hard disk of the computer so that you can run or use the
software.
Like any other equipment the computer needs to be cared for; let us discuss how we should go about
caring for our computer.
Storage Media
Storage keeps data, information and instructions for use in the future. All computers use storage to keep
the software that makes the hardware work.
As a user you store a variety of data and information on your computer or on storage media. Storage media
are the physical materials on which data, information and instructions are kept. When a user saves
information or data to a storage medium he or she is storing a file, and this process is called writing. When
the file is opened the process is called reading.
Common storage media are:
1. Hard Drive: This storage medium which looks like the one below, is a hard drive. This medium
comes with the computer and is always inside the computer. It stores all the programs that the
computer needs to work. In addition, users store their data and information on the hard drive.
2. Floppy Disk: This storage medium is considered to be a portable storage medium. You put it into
the computer save your information on it, take it out, and take it with you wherever you go.
3. CD &DVD: these types of storage media hold much more information than a floppy disk. They are
also considered portable storage. These type of storage media come in different forms. This
means there are CD's and DVD's that you can only save information on but you cannot erase the
information. In addition there are those can both save information on and erase the information you
have saved.
4. USB Flash Drive: This it is a storage medium that is very easy to carry around and it also holds
more data than a floppy disk. As you can see from the picture below it is very small when
compared with the others.
Computer Care
Taking care of your computer is just as important as taking care of your books. Both the internal
and the external parts of the computer have to be cared for. Scanning, defragging and reformatting are
some of the activities performed to clean up the hard drive. These activities are best left to a grown up and
such you should not attempt them.
However, there are certain tasks you can perform to ensure your computer is clean; here are a few:
1. Keep Dust Away: Dust your computer to keep it free of dust and dirt.
2. Keep Food Away: Do not eat or drink while working on the computer.
3. Use Clean Hands: Make sure your hands are clean before you type on the keyboard of click the
mouse.
4. Treat With Respect: If you are having problems with your computer, ask for help. Do not bang or hit
the computer.
5. Keep Off: Seeing that the computer is connected to electricity, this means that lightning could be
conducted to yourcomputer through the electrical connection. For this reason it is best not to use
your computer during a storm.
6. Stop Virus Attack: A computer virus is a program written by a person on purpose to harm other
one peoples' computer. A computer virus is passed from one computer to another when you share
and download files without protection.
HISTORY OF INTERNET
The Internet Timeline begins in 1962, before the word "Internet" is invented. The world’s 10,000
computers are primitive, although they cost hundreds of thousands dollars. They have only a few
thousands words of magnetic core memory, and programming them is far from easy.
Domestically, data communication over the phone lines id an AT&T monopoly. The "Picturephone"
of 1939, shown again at the New York World's Fair in 1964, is still AT&T's answer to the future of worldwide
communications.
But the four-year old Advanced Research Projects Agency (ARPA) of the U.S Department of
Defense, a future-oriented funder of high-risk, high-gain research, lays the groundwork for what becomes
the ARPANET and, much later, the Internet.
ARPANET adopted TCP/IP on January 1,1983, and from there researchers began to assemble the
"network of networks" that became the modern Internet. The online world then took on a more recognizable
form in 1990, when computer scientist Tim Berners-Lee invented the World Wide Web.
Vint Cerf, widely known as a "Father of the Internet", Cerf is the co-designer of the TCP/IP
protocols and the architecture of the Internet. In December 1997, President Bill Clinton presented the U.S
National Medal of Technology to Cerf and his colleague, Robert E. Kahn, for founding and developing the
Internet.
Michael Bauer, the original owner of Internet.org before Facebook founder and CEO Mark
Zuckerberg, discovered what became of his treasure domain just like anyone else: while watching Chris
Cuomo on CNN.
MEANING OF INTERNET
The Internet, sometimes called simply "the Net", is a worldwide system of computer networks-a
network of networks in which users at any one computer can, if they have permission, get information from
any other computer (and sometimes talk directly to users at other computers).
It is also a means of connecting a computer to any other computer anywhere in the world via
dedicated routers and servers. When two computers are connected over the Internet, they can send and
receive all kinds of information such as text, graphics, voice, video and computer programs.
Basically, the way the Internet works is by connecting billions of computers together in things called
networks. Networks ("Net" for short) are clusters of computers linked together so that they can send data to
each other. That is the ISP', network you are on. The Internet grew out of the Advanced Research Projects
Agency's Wide Area Network (then called ARPANET) established by the US Department Of Defense in
1960s collaboration in military research among business and government laboratories.
Later universities and other US institutions connected to it. This resulted in ARPANET growing
beyond everyone's expectations and acquiring the name "Internet". The development of hypertext-based
technology (called World Wide Web, WWW, or just the Web) provided means of displaying text, graphics,
and animations, and easy search and navigation tools that triggered Internet's explosive worldwide growth.
- Cybercrime is an activity done using computers and the internet. We can say that
it is an unlawful act wherein the computer either as a tool or target or both
- Cybercrime is any crime that takes place online or primarily online. That can run
the gamut from the aforementioned identity theft and other security breaches to
things like "revenge porn." cyber-stalking, harassment, bullying, and even child
sexual exploitation Terrorists are collaborating more on the Internet, moving that
most terrifying of crimes into cyberspace.
Cybercrime first started with hackers trying to break into computer networks.
Some did it just for the thrill of accessing high-level security networks, but others sought
to gain sensitive, classified material. Eventually, criminals started to infect computer
systems with computer viruses, which led to breakdowns of personal and business
computers.
Banks and other financial institutions were amongst the first large-scale computer
users in the private sector, to automate payroll and accounting functions. Therefore,
fraud in a computer scheme emerged. One of the first cases cited as an instance of the
computer fraud involved an equity-funding Corporation in the US, fraud was simple.
The frauds succeed because the auditors and regulators accepted computer
printouts as definitive evidence of policies and did not ask for original documentation.
When the fraud was discovered some 64,000 out of 97.000 policies allegedly issued by
the company proved to be false, almost 1 billion pounds estimated to be the loss.
Several individuals have engaged in the fight again computer crime from its early
development. The founder and father of the knowledge of computer crimes are by
many observers considered to be Donn B. Parker, USA. He was involved in the
research of computer crime and security since early 1970.
The criminal abuse of information technology and the necessary legal response are
issues that have been discussed ever since the technology was introduced. Over the last 50
years, various solutions have been implemented at the national and regional levels. One of the
reasons why the topic remains challenging is the constant technical development, as well as the
changing methods and ways in which the offenses are committed.
In the 1970s, the use of computer systems and computer data increased further, At the
end of the decade, an estimated number of 100 000 mainframe computers were operating in
the United States. With falling prices, computer technology was more widely used within
administration and business, and by the public. The 1970s were characterized by a shift from
traditional property crimes against computer systems that had dominated the 1960s, to new
forms of crime. While physical damage continued to relevant forms of criminal abuse against
computer systems, new forms of computer crime were recognized. They included the illegal use
of computer systems and the manipulation of electronic data. The shift from manual to
computer-operated transactions led to another new form of crime computer-related fraud.
Already at this time, multimillion-dollar losses were caused by computer-related fraud.
Computer-related fraud, in particular, was a real challenge, and law enforcement
agencies were investigating more and more cases. As the application of existing legislation in
computer-crime cases led to difficulties, a debate about legal solutions started in different parts
of the world. The United States discussed a draft bill designed specifically to address
cybercrime. Interpol discussed the phenomena and possibilities for a legal response.
In the 1980s, personal computers became more and more popular. With this
development, the number of computer systems and hence the number of potential targets for
criminals again increased. For the first time, the targets included a broad range of critical
infrastructure. One of the side effects of the spread of computer systems was an increasing
interest in software, resulting in the emergence of the first forms of software piracy and crimes
related to patents. The interconnection of computer systems brought about new types of
offenses. Networks enabled offenders to enter a computer system without being present at the
crime scene. In addition, the possibility of distributing software through networks enabled
offenders to spread malicious software, and more and more computer viruses were discovered.
Countries started the process of updating their legislation to meet the requirements of a
changing criminal environment. International organizations also got involved in the process.
OECD and the Council of Europe set up study groups to analyze the phenomena and evaluate
possibilities for a legal response.
The introduction of the graphical interface ("WWW") in the 1990s which was followed
by rapid growth in the number of Internet users led to new challenges. Information legally
made available in le country was available globally - even in countries where the publication of
such information was criminalized. Another concern associated with online services that turned
out to be especially challenging in the investigation of the transnational crime was the speed of
information exchange. Finally, the distribution of child pornography moved from a physical
exchange of books and tapes to online distribution through websites and Internet services.
While computer crimes were in general local crimes, the internet turned electronic crimes into
transnational crimes. As a result, international, the international community tackled the issue
more intensively. UN General Assembly Resolution 45/121 adopted in 1990 and the manual for
the prevention and control of computer-related crimes issued in 1994 are just two examples.
As in each preceding decade, new trends in computer crime and cybercrime continued
to be discovered in the 21st century. The first decade of the new millennium was dominated by
new, highly sophisticated methods of committing crimes, such as “phishing” and "botnet
attacks", and the emerging use of technology that is more difficult for law enforcement to
handle and investigate, such as "voice-over-IP (VoIP) communication and “cloud computing”. It
is not only the methods that changed but also the impact. As offenders became able to
automate attacks, the number of offenses increased. Countries and regional and international
organizations have responded to the growing challenges and given response to cybercrime high
priority.
DEFINITION OF CYBERCRIME
WHAT IS CYBERCRIME?
Below are some of the aspects that computer criminals can be dangerous:
a. Human Threat
b. Organizational Threat
c. Group threat
d. National Security Threat
Have you ever received an email saying you have inherited five million dollars from a
prince in another country? According to the email, all you need to do is provide the sender with
your bank account number, and he'll put the money in your account, making you an instant
millionaire! Sometimes, this scheme works. As a result, unfortunate individuals who provided
the prince with their bank account numbers later discovered that their accounts had been
cleaned out.
Cybercrime consists of illegal activity conducted on a computer. Traditional crimes may
be committed while using a computer, but cybercrime consists of more specific types of crimes
such as phishing schemes and viruses.
Cybercrimes can be defined as "Offenses that are mitted against individuals or groups of
individuals with a criminal motive to intentionally harm the reputation of the victim or cause
physical or mental harm, or loss, to the victim directly or indirectly, using modem
telecommunication networks such as the Internet (networks including but not limited to Chat
rooms emails notice boards and groups) and mobile phones (Bluetooth/ SMS/ MMS)".
Cybercrime may threaten a person or a nation's security and financial health. Issues
surrounding these types of crimes have become high-profile, particularly those surrounding
hacking, copyright infringement, unwarranted mass surveillance, sextortion, child pornography,
and child grooming. There are also problems of privacy when confidential information is
intercepted or disclosed, lawfully or otherwise,
Debarati Halder and K. Jaishankar further define cybercrime from the perspective of
gender and defined cybercrime against women as “Crimes targeted against women with a
motive to intentionally harm the victim psychologically and physically, using modern
telecommunication networks such as internet and mobile phones. Internationally, both
governmental and non-state actors engage in cybercrimes, including espionage, financial theft,
and other cross-border crimes. Cybercrimes crossing international borders and involving the
actions of at least one nation-state are sometimes referred to as cyberwarfare.
A report (sponsored by McAfee) estimates that the annual damage to the global
economy is at $445 billion; however, a Microsoft report shows that such survey-based
estimates are "hopelessly flawed” and exaggerate the true losses by orders of magnitude.
Approximately $1.5 billion was lost in 2012 to online credit and debit card fraud in the US. In
2016, a study by Juniper Research estimated that the costs of cybercrime could be as high as
2.1 trillion by 2019.
There has been confusion on the criteria used to determine the definition of the term
Cyber Crimes or computer crimes. Some argued that it is any crime that involves the use of a
computer some argued that it is a crime in the presence of a computer. However, some have
criticized the categorization of cybercrime.
Donald Gotternbarn argued that there is nothing special about the crimes that happen
to involve a computer. Is it possible for a crime to be categorized in accordance to a tool,
equipment, mechanism, or means through which was committed? if that's so, how many
categories of crime we would be there? How about the crime committed through using a
television, automobiles, scalpel, scissors, and others categorized of them as individual crimes?
Therefore, let Cyber Crimes be Cyber Crimes. Foreste and Morrison argued that
cybercrime is a criminal act in which a computer is used as a principal tool. In that matter, the
theft of a computer hardware device, would not qualify as a computer crime.
Is it true by using a computer as the principal tool to commit a crime will amount to a
computer or cybercrime? For instance, in taxable transactions, in the case of data entry, can't a
person commit fraud by just filling the wrong data into a hardcopy version of tax forms which
are the same available in electronic forms?
Roy Girasa (2002) argued that cybercrime is a generic term covering the multiplicity of
crimes found in penal codes or legislation having the use of computers as a central component.
To him Ubiquity, global reach, universal standards, information richness, interactivity,
information density, personalization customization, and social technology. As a result of these
features, it achieves unprecedented reach and makes available vast amounts of information of
varying degrees of quality. Internet users cannot be regarded as a homogenous group.
Cybercrime is a crime as long as the penal codes and other legislation stipulate it as
involving not only the computers but the use of computers as the center component.
At the Tenth United Nations Congress on the Prevention of Crime and Treatment of
Offenders, in a workshop devoted to issues of crimes related to computer networks, cyber a
broken into two categories and defined thus:
Even though this definition is not completely definitive, however, it gives us a good starting
point, for determining just what cybercrime means, by incorporating computer crime and
computer-related crime.
However, the relationship can also be indirect, the criminal can not only use a computer
to commit his crime but can also use someone to make changes in a computer system, by
manipulating a key computer user. Thus, one is the exploitation of weaknesses in the technical
IT infrastructure, the other is an exploitation of trust in the social fabric of IT users within the
organization.
The legal, technical, and institutional challenges posed by the issue of cybersecurity are
global and far-reaching, and can only be addressed through a coherent strategy taking into
account the role of different stakeholders and existing initiatives, within a framework of
international cooperation. In this regard, the World Summit on the Information Society (WSIS)
recognized the real and significant risks posed by inadequate cybersecurity and the
proliferation of cybercrime. The provisions of SS 108-110 of the WSIS Tunis Agenda for the
Information Society including the Annex, set out a plan for multi-stakeholder Understanding of
cybercrime: Phenomena, challenges, and legal response implementation at the international
level of the WSIS Geneva Plan of Action, describing the multi-stakeholder implementation
process according to eleven action lines and allocating responsibilities for facilitating the
implementation of the different action lines. At WSIS, world leaders and governments
designated ITU to facilitate the implementation of WSIS Action Line C5, dedicated to building
confidence and security in the in this regard, the ITU Secretary-General launched the G
The fight against cybercrime needs a comprehensive approach. Given that technical
measures alone cannot prevent any crime, it is critical that law-enforcement agencies are
allowed to investigate and prosecute cybercrime effectively. Among the GCA work areas. "Legal
measures" focus on how to address the legislative challenges posed by criminal activities
committed over ICT networks in an internationally compatible manner. "Technical and
procedural measures" focus on key measures to promote the adoption of enhanced
approaches to improve security and risk management in cyberspace, including accreditation
scheme protocols and standards. "Organizational structures" focus on the prevention
detection, response to, and crisis management of cyberattacks, including the protection of
critical infrastructure systems. "Capacity building" focuses on elaborating strategies for
capacity-building mechanisms to raise awareness, transfer know-how, and boost cybersecurity
on the national policy agenda. Finally. "International cooperation focuses on international
cooperation, dialogue, and coordination in dealing with the cyber threat
In the same survey, the table below shows that the most successful cybercrimes contain,
phishing and malware as starting points. Attacks focused on disruption and stealing money
ranked third and fourth.
HACKING SKILLS
As an ethical hacker, there is a need to understand various hacking techniques, which
are as follows:
a) Password guessing and cracking
b) Session hijacking
c) Session spoofing
d) Network traffic sniffing
e) Denial-of-service attacks
f) Exploiting buffer overflow vulnerabilities
g) Structured Query Language (SQL) injection
BASIC SKILLS
Computer hacking is both a technology and an art form. To gain experience and become
an experienced hacker, one must put in a lot of work. Once on track, further work is needed to
stay current with emerging technology, bugs, and exploitation techniques. An ethical hacker
must be a computer systems expert and needs to have very strong programming and computer
networking skills.
a. An ethical hacker must have a great deal of courage, determination, and perseverance
in order to attempt again and again before the desired outcome is obtained.
b. To use social engineering exploits, the ethical hacker must be clever enough to consider
the scenario and the attitude of other people.
c. A decent ethical hacker is also a perfect problem-solver.
5. CYBER CRIMINALS
- The opportunity for material gain motivates cyber criminals. They rob by breaking into
company servers and converting funds from one account to another, leaving a
hopelessly confusing path for law enforcement to trace. They stole and resold credit
card numbers, personal names, and cellphone IDs, among other type of computer fraud.
6. CYBERTERRORISTS
- In order to advance such political or social objectives, a cyberterrorist conducts a
computer-based assault against other computer or networks in an effort to intimidate
or coerce a nation. Cyber terrorists employ tactics to destroy or interrupt a network in
order to inflict damage rather than gather information. They are extremely risky, since
they regard themselves as at war, have a high-risk tolerance and pursue full effects.
CLASSIFICATION OF HACKERS
Hackers are divided into groups based on their motivation for breaking into a structure.
Both words are derived from old spaghetti westerns in which the bad guy wears black cowboy
hat and the good guy wears a white cowboy hat
2. Black Hat Hackers - These hackers, also known as "crackers," attempt to obtain
unauthorized access to a device in order to disrupt its activities or steal classified
information. Because of its bad intent, black hat hacking is still illegal, like
stealing corporate data, breaching privacy, causing server damage, blocking
network connectivity, and so on.
3. Gray Hat Hackers - These hackers are a mix of black and white. They behave
without malice, just or the sake of amusement, they exploit a security flaw in a
computer device or network without the consent or knowledge of the owner.
They want put the flaw to the notice of the owners in exchange for gratitude or a
small reward. Have note. Hackers, whether gray or grey, are the same
4. Miscellaneous hackers
There are other types of hackers depending on what they hack and how hack, in addition to the
well-known ones mentioned above. The following are some of them:
a. Red Hat Hacker - Is a combination of black and white hat hackers. They normally
operate at the level of hacking government departments, top-secret intelligence hubs,
and everything else that pertains to classified data.
b. Blue Hat Hacker - Is a person who works independently of computer security
consultancy companies and is responsible for bug-testing a device prior to its release.
They search for flaws in the system that can be used and work to plug them. The word
"Blue Hat” is used by Microsoft to refer to a series of security briefings.
c. Elite Hacker - Is a hacker's social standing that is used to identify the most experienced
hacker.
d. Script Kiddie - Is a non-expert who breaks into computer systems using pre-packaged
programmed tools written by others and no knowledge of the underlying definition,
hence the name "kiddie."
e. Green Hat Hacker (Neophyte, "n00b," "Newbie) – Is someone who is new to hacking or
phreaking and has little to no understanding about how computers and hacking work.
1. Viruses
- there are applications that travel through networks and operating systems, attaching
themselves to a variety of other programs and databases. These disruptive viruses can
modify and/or erase files after they have been enabled. It is a serious offense to
intentionally distribute a virus. Unfortunately, new viruses emerge on a regular basis.
The best way to remain up to date is to subscribe to utilities that monitor viruses on a
regular basis
For example, Symantec, McAfee, and Microsoft all tract the most serious virus threats
2. Worms
- There are programs that repeatedly reproduce themselves. The self-replicating activity
computers and networks until it becomes involved in a network, slowing or stopping
their operations. A new worm spread around the globe in hours, shutting down tens of
thousands of machines in the process. A worm, unlike a virus, does not bind itself to a
computer or alter or erase files. Worms, on the other hand, can bear a virus If a worm
has dropped a virus into an unwitting operating device, the virus will either activate
right away or remain inactive until a later date.
Notes: Viruses and worms are usually spread through e-mail attachments and programs
downloaded from the Internet. Since viruses are so dangerous, computer users are cautioned
to never open an e-mail attachment from an unknown sender and to take extreme caution
when installing new programs or data from any source.
The Antivirus software warns users as viruses and worms infiltrates their operating system.
Unfortunately, new viruses emerge on a regular basis, and not all of them can be identified.
3. Trojan Horses
There are applications that tend to be harmless, but they actually contain malicious
code, Trojan horses aren't the same as viruses. they, like worms, can, however, carry
viruses. Trojan horses are most often seen in the form of free video games and
screensaver applications that can be downloaded from the Internet. When user runs
one of these applications, the trojan horse often installs a virus on the operating system
without the user's knowledge. The virus then starts causing problems. One of the most
Trojan horse forms claims to provide free antivirus software.
4. Denial of Service
By overwhelming a computer system or network with requests for information and
data, a denial of service attack aims to delay or stop it. When a malicious hacker takes
control of computers on the Internet, they spam a target server with requests for data
and other minor activities. It does not entail gaining access to the targeted device.
Instead, it leaves the target so busy responding to a torrent of automatic requests that
legitimate users are unable to access the site - the Internet equivalent to constantly
dialing a phone number so that all other callers get a busy signal. Once the ISP or
website has been hacked, the computers at the ISP or website become overburdened by
demands for service and are unable to respond to legitimate users. As a result, the
internet service provider (ISP) or website is effectively shut down. Internet Service
Providers (ISPs) and individual websites are typically the targets of these attacks.
6. Identity Theft
Identity stealing is the fraudulent use of another person's identity for financial gain.
When a person's identity is taken, the suspect obtains new credit cards under the
victim's name. From Social Security numbers and dates of birth to account records and
passwords, identity hackers search for something that can help them steal someone's
identity. They often get this information from social networking sites, where people
often share personal details such as birth dates, family member names, home
addresses, and so on. The easiest way to protect yourself from identity hackers is to
take discretion when providing information on social networking sites and to make use
of the privacy settings and controls available.
7. Internet Scams
A scam is a misleading or unethical act or activity that entices people into sharing
personal information or wasting time and resources with little or no benefit. An Internet
fraud is basically a con that takes place over the internet. Almost all Internet scams
begin with a mass mailing to unwitting recipients.
Notes: Phishing is a common scam tactic used by con artists. Phishing is a method of deceiving
Internet users into believing a false yet official-looking website or e-mail is genuine. Phishing
has advanced to the point that it now replicates whole websites, such as PayPal, in an attempt
to trick users into divulging their financial details.
8. Rootkits
A rootkit is a collection of programs that allows its user to obtain administrator-level
access to a device without the permission or knowledge of the end user. The rootkit
allows attackers to execute files, access logs, track user behavior, and alter the
computer's configuration.
9. Spam
Spam e-mail is the practice of sending unsolicited e-mail to vast groups of individuals
using email services. The majority of spam is low-cost promotional advertisements,
mostly for dubious goods like pornography, bogus get-rich-quick schemes, and useless
stock.
10. Phishing
Phishing is the malicious use of e-mail to try to get the user to share personal
information. In a phishing scam, a con artist sends out e-mails that appear to be from a
reputable source, encouraging the user to take action in order to avert undesirable
repercussions or to earn a payout. Spear-phishing is a form of phishing in which the
phisher sends phony e-mails to employees of a specific company.
11. Adware - It's a piece of software that forces pre-selected advertisements to appear on a
computer.
12. Attack - It is a procedure for gaining access to a device and extracting confidential data.
13. Back Door - This hidden access to a computer system or app, also known as a "trap
door," bypasses authentication mechanisms such as logins and password defenses.
14. Botnet - It's a program that automates a task so that it can be carried out at a much
faster pace and over a longer period of time than a human operator might. Sending
HTTP, FTP, or Telnet at a faster rate, or calling script to generate objects at a faster rate,
for example. A botnet, also known as a "zombie army," is a collection of computers that
are managed without the knowledge of their users. Botnets are used to deliver spam
and launch distributed denial-of-service attacks.
15. Brute Force Attack - It is the easiest and most automatic way of gaining access to a
device or website. It repeatedly attempts various combinations of usernames and
passwords before it succeeds.
16. Buffer Overflow - If more data is written to a block of memory or a buffer than the
buffer is allocated to contain, this is a mistake.
17. Clone Phishing - It is the addition of a false connection to an actual, valid e-mail in order
to dupe the receiver into sharing personal information.
18. Exploit Kit - It's a software framework that runs on Web servers to find software flaws
in client computers that communicate with it, then exploits those flaws to upload and
execute malicious code on the client.
19. Exploit - It's a piece of software, a block of code, or a series of commands that exploits a
flaw or loophole in a device or network device to undermine its protection.
20. Firewall - A firewall is a security device that keeps unauthorized intruders out of a
computer system or network while allowing secure contact between devices and users
on the inside.
21. Keystroke Logging - This is the procedure for keeping track of the keys pressing on a
monitor (and which touchscreen points are used). It's nothing more than a
computer/human interface map. Gray and black hat hackers use it to keep track of login
IDs and passwords. A Trojan sent via phishing e-mail is typically used to install key
loggers on a computer.
22. Logic Bomb - It is a virus that is secreted into a device and when those requirements are
met, it performs a malicious operation. The time bomb is the most popular variation of
this.
23. Malware - It's a catch-all word for a wide range of malicious malware, from computer
viruses, worms, Trojan horses, malware, spyware, adware, scareware, and other
malicious programs.
24. Master Program - This is the software that a black hat hacker uses to send orders to
infected zombie drones over the internet, usually to carry out DoS or spam attacks.
25. Phreakers - These was thought to be the first computer hackers. They are those who
unlawfully gain access to the mobile network in order to make free long-distance calls or
tap phone lines.
26. Shrink Wrap Code - This is the process of finding flaws in unpatched or incorrectly
designed applications and exploiting them.
27. Social Engineering - This entails deceiving others in order to obtain confidential and
personal data such as credit card numbers, usernames, and passwords.
28. Spoofing - It's a method of gaining unwanted access to computers in which an attacker
sends messages to a device with an IP address that indicates the message came from a
trustworthy host.
29. Spyware - This is software that collects information about an individual or organization
without their permission and may transmit that information to another party without
their consent, or that asserts authority over a device without their knowledge.
30. SQL Injection - This is a SQL code injection technique for targeting data-driven
applications in which malicious statements are inserted into an entry field for execution
(for example, to dump the database contents to the attacker).
31. Threat -It is a potential threat that can undermine the protection of a device or network
system exploiting an internal flaw or weakness.
32. Vulnerability - This is a flaw that helps a hacker to break through a computer or network
system's safe.
33. Cross-site Scripting (XSS) - This is a common form of computer security flaw found in
Web applications. Attackers may use XSS to insert client-side script into Web pages that
are being used by other users.
34. Zombie Drone - It is described as a computer that has been hacked and is being used
anonymously as a soldier or "drone" for malicious purposes, such as sending unwanted
spam e-mails,
2. Scanning – during this process, the attacker deliberately probes a target computer or
network for exploitable vulnerabilities. Nessus or Nexpose are the methods used in this
phase.
3. Gaining Access – the vulnerability is discovered during this operation. The attacker tries
to use it to gain access to the device. Metasploit is the most important method in the
operation.
4. Maintaining Access – when a hacker has already obtained access to a device, this is the
method. After obtaining entry, the hacker sets up some backdoor to allow him access to
the device in the future if he wants it. In this method, Metasploit is the preferred tool.
6. Reporting – this is the last move in the ethical hacking procedure. The ethical hacker
compiles a paper detailing his or her discoveries and the job that was completed,
including the methods used, progress rate, bugs discovered, and exploit processes.
TYPOLOGY OF CYBERCRIME
In traditional means, the term crime covers a broad range of offenses. It is from this
broad range the typology or classification of cybercrime became difficult.
A good example of an international instrument that tried to categorize types of
cybercrime is the Council of Europe the History of Global Harmonization on Cyber Crime
Legislation, The Road to Geneva, December 2008.
The Convention on Cyber Crime distinguishes between four different types of offenses.
1. Offenses against the confidentiality, integrity, and availability of computer data and
systems, such as illegal access, illegal interception, data interference, system
interference, and misuse of devoicing.
2. Computer-related offenses, such as computer-related forgery and computer-related
fraud.
3. Content-related offenses, such as offenses related to child pornography; And
4. Copyright-related offenses, such as offenses related to copyright infringements and
related rights.
Even though this typology of cybercrime is not wholly consistent the fourth category does
not focus on the object of legal protection but on the method, which in turn brings about the
overlap between categories. Nonetheless, the categories serve as a useful basis for discussing
the phenomena of cybercrime globally.
The term “cybercrime” is used to cover a wide variety of criminal conduct. As recognized
crimes include a broad range of different offenses. It is difficult to develop a typology or
classification system for cybercrime.
One approach can be found in the Convention on Cybercrime, which distinguishes between
four different types of offenses.
1. Offenses against the confidentiality, integrity, and availability of computer data and
systems;
2. Computer-related offenses;
3. Content-related offenses;
4. Copyright-related offenses.
The typology is not wholly consistent, as it is not based on a sole criterion to differentiate
between categories. Three categories focus on the object of legal protection “offenses against
the confidentiality, integrity and availability of computer data and system”, “content-related
offences; and copyright-related offenses. The fourth category of “computer-related offences”
109 does not focus on the object pf legal protection, but on the method used to commit the
crime. This inconsistency leads to some overlap between categories.
TYPES OF CYBERCRIME
1. FINANCIAL CRIMES
Credit Card Frauds, Money Laundering
2. CYBER PORNOGRAPHY
Pornographic Websites, Online distribution
3. ONLINE GAMBLING
Millions of websites, all hosted on servers abroad. offer online gambling.
4. IP CRIMES
Software Piracy: Copyright Infringement; Trademarks Violations; Theft of
Computer Source Code,
5. EMAIL SPOOFING
A spoofed email one that appears to originate from one source but actually has
been sent from another source.
6. CYBER DEFAMATION
This occurs when defamation takes place with the help of computers and/or the
internet. E.g. someone publishes defamatory matter about another on a website.
7. CYBER STALKING
This involves following a person's movements across the Internet by posting
messages (sometimes threatening) on bulletin boards frequented by the victim,
entering chat-rooms frequented by the victim, constantly bombarding the victim with
emails etc.
8. UNAUTHORIZED ACCESS
Also known as Hacking. Involves gaining access illegally to a computer system or
network and in some cases making unauthorized use of this access. Hacking is also the act
by which other forms of cyber-crime (e.g., fraud, terrorism) are committed.
9. THEFT
Theft of any information contained in electronic form such as that stored in
computer hard disks. removal storage media, etc. Can extend to identity theft.
10. EMAIL BOMBING
This refers to sending a large number of emails to the victim resulting in the victim's
email account (in case of an individual) or mail servers (in case of a company or an email
service provider) crashing
13. VIRUS/WORM
Viruses are programs that attach themselves to a computer or a file and then
circulate themselves to other files and to other computers on a network They usually affect
the data on a computer, either by altering or deleting it. Worms, unlike viruses do not need
the host to attach themselves to. They merely make functional copies of themselves and do
this repeatedly till they eat up all the available space on a computer's memory.
17. CYBER-TERRORISM
Hacking designed to cause terror. Like conventional terrorism, e-terrorism' is utilizes
hacking to cause violence against persons or property, or at least cause enough harm to
generate fear.
3. Computer fraud
- is any dishonest misrepresentation of fact intended to let another to do or
refrain from doing something which loss. In this context, the fraud will result in
obtaining a benefit by:
a. Altering in an unauthorized way. This requires little technical expertise and is a
common form of theft by employees altering the data before entry or entering
false data, or by entering unauthorized instructions or using unauthorized
processes:
b. Altering, destroying, suppressing, or stealing output. usually to conceal
unauthorized transactions. This is difficult to detect;
c. Altering or deleting stored data; 4. Other forms of fraud may be facilitated using
computer systems, including
A variety of internet scams, many based on phishing and social engineering, target
consumers and businesses.
CYBERTERRORISM
Government officials and information technology security specialists have
documented a significant increase in Internet problems and server scans since early
2001. But there is a growing concern among government agencies such as the Federal
Bureau of Investigations (FBI) and the Central Intelligence Agency (CIA) that such
intrusions are part of an organized effort by cyberterrorists, foreign intelligence services,
or other groups to map potential security holes in critical systems. A cyberterrorist is
someone who intimidates or coerces a government or an organization to advance his or
her political or social objectives by launching a computer-based attack against
computers, networks, or the information stored on them.
STALKING DEFINED
The definition for stalking is when a perpetrator singles out a specific person and
causes the person emotional distress and causes the individual to fear his or her life,
safety, or safety of others. A stalker can be a former boyfriend or girlfriend, an
acquaintance or a stranger.
Sample scenario:
Carrie walks back to her dorm, but she cannot shake the feeling that she’s being
watched. Over the last two weeks, she has received several blocked calls to her
cellphone. Sometimes she will answer the calls, and other times she lets it go to
voicemail. When she answers, no one speaks, and whoever it is does not leave a
voicemail message. Carrie has also been getting emails to her school account. The
emails her that she is pretty, and there will be comments about the pants or shirt she
wore that day. Tonight, Carrie feels she needs to talk to the police because she feels
someone is stalking her.
In order for stalking to be a crime, there has to be two or more occasions of visual or
physical proximity; non-consensual communication, either written or verbal; threats; or a
combination of any of these occasions. In the example, Carrie has had a combination of
these occasions and is being subjected to several types of stalking.
TYPES OF STALKING
Stalking can occur in several forms.
2. CYBERSTALKING
Maria is also a victim of cyberstalking, which is the use of electronic means, such
as the Internet or cellphones, to stalk victims. Cyberstalking is also considered
unsolicited contact from the perpetrator to the victim. The difference between
cyberstalking and surveillance stalking is done in physical sense, and
cyberstalking is done through technology and electronic means. The perpetrator
has not made physical contact, so the stalking is not considered aggravated
stalking.
3. AGGRAVATED STALKING
Occurs when the perpetrator restrains the victim, causes bodily harm to the
victim, or violates an order of protection. Maria has not had any of these happen
to her, so her stalker is using surveillance stalking and cyberstalking.
TYPES OF STALKERS
Actions define the type of stalking, but personalities combined with the actions
define the type of stalkers:
1. REJECTED STALKER
- This type of stalker becomes upset when the friendship or romantic relationship
has ended. The rejected stalker is not only self-centered and jealous but also
over-dependent and persistent.
2. RESENTFUL STALKER
- The resentful stalker feels humiliated that the relationship has ended and seeks
revenge upon the victim. Resentful stalkers are often irrationally paranoid and
are known to verbally assault their victims.
3. PREDATORY STALKER
- It seeks power and sexual gratification. They will not make physical contact but
will use surveillance to track the victim.
4. INTIMACY SEEKER
- It seeks an intimate and romantic relationship with the victim. When the stalker is
rejected by the victim, he or she will continually phone the victim, write the victim
letters, and become jealous and violent if the victim enters into a relationship with
someone else.
5. INCOMPETENT SUITOR.
- It is usually having inadequate social skills. They want a relationship with the
victim but do not have the ability to realize he or she is not meant to be with the
victim.
CYBERSTALKING
Is the use of the Internet or other electronic means to stalk or harass an
individual, group, or organization. It may include false accusations, defamation, slander
and libel. It may also include monitoring identity theft, threats, vandalisms, solicitation
for sex, or gathering information that may be used to threaten, embarrass or harass.
Also, it is often accompanied by real time or offline stalking in many jurisdictions
such as California, both are criminal offenses. Both are motivated by a desire to control,
intimidate or influence a victim. A stalker may be an online stranger or a person whom
the target knows. They may be anonymous and solicit involvement of other people
online who do not even know the target.
Ideally, incident response operations are handled by the Computer Security Incident
Response Team (CSIRT) of a company, a category that has previously been chosen to include
information security and general IT personnel as well as member of the C-suite level.
Representatives from legal, human resources and public relations divisions can also be included
in the team. The incident response team follows the Incident Response Plan (IRP) of the
company, which is a series of written guidelines that detail the response of the organization to
network events, security incident and verified violations.
Incident response is about making and having a flight plan. Instead of being an IT-centric
process, it is an overall business function that helps ensure that an organization with reliable
information can make quick decisions. Technical personnel from the IT and security
departments are not only involved, but also representative from other core aspects of the
company.
1. PREPARATION
The secret to efficient incident response is planning. Without predetermined protocols,
even the best incident management team cannot handle an incident effectively. To support the
team, a strong strategy must be in place. These features should be included in an incident
response plan in order to resolve security incidents successfully:
a. Development of incident response policies and documentation
Develop protocols, procedures and agreements on incident response management.
b. Definition of Guidelines on Communication Guidelines
Create standards and guidelines for communication to allow for seamless
communication during and after an incident.
c. Threat Intelligence Feeds Incorporation
Continuously capture, evaluate, and synchronize the feeds for threat intelligence.
d. Conduct of Cyber Hunting Exercises
To identify incidents occurring within your community, perform organizational hazards
hunting exercises. This encourages more proactive reaction to incidents.
e. Threat Identification Capability Evaluation
Review the existing capacity threat identification and upgrade systems for risk
management and development.
SIEM is an acronym for Security Information and Event Management. It’s a piece of
software that gathers logs and event data from on organization’s application, security
equipment and host systems and consolidates it into a single unified platform
(http://www.fireeye.com/). It’s a term coined by gartner in 2005 to describe software
that tracks and helps manage user and service privileges, directory resources, and other
improvements in device configuration, as well as log auditing and review and incident
response (www.netsurion .com).
c. Alert - Analysis create a ticket for an incident, record initial observation and allocate an
initial classification of an incident.
d. Report for regulatory reporting escalations. The reporting process should include
accommodations.
2. Binary Analysis
Examine malicious binaries or devices leveraged by the attacker and record the features of
such programs. This analysis is performed in two ways.
a. Behavioral Analysis:
Execute the, malicious program in a VM to monitor its behavior VM stands for a virtual
machine. it is a programming tool that uses software to run programs and execute
applications instead of a physical computer VM’s are primarily intended to run several
operating systems from the same piece of hardware at the same time.
b. Static analysis:
To check out the entire functionality, reverse engineer the malicious software.
3. Enterprises Hunting
To assess the scope of compromise, evaluate the current structures and event log
technologies all compromised accounts, computers, etc., are also resisted so that efficient
containment and neutralization can be carried out.
Coordinated Shutdown
After all systems inside the setting that have been compromised by a threat actor have
been detected, evacuate a coordinated shutdown of these devices. To ensure proper
timing, a message must be sent to all IR (Incident Response) team members.
IP stands for Internet Protocol address: it is and identification number connected with a
particular network of machines or computers. The IP address allows the machines to send and
receive data while connected to the internet.
1. Not to panic - It is the hardest thing during the incident that you can do you can
keep calm and it will help to do just That to have and IR strategy an IR plan will
give you a preplanned direction that explained the best course of action To take
during the incident to ensure that the protocols are thorough and specific, It is
extremely necessary to establish a strong plan before an incident occurs.
2. Do not shut down the infected systems. - You should lose volatile data
containing significant forensic information by shutting it down, in evaluating the
timeline of what occurred, this knowledge can be vital. It will also inform you what
data is actually stolen after this timeline so that you can select the best way to
treat the stolen data.
CYBERCRIME RESPONSE
- Cybercrime response is the actual police interference in a cybercrime incident
where inside the hardware, software, and network of the device the acquisition of
evidentiary value issues is traceable.
b. After defining the theories about the role of the machine in the commission of the
crime, the first responder should consider the following questions that are
necessary for any further police intervention:
a) Photograph and detach all power sources and connections, including those at
the back of computer;
b) Over each drive slot, put proof tape:
c) Photograph (or draw a diagram) and mark pieces, including their links, located at
the back of the computer:
d) Mark all connectors and cable ends to allow reassembly as needed.
EXAMPLE: “Socket” marked “A” and the cable end “also marked A”;
CHAPTER 3
DEPARTMENT OF JUSTICE (DOJ) OFFICE OF CYBERCRIME AND THE PNP ANTI-CYBERCRIME
GROUP
The office of the Cybercrime (OOC) was established within the DOJ by the Republic Act No. 10175
or the Cybercrime Prevention Act of 2012 and named it as the Central Authority for all matters relating to
international mutual assistance and extradition for cybercrime and cyber-related matters.
In formulating and implementing law enforcement investigation and prosecution strategies to curb
cybercrime and cyber-related crimes nationally, it also serves as the focal agency.
ORGANIZATIONAL FUNCTIONS
DIRECTOR
PGBEN ROBERT T RODRIGUEZ, Current Director PNP Anti-Cybercrime Group
Guide supervises and monitors the ACG of the PNP, including tactical and strategic movements
the deployment and use of its resources for the performance of the task specified.
Conduct intensive and sustained cybercrime operation by organized crime groups, syndicated
groups, high-profile internet using celebrities and computer-related device as the key component of
their illegal activities;
Strengthen its capability and capacity to enforce investigates and digitally analyzes anti-cybercrime
operation
Performing other duties as directed by the PNP Chief
DEPUTY DIRECTOR
PCOL ARMEL S GONGONA, Current Deputy Director for Administration
Assist the PNP ACG Director in monitoring, directing and organizing the activities of the PNP ACG
in the management and operations of the group;
Advising and supporting the PNP ACG Director in implementing the Group's policies and
programs; and
Perform other duties in the PNP ACG as second in command, or act in the absence of the latter.
CHIEF of STAFF
Guide oversee and manage the group's administrative affairs, as well as encourage cooperation
among the various PNP ACG divisions and units; and
To perform other duties as directed by the PNP ACG Director.
COMMAND GROUP
DIVISION CHIEFS
LOCATION DIGITAL FORENSIC OF THE PNP LABORATORIES SIX (6) FULLY FUNCTIONAL
These PNP officers are capable of performing computer, mobile, audio, and video forensic
examinations and may react within their geographical areas of responsibility to investigate the occurrence
of cybercrime operations.
1) Camp Crame
2) Cebu City
3) Davao City
4) General Santos City
5) Legazpi City
6) Zamboanga City
According to the CIDG’s deputy director for operations, Senior Supt. Keith Singian, the group’s
modus operandi “is a classic example of the operations of criminal syndicate in China, only this time, the
suspects who are foreigners have used the Philippines as base of operations.”
Potential members register for a charge of US$2.99 online. However, unexplained additional
charges are subtracted from the member’s credit card. The tipsters said that their customers failed to get
freebies and would often complain to the agency, which they could not also explain since what they do is
just make outbound calls.
During the raid, 400 units of computers were confiscated while 120 agents have been invited for
questioning. The center’s operator was not around during the raid because she is based in another country.
Lynevie Cabanilla, a call center agent, said that their company has been operating for over a year.
She said she had no idea that their center is operating a scam. Cabanilla said she did not also know that
additional charges are being incurred upon online registration.
CHAPTER 4
INTERNATIONAL DIMENSIONS OF CYBERCRIME
Cybercrime often has an international dimension. E-mails with illegal content often pass through a
number of countries during the transfer from sender to recipient, or illegal content is stored outside the
country. Within cybercrime investigations, close cooperation between the countries involved is very
important. The existing mutual legal assistance agreements are based on formal, complex and often time-
consuming procedures, and in addition often do not cover computer-specific investigations. Setting up
procedures for quick response to incidents, as well as requests for international cooperation, is therefore
vital. A number of countries base their mutual legal assistance regime on the principle of "dual criminality".
Investigations on a global level are generally limited to those crimes that are criminalized in all participating
countries. Although there are a number of offenses such as the distribution of child pornography that can
be prosecuted in most jurisdictions regional differences play an important role. One example is other types
of illegal content, such as hate speech. The criminalization of illegal content differs in various countries.
Material that can lawfully be distributed in one country can easily be illegal in another country. The
computer technology currently in use is basically the same around the world. Apart from language issues
and power adapters, there is very little difference between the computer systems and cellphones sold in
Asia and those sold in Europe. An analogous situation arises in relation to the Internet. Due to
standardization, the network protocols used in countries on the African continent are the same as those
used in the United States. Standardization enables users around the world to access the same services
over the Internet. The question is what effect the harmonization of global technical standards has on the
development of the national criminal law. In terms of illegal content, Internet users can access information
from around the world, enabling them to access information available legally abroad that could be illegal in
their own country.
Theoretically, developments arising from technical standardization go far beyond the globalization
of technology and services and could lead to the harmonization of national laws. However, as shown by the
negotiations over the first Protocol to the council of Europe Convention on cybercrime (the "Convention on
Cybercrime"), the principles of national law change much more slowly than technical developments.
Although the Internet may not recognize border controls, there are means to restrict access to certain
information. The access provider can generally block certain websites and the service provider that stores a
website can prevent access to information for those users on the basics of IP-addresses linked to a certain
country ("IP-targeting"). Both measures can be used to retain territorial differences in global network. The
Open Net initiative reports that this kind of censorship is practiced by about two dozen countries.
Cybercrimes and International Organizations
From a legal perspective, the following conventions have tackled the issue of cybercrime, where
the UN has a draft a treaty on an international Court or Tribunal for cyber space. The convention took place
in Mumbai in November 2016. In the treaty mentions who has jurisdiction over internet crimes, and who is
considered a cybercriminal and thus must be liable to punishment The Council of Europe Convention on
Cybercrime (2001) states types of cybercrimes, and declares that any person liable to these actions is
sanctioned through deprivation of liberty, however to what extent, is not mentioned. The CECC has met
every year since and added more definitions to what is considered as cybercrimes.
The League of Arab States Convention on Combating Information Technology Offences states that
each member state of the convention should be committed to fulfill its obligations arising states interior
affairs. The convention clearly stated that no state should respect the sovereignty of others states.
Moreover, the Convention also endows with the imposition of sanctions on the lives, withholding some
information, amendment, mail fraud, or posting obscene material.
The Commonwealth of Independent States agreement on Cooperation in combating Offenses
related to computer Information (2007) define the type of criminal acts, who are the competent authorities,
forms of cooperation to combat cybercrime, and how to request their assistance in case of being victimized.
The Shanghai Cooperation Organization Agreement in the Field of International Information Security (2008-
2012) states that the members are "firmly convinced that terrorism separatism and extremism, as be
justified under any circumstances, and that the perpetrators of such acts should be prosecuted under the
law. The African Union Convention of Cyber security and Personal Data Protection (June 27, 2014) state
the online activities should be exercised freely except:
Gambling, even in the form of legally authorized betting and lotteries;
Legal representation and assistances activities;
Activities exercised by notaries or equivalent authorities in application of extant texts.
Scholars and Cybercrimes
Many Scholars have written about cybercrimes, but have approached the problem in many ways.
Due to the different types of cybercrimes, some focused on categorizing them and others focused on
specific types of crimes. Kit Burden stated that there are two types of cybercrimes, the ones that are "e-
enabled", meaning crimes that were known to the world before the internet, but are facilitated through the
World Wide Web, and "true" cybercrimes, meaning crimes that would not exist outside the online
environment.
The Cyber-Criminal- Understanding the behavioral analysis of the criminal:
For some time now, forensic psychologist and behavioral scientist have been working in
collaboration with law enforcement agencies to incorporate psychological science into criminal profiling. But
what is criminal profiling?.
Criminal profiling seeks to identify criminals by analyzing their behavior after they have engaged in
crime. The fundamental rational is simple; If a certain behavior and evidence in a crime are found to be in
common with other crimes, then there is a big probability that it is the same criminal activity because
behavior is related to the psycho-socio characteristics of offender.
Behavior is shaped by the choices criminals make while committing a crime. This could include the
method of the crime, the location of the crime, and the choice of the targeted victims i.e, victimology, etc.
This data is then combined with physical evidence collected from the crime scene of the crime. Once the
data has been collected, it is then compared with the characteristics of recognized personality types of
mental abnormalities. This process later develops a practical working description of an offender, for
example when a baby is kidnapped, but a body has not been found, it usually signifies that the kidnapper
may be a female between the age of 30 and 40 who had recently lost a child of her own. The lack of body
signifies that the baby will substitute for the "lost baby" of the kidnapper. If the baby was a child or if the
baby was murdered then the whole profile would be completely different.
Criminal profiling emerged as a new tool for investigation at the beginning of the 20th century,
starting with the case of the infamous Jack, the Ripper killings in England. However it has only been recent
that this science has caught the eye of the public, after TV shows such as a CSI, Criminals minds, the
Mentalist, Lie to me and so on included studying the mind of a killer in their plot. However, what can
profiling contribute to when dealing with cybercrimes? Research has proved that the criminal profiling is
estimated to have a success rate of 83 percent when assisting traditional investigations. Moreover, due to
the fact that cybercrime is a new unpaved addition to the "new world", officials would seek all the help they
can get in order to catch the invisible criminal, especially when physical evidence is lacking in a cybercrime.
The world of cybercrime restructures the rules of criminal investigation. Unlike traditional crime
scenes, the evidence found mostly exists only in the cyber-world; in a network, computer, or the internet.
Moreover, it is this faceless aspect of cybercrime that complies its challenge. However, if cyber criminals
depend on the pseudo- anonymous nature of the internet and need this technology to camouflage their true
identities, then it is up to security leaders to use this to their advantage. Fortunately, a cybercriminal's
facelessness is considered as a signature behavior, a motivation, and an MO (modus operandi). Criminal
profiling relies heavily on such clues because not all cyber criminals have the same maturity in technique,
behavior, characteristics and motives, making every cybercrime unique. This means that the hackers are
not the same as traffickers, furthermore hackers also aren't all the same.
Modus Operandi
Modus Operandi - (Latin: “operating method”) in criminology, refers to a method of operation or
pattern of criminal behavior so distinctive that separate crimes or wrongful conduct are recognized as the
work of the same person.
If, for example, a burglar begins his career by entering houses from the roof, he will, in all
probability, continue this method for as long as he is able to work. Some burglars become so attached to
their modus operandi that they burglarize the same places or people again and again.
At a minimum, every Modus Operandi will contain three basic elements namely:
Ensure success of the crime;
Protect identity; and
Facilitate effective escape.
There are various modus operandi usually adopted by cyber criminals for the successful commissioning of
their crime. Common forms of them are described in this module:
Sending Annoying Messages - With the advent of technology and globalization smartphones and
computers have become very handy. But each and every coin is two faced. The beneficiary side of
technology is better communication, time harvesting and many more but at the same time often people are
exploited by others by sending annoying and harassing messages either in the form of text i.e. SMS or in
the form of multimedia content i.e. MMS.
Data theft - stands for the alteration of form of data by entering, suppressing or corrupting the
original data by unscrupulous means so as to gain undue advantage. These can be done in various forms
such as:
Data Didling: - It involves changing data with malicious intention during or before
processing it into the computer.
Data Leakage: - It pertains to illegally copying the master file information from a computer
for ransom, blackmailing, or any other fraudulent purpose.
Data Spying: - It refers to accessing the files or digital data from a remote location by using
legitimate password or cracking the password. This data is then sold to others for a profit.
Scavenging: - It refers to obtaining and reusing the information which have been left over
processing in or around the computer system.
Identity Theft
It involves stealing the identity of a person by dishonest use of someone’s electronic signature,
password, or other unique identifying features.
It includes credit card fraud, Online Share trading scams, e-banking crimes, fraudulent
transactions, etc.
Intellectual Property Theft - It involves the duplicating the original and genuine work of a person
without his proper consent and without any accreditation to him.
Patent & Copyright Infringement: - This is a traditional type of intellectual property theft where one
produces copied material or process from another for profit.
Software Piracy: - One gets a copy of original software & duplicates it for the purpose of selling it
for a profit.
Reseller Piracy: - Original Hardwares are sold with pirated property.
Financial Attack - Offenders often clones the web page of a bank or any organizing or social site in
the name of enhancing their security or updating their services or creating a fake webpage in the place of
genuine, which is a look alike page of original, in order to collect personnel information at various stage and
abuses the information and abuse the information for causing wrongful loss, fraudulent transfer of funds in
internet banking. These can be operated in following ways:
Spoofing: - Spoofing of sites normally happens in banks official page with an intention of financial
fraud. Other sites are spoofed either for personnel pleasure or misleading the audience or for
causing embracement to a particular group of people.
Phishing: - This involves creating a fake page which is very similar to the genuine page for secretly
capturing the credentials of the victims.
Online Fraud: - This is the next step after phishing or spoofing. Once the culprit gets the valuable
credentials of the victim he can use it for online shopping, e-banking, etc.
Online Gambling: - This is much worse than real life gambling as such pages are deliberately made
to lure the victim and fall a prey to the tricks of a cybercriminal/expert, causing them to lose a good
amount of wealth.
Cyber Laundering: - Black money is transformed into white money through various portals of online
gambling or online shopping
WEB Page Hacking - Hacking can be termed as unauthorized access to any electronic media of
communication. In this method the genuine page of a web site is mutilated by altering the content of the file
and appearance causing embarrassment to any reputed firm an may lead to denial of service, causing a
heavy loss. These can be achieved through following ways:
Web Jacking - This is another phishing technique that can be used along with social
engineering. Attackers create a fake website and when the victim opens the link a page
appears with the message that the website has moved and they need to click another link.
If the victim clicks the link that looks real he will redirected to a fake page
Click Jacking - it occurs when a scam artist or a cyber-expert places an invisible button or
other user interface element over top of a seemingly innocent web page button or interface
element using a transparency layer, which one can't see. In other words it can also be
defined as altering the proper functioning of any key and harassing the victim. For example
the functioning of right mouse button can be interchanged with Delete command.
Cyber Bullying - It refers to bullying of one person by another person over a digital media on the
condition of any data that is significant & valuable to him or just for the purpose of harassing the victim and
gaining pleasure from it.
Cyber Espionage - is the act of obtaining personnel, sensitive proprietary or classified information,
generally in corporate sectors, without permission. For this purpose especially professionals or hackers are
hired.
Obscenity & Child Pornography - It involves the spreading of obscene and nude or semi-nude pictures
and videos resulting in social harassment and sometimes be the sole reason behind the death of the victim
(specially females).
Sextortion is an online modus operandi wherein the victim after being befriended and having online
romantic relationship will be lured to do sexual acts in front of a webcam. Unbeknownst to him,
taking advantage of the trust built in a short period of time, the suspect will record his sexual acts
and threaten the victim of uploading it if he will not send money in exchange of deleting or giving
the soft copy of the nude photographs or videos.
Consequences for developing countries
Finding response strategies and solution to the threat of cybercrime is a major challenge,
especially for developing countries. A comprehensive anti-cybercrime strategy generally contains technical
protection measures, as well as legal instruments. The development and implementation of these
instruments needs time. Technical protection measures are especially cost-intensive. Developing countries
need to integrate protection measures into the roll-out of the internet from the beginning, as although this
might initially raise the cost of internet services, the long-term gains in avoiding the costs and damage
inflicted by cybercrime are large and far outweigh any initial outlays on technical protection measures and
network safeguards. The risk associated with weak protection measures could in fact affect developing
countries more intensely, due to their less strict safeguard and protection. The ability to protect customers,
as well as firms, is a fundamental requirement not only for regular businesses, but also for online or internet
-based business. In the absence of internet security, developing countries could encounter significant
difficulties promoting e-business and participating in online service industries. The development of technical
measures to promote cyber security and proper cybercrime legislation is vital for both developed countries
and developing countries. Compared with the costs of grafting safeguards and protection measures onto
computer networks at a later date, it is likely that initial measures taken right from the outset will be less
expensive. Developing countries need to bring their cybercrime strategies into line with international
standards from the outset.
Preventing Cyber-Crime and Future Opportunities for Managing Cybercrime
Cybercrime which is also known as 'Internet crimes' or 'computer crimes ' is any criminal activity
that uses a computer either as an instrument, target or a means for perpetuating further crimes or offenses
or contraventions under any law.
Determinant Factors for preventing Cyber Crime
1. Law Enforcement
The law enforcement is very weak and in order to strengthen the law, the maximum fine should be
increased as well as the imprisonment so that the guilty will be charged.
2. Attitude Awareness
In order to prevent cyber-crimes, creating attitude awareness during online business is important.
Business entrepreneurs from the survey are unaware cyber-crime, thus, Awareness programs on
preventing cyber-crime should educate them in order to ensure entrepreneurs feel safe during online
business transaction.
3. Ethics
A good ethics while doing online business transaction should be addressed by entrepreneurs and they
should respect potential buyers and seller by giving detail information and respect each other during online
business.
4. IT Technology
Information technology infrastructure is comprehensive, thus, cybercrime prevention strategies should
remain a top concern as enterprise now must support more devices such tablets and smartphones. The
enterprises should equip them with knowledge and update technology security devices so that can protect
from cyber criminals.
Cybercrime prevention framework
Figure 3 shows example of cybercrime prevention framework obtained from the survey done in
order to look at cybercrime prevention from the perspective of government and non-government
organizational (NGO). Prevention of cybercrime highlight that government leadership plays an important
part in crime prevention, combined with cooperation and partnerships across ministries and between
authorities, community organizations, non-governmental organizations, the business sector and private
citizens.
This research identifies four factors such law enforcement, attitude awareness, ethics and IT
technology have impact toward preventing cybercrime. At present law enforcement should be reviewed by
the government so that new amendment will protect online business users. Creating attitude awareness
during online business transaction is important to help both parties’ seller and buyer. Apply god ethics will
increase trust toward buyers while online business transaction. The business entrepreneur should equip
with latest information technology, and updated security system will prevent being attack by a cyber-
criminal.
As the world evolves, so will all its aspects: the good and the bad. That being said, one must not
forget to "modify" the definition of crime, meaning that the face of crime has evolved. Megabytes are
substituting for bullets and the scary part is that no weapon can fight this ongoing battle except for weapon
of knowledge and cooperation.
How can one combat the threat of cybercrime? Before tackling the issue on an international level
and point out the importance of establishing a conventional relationship between states, there are critical
elements every state should adopt in itself first, that will improve domestic law enforcement response to
reported acts of cybercrime.