Crim 311 (Chapter 1 and 2)
Crim 311 (Chapter 1 and 2)
Crim 311 (Chapter 1 and 2)
• Digital Natives - in that they were brought into a world that was already digital,
spend large amounts of time in digital environments, and use technological
resources in their day-to-day lives.
• Digital Immigrants - are those who were born prior to the creation of the Internet
and digital technologies. These individuals quite often need to adapt to the digital
environment, which changes much more rapidly than they may be prepared for
otherwise.
• Cyberspace - refers to indefinite place where individuals transact and
communicate. It is the place between places.
• digital evidence - refers to digital information that may be used as evidence in a
case.
- digital evidence - refers to information and data of value to investigation that
is stored on, received, or sent by a digital device or attachment Accordingly,
digital evidence has the following features:
• ephemeral electronic communication - refers to telephone conversations, text
messages, chatroom sessions, streaming audio, streaming video, and other
electronic forms of communication the evidence of which is not recorded or
retained
• Computer forensics - is the use of scientifically derived and proven methods
toward the preservation, collection, validation, identification, analysis,
interpretation, documentation and presentation of digital evidence derived from
digital sources for the purpose of facilitating or furthering the reconstruction of
events found to be criminal
- computer forensics is a branch of the forensic sciences, refers to the
investigation and analysis of media originating from digital sources to uncover
evidence to present in a court of law.
- computer forensics as the science of locating, extracting, and analyzing types
of data from different devices, which specialists then interpret to serve as legal
evidence.
• digital forensics - as the application of computer science and investigative
procedures for a legal purpose involving the analysis of digital evidence after
proper search authority, chain of custody, validation with mathematics, use of
validated tools, repeatability, reporting, and possible expert presentation.
- digital forensics is the process involved in the collection, protection,
documentation, validation, analysis, and presentation of digital evidence,
obtained from computerized sources and by the application of established
scientific method.
• digital forensics investigators are performing "digital investigative analysis". To
break this title down, digital because it is all forms of electronic information from
computers to phones to game systems to servers, gaming console, etc.
• investigative - because they are not just pushing a button, they are investigating
what happened on that computer and asking the digital evidence questions.
4. Test of Skill
Some cyber criminals may commit technical attacks against others as a
training exercise to develop their skills for a more financially lucrative attack.
They may also use these attacks to advertise their skill set and their successful
system compromises to build their credibility on cybercriminal websites.
5. Business Competitor
The marketplace can be a very aggressive environment for businesses, with
each placing an emphasis on developing a strategic advantage.
6. Professional Criminal
The professional criminal's motivation is seeking personal financial
advantage. The attack is rarely personal and the attack on the target company is
nothing more than a business venture to make money.
7. Terrorism
With the world being connected, the opportunity exists for persons in
remote locations to target the critical infrastructure of an entity they wish to cause
extreme harm to.
8. Geopolitics
A state actor is a government agency or aligned group who conducts cyber
activities on behalf of that government.
TOOLKIT OF CYBERCRIMINALS
1. Malwares or malicious software - refers to code that causes damage to computer
system.
A. Backdoor - is a type of malware that is used to get unauthorized access to a
website by the cybercriminals.
B. Trojan horses - type of malware that tricks the computer user into thinking that it
is legitimate software, but actually contains hidden functions.
D. Computer Worm - are unique form of malware that can spread autonomously,
though they do not necessarily have a payload.
2. Phishing - means the solicitation of information via e-mail or the culling of individuals
to fake Web sites.
a. Spoofing - is a type of scam in which criminals attempt to obtain someone's
personal information by pretending to be a legitimate business, a neighbor, or some other
innocent party.
b. Pharming - is an advanced form of phishing, which redirects the connection
between an IP address (i.e., consumer seeking legitimate site) and its target serve (i.e.,
legitimate site).
c. Redirectors - are malicious programs which redirect users' network traffic to
undesired sites. According to the Anti-Phishing Working Group, utilization of traffic
redirectors and phishing- based keyloggers is on the increase.
d. Advance-fee fraud or 419 fraud - some individuals will willingly divulge
personal and financial information to strangers if they believe that a large financial
windfall will soon follow. This fraud is accomplished when an e-mail message is
distributed to a victim which asks the recipient for his claiming "found" money.
e. Floating windows - phishers may place floating windows over the address bars
in Web browsers.
CHAPTER 2
1. Case
Computers would not last long without a case because it protects the internal
components from damage, dirt, and moisture. But beyond holding the guts of the
computer, the case is an important facet of the device. The case provides the interface
between the device, the user, and the outside world. For example, a case might include a
view-only screen, touch screen, keyboard, microphone, as well as physical ports for a
keyboard, monitor, mouse, power supply, and data exchange.
2. Power source
Computers need electricity to operate, and that means they need power from an
internal battery, from an electrical outlet, or both. Portable devices like laptops, tablets,
and smartphones rely upon battery power, with periodic charging.
3. Motherboard
The motherboard is an important computer component because it is where
everything else connects to. The motherboard is a decently sized circuit board that lets
other components communicate.
4. Processors (Central Processing Unit)
The work of a computer is done through computer processors, also known as
central processing units (CPUs). These are computer chips, or groups of chips, that do the
thinking (the massive number of binary calculations) of the computer necessary to run all
programs.
5. Memory (ROM and RAM)
a. Read-Only Memory (ROM)
Read-only memory computer chips store firmware programs that holds the
instructions to power up or boot, the computer to control the DVD drives, hard
disk drives and graphic cards. ROM also known as flash memory and is
considered non-volatile memory.
b. Random Access Memory (RAM)
A computer relies on a type of memory - known as temporary or volatile
storage to perform most functions. This volatile storage is also called Random
Access Memory (RAM).
6. Persistent storage (HDD/SSD)
Persistent (long-term) storage holds data stored in the computer even after
the power is disconnected. Persistent storage mechanisms include hard disk drives
(HDD) and solid-state drives (SSD). HDDs were the standard method for
persistent data storage for many years. These drives have spinning disks or platters
divided into smaller sectors, then ultimately into bit-sized storage units, each of
which holds a magnetic charge holding the bit value.
- SSDs are a newer type of storage drive. These drives do not have any moving
parts, but rather are computer chips that store the data as electrical charges.
1. These are people who grew up into a world that was already digital and
spend a large amount of their lives in cyberspace.
a. Millennials c. Gen X
b. Digital immigrants d. Digital natives
11. These are people who were born before the creation and widespread use of
the internet and digital technologies.
a. Millennials c. Gen Z
b. Digital immigrants d. Digital natives
12. It refers to any criminal activities which has been committed through the
use of internet and/or computer.
a. Digital crime c. Internet fraud
b. Online Scam d. cyberspace crime
15. He is considered the creator of the 1st ramsonware called the "AIDS
Trojan"in 1989.
a. Kevin Mitnick c. Joseph Popp
b. David Smith d. Kevin Poulsen
18. The following are NOT the key elements computer forensics, EXCEPT:
a. Collection and preservation c. Investigation
b. Ephemeral d. Prosecution
19. He who discovered that the whistle included in the box of Cap'n Crunch"
can be used to hack the telephone system of AT&T in the 1970s.
a. John Mitnick c. John Draper
b. Allan Kotok d. Robert Morris Jr.
22. A type of computer software that allows unit to take various steps upon
powering.
a. Bootstrap c. Sequencer
b. Power on instruction sequencer d. Computer
24. Digital evidence can easily be destroyed or cannot be seen because these
type of communication of data are called in the legal sense as:
a. Latent c. Electronic
b. Inside the computer d. Ephemeral
28. A part of the computer that acts as the interface between the device, the
user and outside world.
a. Power source b. Motherboard
c. Case d. Processor
29. The name "Juanito Dela Cruz" is equivalent to how many bytes and bits?
a. 17 bytes or 142 bits c. 15 bytes or 120 bits
b. 15 bytes or 128 bits d. 17 bytes or 136 bits
30. The piece of software that runs the specific applications and provides an
interface to the hardware components.
a. Application c. Operating system
b. Program d. Command
32. The part of the computer where all other computer components are
connected.
a. RAM c. Circuit board
b. Motherboard d. Processor
33. A part of the computer responsible for all the commands executed by the
computer.
a. ROM b. RAM
c. Processor d. Storage
34. This is a storage device wherein there no moving parts and all data is save
in computer chips.
a. HDD c. SHD
b. SSD d. HSSA
35. This type of memory enables the CPU to communicate with the hard disk
and the input/output devices that are attached to the computer.
a. Processor c. ROM
b. BIOS d. SSD
36. For computers to be able to communication with one another via the
internet using the ___.
a. Network connection c. Network Interface controller
b. Internet adapter d. Router
37. When powering a computer, the OS is loaded into the _____ from the
devices long-term memory.
a. ROM c. Hard drive
b. CPU d. RAM
ANSWER KEY:
1. D 21. B
2. A 22. A
3. D 23. B
4. B 24. D
5. B 25. A
6. A 26. B
7. C 27. C
8. C 28. C
9. C 29. C
10. A 30. C
11. C 31. A
12. A 32. D
13. C 33. C
14. A 34. B
15. C 35. B
16. C 36. C
17. B 37. D
18. B 38. D
19. C 39. A
20. A 40. D