WEEK 1 5 Cybercrime
WEEK 1 5 Cybercrime
“Ever since men began to modify their lives by using technology they have found
themselves in a series of technological traps”
Roger Revelle
What is Cyber Crime?
1. Computer as a Target
2. Computer as a weapon
Cybercrime is a term used broadly to describe criminal activity in
which computers or networks are a tool, a target, or incidental to the
commission of a crime.
Concept of Cyberspace
Early in the evolution of the Internet, in the middle of the 1990s, many users
believed and argued that the world of cyberspace should be free from the
regulations of any national government. John Perry Barlow’s “A Declaration of
the Independence of Cyberspace” proposed that national governments should
play no role in governing cyberspace. He argued that the community existing in
cyberspace would create its own rules and manage conflicts apart from the
laws and judiciary of any particular country. Particularly important was the
protection of free expression and exchange among the “bodiless” personalities
of cyberspace. This perspective would be particularly relevant if it were possible
to hide the physical location and identity of a person participating in an activity
“in cyberspace.”
Since the emergence of the Internet, however, national governments and their
analysts have shown the relevance of both national regulations and
international agreements on the character of cyberspace. Those bodiless actors
in cyberspace must access this other realm through their corporeal form, and
thus they continue to be constrained by the laws governing their physical
location. The Chinese government maintains strict controls on who is able to
access the Internet and what content is available to them. The U.S. government
limits certain online activities, such as the sharing of digital data, through the
Digital Millennium Copyright Act and other legislation. In addition, the United
States developed a strategy for the security of cyberspace in order to prevent
and respond to attacks on the Internet infrastructure. The control of
cyberspace is thus important not only because of the actions of individual
participants but because the infrastructure of cyberspace is now fundamental
to the functioning of national and international security systems, trade
networks, emergency services, basic communications, and other public and
private activities. Because national governments see potential threats to the
security of their citizens and to the stability of their regimes arising within
cyberspace, they act to control both access and content.
Nature of Cybercrime
The first person to be found guilty of cybercrime was Ian Murphy, also
known as Captain Zap, and that happened in the year 1981.
The first unsolicited bulk commercial email was sent by a Digital
Equipment Corp marketing representative to every ARPANET (Advanced
Research Projects Agency Network) address on the west coast of the
United States on May 3, 1978. The message promoted the availability of
a new model of computer and was sent by Gary Thuerk to 393 recipients.
Take Note: Advanced Research Projects Agency Network (ARPANET) was the
first wide-area packet-switching network with distributed control and one of
the first networks to implement the TCP/IP protocol suite. This technology
became the technical foundation of the Internet.
I LOVE YOU virus, also known as a love bug virus, was a type of
computer virus that attacked billions of computers with windows operating
systems. It started the attack May 2000 from the Philippines. The virus spread
through internet network as an email attachment, with the subject line as
“ILOVEYOU” and an attachment “LOVE-LETTER-FOR-YOU.txt.vbs”.
What was the effect of I Love You Virus Case on the Philippine
Legislation?
WEEK 4 – 5
Keyboard
Mouse
Scanner
Microphone
Digital Camera
PC Video Camera
Primary storage
RAM (Random Access Memory) - is the primary storage of a
computer. When you’re working on a file on your computer, it will
temporarily store data in your RAM. It allows you to perform
everyday tasks like opening applications, loading webpages, editing
a document or playing games, and allows you to quickly jump from
one task to another without losing your progress.
Volatile Memory
ROM – Read Only Memory – Application Software and Operating System -Non
Volatile Memory
Secondary Storage (Hard Disk Drives (HDD) & Solid-State Drives (SSD))
Hard Disk Drives (HDD) - Hard disk drives are commonly used as
the main storage device in a computer. HDDs often store operating
system, software programs and other files. These are magnetic
storage devices
Solid-state drives (SSD) is a new generation of storage device
used in computers. SSDs replace traditional mechanical hard
disks by using flash-based memory, which is significantly faster.
SSDs don’t rely on magnets and disks, instead they use a type of
flash memory called NAND “Not And”
CD- RW-re-writable
DVD – RW
Flash memory devices – these are small, portable storage devices
that have long been a popular choice for extra computer storage. The
most recognizable type of flash memory device is the USB flash drive.
MOTHERBOARD
CPU
EXTERNAL HARD DRIVE
COMPONENTS OF A COMPUTER SYSTEM
Computer
Software - These are the instructions that tell the computer what to do and
how to do it.
Input devices
Output Devices
Memory Unit
Once a user enters data using input devices, the computer system stores this
data in its memory unit. This data will now remain here until other
components of CPU process it. The memory unit uses a set of pre-programmed
instructions to further transmit this data to other parts of the CPU.
Control Unit
Processing Devices
System software - The system software also called the operating system (OS)
which actually runs the computer. (Windows Operating System, MacOS)
Reading – opening the data or information that you saved on the storage
Primary storage
Secondary Storage (Hard Disk Drives (HDD) & Solid-State Drives (SSD))
Hard Disk Drives (HDD) - Hard disk drives are commonly used as the main
storage device in a computer. HDDs often store operating system, software
programs and other files. These are magnetic storage devices
External hard drive - is a device which is plugged into your machine to give
almost-immediate storage space, without the need to open or use your
computer’s internal storage.
Flash memory devices – these are small, portable storage devices that have
long been a popular choice for extra computer storage. The most recognizable
type of flash memory device is the USB flash drive.