Cybercrime
Cybercrime
Computer Application 1
Gottfried Wilhelm von Leibniz invented the
Tally Sticks - It is an ancient memory aid stepped reckoner in 1672. The machine can
device used to record and document automatically add, subtract, multiply, and
numbers, quantities, or even messages. divide.
Havard Mark 1 - It was invented by Howard Central processing unit (CPU) - which
H. Aikenin in 1943 and was the first electro- serves as the heart and brain of the
mechanical machine computer. This was computer where all data are being
also known as IBM Automatic Sequence processed and stored to display the
Controlled Calculator (ASCC). information to an out-device example the
monitor
Professor John Atanasoff - Anatasoff-
Berry Computer (ABC) Keyboard and Mouse- The keyboard and
mouse is a device that transforms analog
Z4 - This machine was created by Konrad audio signals into air vibrations.
Zusein in Germany from the year 1936 to
1938. It was the first programmable Speaker - is a device that transforms
computer wherein users are required to analog audio signals into air vibrations.
insert punch tape into the punch tape reader
and all output and the output will be Printer - is a device that transforms
generated through a punch tape. computer output into printed images
Types of Software
● Windows 11
Basic Parts or components of the
● macOS
Computer
● Office
● Chrome
Monitor- The monitor serves as an output
device where texts and in ages are being
System Software - a computer program
that manages, synchronizes, coordinates
different activities of the computer.
(Examples Google Chrome, Windows,
Android OS, Mac Os, etc.,)
Audio and video files. aif, mov, mp3, mp4, Republic Act No. 10173 - DATA PRIVACY
mpg, wav, wma, wmv. LAW
Draw program files. afdesign, ai, cad, cdr, To safeguard the right of every
drw, dwg, eps, odg, sug, vsdx. lage layout individual to privacy while ensuring
files. afpub, indd, pdf, pdfxml, pmd, pub, free flow of information for
qxp. innovation, growth and national
development
Programming files. c, gpp, cs, java, js,
json, py, sal, swift, vb. Scope
Compression and archive files. 7z, rar, ● Define rights of data subjects
tar, tar.gz, zip. ● Provides parameters for securing,
'process and providing access to
System files. bak, cfg, conf, ini, msi, sys, personal information, by any natural
tmp. and juridical person in the
government or private sector
Executable program files. app, bat, bin, ● Imposes penal and pecuniary
cmd, com, exe, vbs, x86 sanctions for unlawful use or
disclosure of information
Cybercrime
Is criminal activity where services or Computer data
applications in the Cyberspace are Refers to any representation of
used for or are the target of a crime, facts, information, or concepts in a
or where the Cyberspace is the form suitable for processing in a
source, tool, target, or place of a computer system including a
crime (ISO 27032) program suitable to cause a
computer system to perform a
Republic Act No. 10175 - CYBERCRIME function and includes electronic
LAW documents and/or electronic data
messages whether stored in local
The vital role of information and computer systems or online.
communications industries such as content
production, telecommunications, Computer program
broadcasting electronic commerce, and Refers to a set of instructions
data processing, in the nation's overall executed by the computer to achieve
social and economic development. intended results. (RA 10175)
They work with both good and bad There is a major difference in the
intentions, they can use their skills way they operate. They become
for personal gain. It all depends ruthless while dealing with malware
upon the hacker. actions of the black hat hackers.
If a gray hat hacker uses his skill for They will keep on attacking the
his personal gains, he/she is hacker aggressively that the hacker
considered as black hat hackers. may know it as well and have to
replace the whole system.
There are generally 7 types of Hackers,
after the main 3 types, they are:
● Alteration
● Damaging
● Deletion or deterioration of
computer data, electronic
document, or electronic data
message, without right,
including the introduction or
transmission of viruses.
Cybercrime Offenses