My favorite links

Government and Law
Home and Living
Lakbay Pilipinas
Music and Media
Weird and Humor
Other Form Items soon to be placed here.
 
My favorites Corner
Special Interest
Organizational Memberships
 

The Gospel

" Blessed is the man that walks not in the counsel of the ungodly nor stands in the way of the sinners nor sits in the seat of the scournful but his delight is in the law of the Lord, and in his law doth he meditate day and night."

Psalms 1:1-2 more

Vocabulary Boggler
Profane- adj. 1. not concerned with religion or religious purposes. 2 not holy because he is unconsecrated, impure, or defiled 3. serving to debase or defile what is holy. my word collection
Others here
 
 
Quick Links
Home
Unit 1
C O N T E N T
 
 

Ethics Announcement

Last Upfated: 13 December 2004
2 February, 2005>
 
WELCOME TO MY PERSONAL WEBSITE

Three Examples of Computer Crime

Snooping

  Snooping is looking through information files in the hopes of finding the something interesting*. If the files are on paper, an attacker(a person who presupposes a crime) may do this by opening a file drawer and searching through the files. If the files are on the computer system, an attacker may attempt to open one file after another until information is found.

By the definition of snooping, I, as an instructor of my students, am guilty about the crime. There are times that the students personal directory are full of interesting materials that I copy them without the permission of the student.

Eavesdropping

  When someone listens in on a conversation that they are not part of, that is eavesdropping*. To gain unauthorized access to information, an attacker must position himself at a location where information of interest is likely to pass by. This is most often done electronically. The introduction of wireless networks has increased the opportunity to perform eavesdropping. Now an individual does not have to place a system or listening device on the physical wire. Instead, the attacker might be able to sit in a parking lot or on the street near a building while accessing information.

I viewed a documentary regarding wireless hacking in a Video CD. I have seen that some people who wanted fortune and serve it as a livelihood, they travel form regions to regions, especially the countries that are not serious on the matter Usually, third world countries, I have a friend in Papua New Guinea and he told me that the natives out there look-up unto the Filipino people for without the Filipinos, their knowledge on computers are far than expected.

Interception

  Unlike eavesdropping, interception is an active attack against the information. When an attacker intercepts information, he is inserting herself in the path of the information and capturing it before it reaches destination, After examining the information, the attacker may allow the information to continue to its destination or not.

NBI investigating committee on the issue of call centers operating in the Philippines have a problem on how legit is the call centers exchange of information from source to destination and vice versa. A raid on call centers somewhere in Pampanga where the operation is a call center but the content of their exchange is a NUDE production at the exchange of dollars. The Office of the Computer Crime NBI Division (OCCNBID) could not respond on these situations because of the lack of technology in their office to catapult the events. The event is not new in the world of computers. We can see lots of them committed everyday. The movie AntiTrusts depicts the real crime story that we can experience by watching it.

End of activity

 

  • reference1: Network Security A Beginners Guide, Maiwald Eric, pp 1-20.
  • reference2: Hackers Exposed Linux, Linux Security Secrets and Solution, Brian Hatch and James Lee2, pp 122-150.

 

 

  IS 226 Course What's New
       
 

| Home | About | IS 201 Site | | My Reliever | Feedback |Privacy and Security | Register

©Copyright 2004 Rene B Quimoyog See Profile My Family