Understanding Cyber Crime and Its Global Impact
Budapest Convention
2001 meeting for international cybercrime cooperation.
Stuxnet
A computer worm targeting Iranian nuclear facilities.
TOR Network
Anonymizing network for internet users.
Legitimate Transaction
Bank transfer perceived as valid by financial institutions.
Microchip Credit Cards
Cards with RFID technology for enhanced security.
International Cooperation
Collaboration among countries to combat cybercrime.
Basic Cyber Hygiene
Common sense practices to prevent cyber intrusions.
Malwarebytes
Company specializing in cybersecurity solutions.
Free Lunch Fallacy
Concept that free offers often have hidden costs.
Port Security
Control access to network ports to prevent intrusions.
Data Backup
Copying data to prevent loss in emergencies.
Undercover Operations
Covert law enforcement activities to catch criminals.
Undercover Operation
Covert law enforcement activity to catch criminals.
Cyber Crime
Criminal activities conducted via the internet.
Cybercrime
Criminal activities conducted via the internet.
Low-risk Criminals
Cyber criminals facing minimal legal repercussions.
Silk Road
Dark Web marketplace for illegal goods.
Cyber Crime Statistics
Data showing prevalence and impact of cyber crime.
Cybercrime Center
Dedicated facility for addressing cybercrime issues.
Negligent Employee
Employee who unintentionally compromises security protocols.
End-to-End Encryption
Encrypting data from sender to receiver without interception.
Criminal Activity
Engagement in illegal acts or behaviors.
EC3
European Cybercrime Centre established by Europol.
Europol
European Union's law enforcement agency.
Information Sharing
Exchange of data among law enforcement agencies.
Sextortion
Extortion using recorded sexual acts as leverage.
Operation Onymous
FBI and Europol operation against Silk Road.
Operation Card Shop
FBI operation targeting credit card fraud.
FBI LEGAT
FBI's legal attache offices worldwide.
Spoofed Website
Fake website designed to deceive users.
Phishing
Fraudulent attempts to obtain sensitive information.
Truecrypt
Free software for creating encrypted partitions.
State-sponsored Actor
Government-backed individuals conducting cyber operations.
NIST Framework
Guidelines for managing cybersecurity risks.
Ricin
Highly toxic substance from castor beans.
Detect Function
Identifying cybersecurity incidents in real-time.
Protect Function
Implementing safeguards against cybersecurity threats.
Cyber Criminal
Individual exploiting malware for illegal gains.
Victim
Individual targeted for cyber fraud or theft.
Malware Exploiter
Individual who creates or distributes malicious software.
Carder
Individual who sells stolen credit card information.
Internet Users
Individuals accessing the internet for various purposes.
Terrorist Actor
Individuals or groups using cyber means for terrorism.
Carders
Individuals who steal and sell credit card information.
Proxy Server
Intermediary server used to hide user's identity.
Segregation of Duties
Internal control mechanism to prevent collusion.
Interpol
International police organization without enforcement powers.
Coordinated Efforts
Joint actions by multiple agencies against crime.
Cybercrime Investigations
Law enforcement efforts to address internet crimes.
Geographical-based Solutions
Law enforcement methods reliant on physical locations.
Legal Framework
Laws governing cybercrime and enforcement.
Jurisdictional Challenges
Legal difficulties in prosecuting international cyber crime.
Criminal Trial
Legal proceedings against accused cybercriminals.
Social Engineering
Manipulating individuals to divulge confidential information.
Identity Theft Prevention
Measures taken to protect personal information.
Physical Access Control
Measures to restrict physical entry to systems.
Threat Vectors
Methods used to exploit vulnerabilities in systems.
Surveillance
Monitoring individuals to gather evidence.
Intrusion-Detection System
Monitors network for unauthorized access attempts.
Greed and Opportunity
Motivators for cybercriminal behavior.
Extortion
Obtaining money through coercion or threats.
Council of Europe
Organization that hosted the Budapest Convention.
Cyber Theft Ring
Organized group conducting cyber theft operations.
Dark Web
Part of the internet used for illegal activities.
10% Retention
Percentage kept by money mules from stolen funds.
Administrative Privileges
Permissions granted to manage software and hardware.
Network Administrator
Person responsible for managing computer networks.
Money Mule
Person used to transfer stolen funds for criminals.
McAfee
Popular antivirus and firewall protection software.
External Encrypted Hard Drive
Portable storage device with built-in encryption.
Cyber Hygiene
Practices to maintain good cybersecurity health.
Risk Management
Process of identifying and mitigating risks.
Physical Security
Protection of physical assets from unauthorized access.
Identify Function
Recognizing cybersecurity risks and assets.
256-bit AES
Recommended encryption standard for strong security.
Computer Logs
Records of system access and activities.
Eastern Europe Cyber Crime
Region known for high rates of cyber criminal activity.
Recover Function
Restoring systems after a cybersecurity incident.
Insider Threat
Risk posed by negligent or disgruntled employees.
VPN Tunnels
Secure connections over the internet for privacy.
Encrypted Vault
Secure storage for sensitive information on a drive.
Encryption
Securing data by converting it into code.
MAC-address Security
Security based on unique hardware identifiers.
Endpoint Protection
Security measures for individual devices on a network.
Two-Factor Authentication
Security process requiring two forms of verification.
Internet Drug Fraud
Selling prescription drugs without a valid prescription.
WPA2
Strong encryption protocol for wireless networks.
Closed Network
System isolated from the internet for security.
Respond Function
Taking action to mitigate cybersecurity incidents.
Spearphishing
Targeted phishing attempts to steal personal information.
Victimization
Targeting individuals for criminal exploitation.
Zues Malware
Type of malware used for stealing banking credentials.
Credit Card Fraud
Unauthorized use of credit card information.
Cybersecurity Awareness
Understanding risks and practices to enhance security.
Spam Emails
Unsolicited emails often used for scams.
Victim's Bank Credentials
User ID and password for accessing bank accounts.
Cybersecurity Types
Various domains like network, web, and mobile security.
Bitcoin
Virtual currency used for anonymous transactions.
Norton
Well-respected antivirus and firewall protection software.
BitLocker
Windows feature for full disk encryption.