Understanding Cyber Crime and Security

¡Supera tus tareas y exámenes ahora con Quizwiz!

FBI priorities in fighting cybercrime

1. Protecting the United States against cyber attacks 2. Combating cyber-based terrorism and high-technology crimes

Hacker

A person skilled in computer programming and system security

Anarchy

Absence of government or authority

Online behavior

Actions and interactions conducted on the Internet

Tor Network

Anonymity network for accessing the Dark Web

Information attacks

Attacks aimed at stealing or manipulating information

Infrastructure attacks

Attacks targeting critical infrastructure systems

Cyberbullying

Bullying using digital communication tools

Sniffing

Capturing and analyzing network traffic

Stuxnet

Computer worm that targeted industrial control systems

Money laundering

Concealing the origins of illegally obtained money

First Amendment

Constitutional protection of freedom of speech

Encoding

Converting information into a specific format

Data backup

Copying and storing data to protect against loss or damage

Cyber crime

Criminal activities conducted using computers or the Internet

Hate crimes

Criminal acts motivated by prejudice or bias

Financial cyber crime

Cyber crime involving monetary theft or fraud

Non-financial cyber crime

Cyber crime not primarily motivated by financial gain

Internet fraud schemes

Deceptive practices carried out online to defraud individuals or organizations

Slander

Defamation in spoken form

Libel

Defamation in written or printed form

DoS attack

Denial of Service attack that disrupts a network or system

DDoS attack

Distributed Denial of Service attack that overwhelms a target with traffic

Digital devices

Electronic tools used for processing and storing data

White Hat hacker

Ethical hacker who tests systems for vulnerabilities

Computer Hacking and Intellectual Property unit (CHIP)

FBI unit focused on cybercrime and intellectual property theft

Defamation

False statement that harms a person's reputation

Cyber crime categories

Four categories: hacking, identity theft, fraud, and cyber terrorism

Stalkers

Four classifications: rejected, resentful, intimacy-seeking, incompetent

Identity theft

Fraudulently using someone's personal information

Intelligence

Gathering and analyzing information to prevent crimes

Internet

Global network of interconnected computers

Hacktivist

Hacker who carries out hacking for political or social causes

Grey Hat hacker

Hacker who operates between ethical and malicious intent

Web-based hacking

Hacking techniques targeting web applications and websites

Cyber stalking

Harassing or threatening behavior online

Steganography

Hiding information within other digital content

Digital immigrants

Individuals who adopted digital technology later in life

Digital natives

Individuals who grew up using digital technology

Script kiddies

Inexperienced hackers who use pre-made tools

Computer networks

Interconnected computers that share resources and information

Cyber forensics

Investigation and analysis of digital evidence in cyber crime cases

Common law

Law based on judicial decisions and customs

Statutory law

Law enacted by a legislative body

Black Hat hacker

Malicious hacker who exploits systems for personal gain

Malware

Malicious software designed to harm or exploit computer systems

Trojan

Malware disguised as legitimate software

Deep fakes

Manipulated videos or images that appear real but are fake

Social Engineering

Manipulating people to gain unauthorized access to information

Social engineering

Manipulating people to gain unauthorized access to information

Embezzlement

Misappropriation of funds entrusted to one's care

Botnets

Networks of compromised computers controlled by a central attacker

White collar crime

Non-violent crime committed by individuals in business or professional settings

Espionage as a Service (EaaS)

Offering espionage capabilities as a service

Networked public

Online community connected through digital networks

Dark Web

Part of the Deep Web that is intentionally hidden and used for illegal activities

Cyber harassment

Persistent and unwanted online behavior that causes distress

Traditional crime

Physical crimes committed in the physical world

Extreme left movements

Political ideologies associated with radical left-wing groups

Right-wing extremism

Political ideology associated with radical right-wing groups

Risk

Potential for loss or harm

Threats

Potential sources of harm or danger

Intranet

Private network accessible only to authorized users

Investigation

Process of gathering evidence to solve a crime

Cyber security

Protection of computer systems and data from digital attacks

Decoding

Reversing the process of encoding

Cost-effective security

Security measures that provide value for the cost

Worm

Self-replicating malware that spreads without human intervention

Sexting

Sending or receiving sexually explicit messages or images

Child pornography

Sexually explicit material involving minors

Insider attack methods

Social engineering, authorized system use, bypassing security, compromised accounts

Keylogger

Software or hardware that records keystrokes

Spyware

Software that collects information without the user's consent

Adware

Software that displays unwanted advertisements

Zero day vulnerabilities

Software vulnerabilities unknown to the vendor

Hate speech

Speech that promotes violence or discrimination against a particular group

Promotion

Spreading propaganda or misinformation

World Wide Web (WWW)

System of interlinked hypertext documents accessed via the Internet

Cryptography

Techniques for secure communication in the presence of adversaries

TSR virus

Terminate and Stay Resident virus that remains in memory

Mens rea

The mental state or intention to commit a crime

Actus reus

The physical act or conduct that constitutes a crime

Concurrence

The simultaneous occurrence of actus reus and mens rea

Corporate espionage

Theft of trade secrets or sensitive information from a company

Insider threat

Threat posed by individuals within an organization

System intrusion

Unauthorized access to a computer system

Web site defacement

Unauthorized modification of a website's appearance

Theft of Intellectual Property

Unauthorized use or theft of someone's creative work

Deep Web

Unindexed part of the Internet not accessible through search engines

Cyberterrorism

Use of computer technology to intimidate or coerce for political purposes

Information warfare

Use of information and communication technology in warfare

Technological facilitation

Use of technology to aid in criminal activities

Polymorphic virus

Virus that can change its code to avoid detection

Macro virus

Virus that infects documents with macros

File virus

Virus that infects executable files

Boot virus

Virus that infects the boot sector of a computer

Network virus

Virus that spreads over computer networks

Web

Visible part of the Internet with indexed websites

Vulnerabilities

Weaknesses or gaps in security that can be exploited


Conjuntos de estudio relacionados

APHY 201 Module 13 Digestive System Part 2 Ivy Tech

View Set

Econlowdown It's Your Paycheck! Lesson 3: Cash the Check and Track the Dough

View Set

CH. 65 Care for Skin, Hair, & Nail Disorders

View Set

Chapter 14: Energy Generation in Mitochondria and Chloroplasts

View Set

GOV: Chapter 7- The Federal Bureaucracy

View Set

Current Good Manufacturing Practices for Transfusion Services

View Set