Understanding Cyber Crime and Security
FBI priorities in fighting cybercrime
1. Protecting the United States against cyber attacks 2. Combating cyber-based terrorism and high-technology crimes
Hacker
A person skilled in computer programming and system security
Anarchy
Absence of government or authority
Online behavior
Actions and interactions conducted on the Internet
Tor Network
Anonymity network for accessing the Dark Web
Information attacks
Attacks aimed at stealing or manipulating information
Infrastructure attacks
Attacks targeting critical infrastructure systems
Cyberbullying
Bullying using digital communication tools
Sniffing
Capturing and analyzing network traffic
Stuxnet
Computer worm that targeted industrial control systems
Money laundering
Concealing the origins of illegally obtained money
First Amendment
Constitutional protection of freedom of speech
Encoding
Converting information into a specific format
Data backup
Copying and storing data to protect against loss or damage
Cyber crime
Criminal activities conducted using computers or the Internet
Hate crimes
Criminal acts motivated by prejudice or bias
Financial cyber crime
Cyber crime involving monetary theft or fraud
Non-financial cyber crime
Cyber crime not primarily motivated by financial gain
Internet fraud schemes
Deceptive practices carried out online to defraud individuals or organizations
Slander
Defamation in spoken form
Libel
Defamation in written or printed form
DoS attack
Denial of Service attack that disrupts a network or system
DDoS attack
Distributed Denial of Service attack that overwhelms a target with traffic
Digital devices
Electronic tools used for processing and storing data
White Hat hacker
Ethical hacker who tests systems for vulnerabilities
Computer Hacking and Intellectual Property unit (CHIP)
FBI unit focused on cybercrime and intellectual property theft
Defamation
False statement that harms a person's reputation
Cyber crime categories
Four categories: hacking, identity theft, fraud, and cyber terrorism
Stalkers
Four classifications: rejected, resentful, intimacy-seeking, incompetent
Identity theft
Fraudulently using someone's personal information
Intelligence
Gathering and analyzing information to prevent crimes
Internet
Global network of interconnected computers
Hacktivist
Hacker who carries out hacking for political or social causes
Grey Hat hacker
Hacker who operates between ethical and malicious intent
Web-based hacking
Hacking techniques targeting web applications and websites
Cyber stalking
Harassing or threatening behavior online
Steganography
Hiding information within other digital content
Digital immigrants
Individuals who adopted digital technology later in life
Digital natives
Individuals who grew up using digital technology
Script kiddies
Inexperienced hackers who use pre-made tools
Computer networks
Interconnected computers that share resources and information
Cyber forensics
Investigation and analysis of digital evidence in cyber crime cases
Common law
Law based on judicial decisions and customs
Statutory law
Law enacted by a legislative body
Black Hat hacker
Malicious hacker who exploits systems for personal gain
Malware
Malicious software designed to harm or exploit computer systems
Trojan
Malware disguised as legitimate software
Deep fakes
Manipulated videos or images that appear real but are fake
Social Engineering
Manipulating people to gain unauthorized access to information
Social engineering
Manipulating people to gain unauthorized access to information
Embezzlement
Misappropriation of funds entrusted to one's care
Botnets
Networks of compromised computers controlled by a central attacker
White collar crime
Non-violent crime committed by individuals in business or professional settings
Espionage as a Service (EaaS)
Offering espionage capabilities as a service
Networked public
Online community connected through digital networks
Dark Web
Part of the Deep Web that is intentionally hidden and used for illegal activities
Cyber harassment
Persistent and unwanted online behavior that causes distress
Traditional crime
Physical crimes committed in the physical world
Extreme left movements
Political ideologies associated with radical left-wing groups
Right-wing extremism
Political ideology associated with radical right-wing groups
Risk
Potential for loss or harm
Threats
Potential sources of harm or danger
Intranet
Private network accessible only to authorized users
Investigation
Process of gathering evidence to solve a crime
Cyber security
Protection of computer systems and data from digital attacks
Decoding
Reversing the process of encoding
Cost-effective security
Security measures that provide value for the cost
Worm
Self-replicating malware that spreads without human intervention
Sexting
Sending or receiving sexually explicit messages or images
Child pornography
Sexually explicit material involving minors
Insider attack methods
Social engineering, authorized system use, bypassing security, compromised accounts
Keylogger
Software or hardware that records keystrokes
Spyware
Software that collects information without the user's consent
Adware
Software that displays unwanted advertisements
Zero day vulnerabilities
Software vulnerabilities unknown to the vendor
Hate speech
Speech that promotes violence or discrimination against a particular group
Promotion
Spreading propaganda or misinformation
World Wide Web (WWW)
System of interlinked hypertext documents accessed via the Internet
Cryptography
Techniques for secure communication in the presence of adversaries
TSR virus
Terminate and Stay Resident virus that remains in memory
Mens rea
The mental state or intention to commit a crime
Actus reus
The physical act or conduct that constitutes a crime
Concurrence
The simultaneous occurrence of actus reus and mens rea
Corporate espionage
Theft of trade secrets or sensitive information from a company
Insider threat
Threat posed by individuals within an organization
System intrusion
Unauthorized access to a computer system
Web site defacement
Unauthorized modification of a website's appearance
Theft of Intellectual Property
Unauthorized use or theft of someone's creative work
Deep Web
Unindexed part of the Internet not accessible through search engines
Cyberterrorism
Use of computer technology to intimidate or coerce for political purposes
Information warfare
Use of information and communication technology in warfare
Technological facilitation
Use of technology to aid in criminal activities
Polymorphic virus
Virus that can change its code to avoid detection
Macro virus
Virus that infects documents with macros
File virus
Virus that infects executable files
Boot virus
Virus that infects the boot sector of a computer
Network virus
Virus that spreads over computer networks
Web
Visible part of the Internet with indexed websites
Vulnerabilities
Weaknesses or gaps in security that can be exploited