Explore tens of thousands of sets crafted by our community.
Cybercrime Law
29
Flashcards
0/29
Social Engineering
Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary payment or gain access to your confidential data. Social engineering can be combined with any of the threats listed above to make you more likely to click on links, download malware, or trust a malicious source.
The Child Online Protection Act (COPA)
COPA was a law in the United States passed in 1998 with the purpose of restricting access by minors to any material defined as harmful to such minors on the internet. However, its provisions have been blocked by legal challenges and the U.S. Supreme Court.
Digital Forensics
Digital forensics is the process of uncovering and interpreting electronic data. The goal of digital forensics is to preserve any evidence in its most original form while performing a structured investigation by collecting, identifying, and validating the digital information for the purpose of reconstructing past events.
Cyber Defamation Law
Cyber defamation law deals with defamation taking place in cyberspace, i.e., through the internet. It imposes liability on any person who publishes defamatory material online where it is accessible by others.
Rootkit
A rootkit is a collection of malicious computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.
The Electronic Communications Privacy Act (ECPA)
The ECPA is a United States federal statute that prohibits the unlawful interception, access, and disclosure of wire, electronic, and oral communications.
Computer Fraud and Abuse Act (CFAA)
The CFAA is a United States cybersecurity bill that was enacted in 1986 which primarily aims at mitigating hacking. The law prohibits the unauthorized access or exceeding authorized access to protected computers.
Cyber Espionage
Cyber espionage is the act or practice of obtaining secrets without the permission of the holder of the information (personal, sensitive, proprietary or classified), for personal, economic, political, or military advantage using illegal exploitation methods.
Ransomware
Ransomware is a type of malware that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
Identity Theft
Identity theft is a type of cybercrime in which an imposter obtains key pieces of personally identifiable information, such as Social Security or driver's license numbers, to impersonate someone else.
DDoS Attack
A Distributed Denial of Service (DDoS) attack aims to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.
The USA PATRIOT Act
The USA PATRIOT Act is an Act of Congress signed into law by United States President George W. Bush in 2001 that aimed at deterring and punishing terrorist acts in the United States and around the world and enhancing law enforcement investigatory tools.
General Data Protection Regulation (GDPR)
The GDPR is a regulation in EU law on data protection and privacy in the European Union and the European Economic Area. It also addresses the transfer of personal data outside the EU and EEA areas.
White Hat Hacker
A white hat hacker is an ethical computer security expert who specializes in penetration testing and other testing methodologies to ensure the security of an organization's information systems.
Botnet
A botnet refers to a network of private computers infected with malicious software and controlled as a group without the owners’ knowledge, e.g., to send spam messages.
Phishing
Phishing is a cybercrime where targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
Spyware
Spyware is a type of malware that is installed on a computer without the user's knowledge to collect information about them and relay it to advertisers or other interested parties.
Darknet
The darknet is part of the internet that uses custom software to hide the IP address of participants and which is often associated with illegal activities such as the purchase and sale of drugs, weapons, and stolen data.
The CAN-SPAM Act
The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.
Encryption
Encryption is the process of converting information or data into a code, especially to prevent unauthorized access.
Cybersecurity Information Sharing Act (CISA)
The CISA is a federal law that was passed in 2015 in the United States, which allows for the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies.
The Computer Misuse Act 1990
The Computer Misuse Act (CMA) 1990 is a UK law passed in 1990 that made illegal certain activities, such as hacking into other people’s systems, misusing software, or helping a person to gain access to protected files on someone else's computer.
Keylogger
A keylogger is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard. Keylogger software is also available for smartphones and tablets.
Malware
Malware is short for 'malicious software' and refers to any software intentionally designed to cause damage to a computer, server, client, or computer network.
Cyber Terrorism
Cyber terrorism is the use of the internet to conduct violent acts that result in, or threaten, loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation.
Zero-Day Exploit
A zero-day exploit is a cyber-attack that occurs on the same day a weakness is discovered in software. At that point, the software developers have zero days to fix the issue because an attack has already been made before the vulnerability was known.
Data Breach
A data breach is an incident in which information is accessed without authorization. Data breaches can hurt businesses and consumers in a variety of ways and are a costly expense that can damage lives and reputations.
Cyberstalking
Cyberstalking refers to the use of the internet, email, or other electronic communications to stalk, harass or intimidate someone. This can include false accusations, defamation, slander, and libel.
Trojan Horse
A Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive wooden horse that led to the fall of the city of Troy.
© Hypatia.Tech. 2024 All rights reserved.