Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Cybercrime Law

29

Flashcards

0/29

Still learning
StarStarStarStar

Social Engineering

StarStarStarStar

Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary payment or gain access to your confidential data. Social engineering can be combined with any of the threats listed above to make you more likely to click on links, download malware, or trust a malicious source.

StarStarStarStar

The Child Online Protection Act (COPA)

StarStarStarStar

COPA was a law in the United States passed in 1998 with the purpose of restricting access by minors to any material defined as harmful to such minors on the internet. However, its provisions have been blocked by legal challenges and the U.S. Supreme Court.

StarStarStarStar

Digital Forensics

StarStarStarStar

Digital forensics is the process of uncovering and interpreting electronic data. The goal of digital forensics is to preserve any evidence in its most original form while performing a structured investigation by collecting, identifying, and validating the digital information for the purpose of reconstructing past events.

StarStarStarStar

Cyber Defamation Law

StarStarStarStar

Cyber defamation law deals with defamation taking place in cyberspace, i.e., through the internet. It imposes liability on any person who publishes defamatory material online where it is accessible by others.

StarStarStarStar

Rootkit

StarStarStarStar

A rootkit is a collection of malicious computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.

StarStarStarStar

The Electronic Communications Privacy Act (ECPA)

StarStarStarStar

The ECPA is a United States federal statute that prohibits the unlawful interception, access, and disclosure of wire, electronic, and oral communications.

StarStarStarStar

Computer Fraud and Abuse Act (CFAA)

StarStarStarStar

The CFAA is a United States cybersecurity bill that was enacted in 1986 which primarily aims at mitigating hacking. The law prohibits the unauthorized access or exceeding authorized access to protected computers.

StarStarStarStar

Cyber Espionage

StarStarStarStar

Cyber espionage is the act or practice of obtaining secrets without the permission of the holder of the information (personal, sensitive, proprietary or classified), for personal, economic, political, or military advantage using illegal exploitation methods.

StarStarStarStar

Ransomware

StarStarStarStar

Ransomware is a type of malware that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.

StarStarStarStar

Identity Theft

StarStarStarStar

Identity theft is a type of cybercrime in which an imposter obtains key pieces of personally identifiable information, such as Social Security or driver's license numbers, to impersonate someone else.

StarStarStarStar

DDoS Attack

StarStarStarStar

A Distributed Denial of Service (DDoS) attack aims to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.

StarStarStarStar

The USA PATRIOT Act

StarStarStarStar

The USA PATRIOT Act is an Act of Congress signed into law by United States President George W. Bush in 2001 that aimed at deterring and punishing terrorist acts in the United States and around the world and enhancing law enforcement investigatory tools.

StarStarStarStar

General Data Protection Regulation (GDPR)

StarStarStarStar

The GDPR is a regulation in EU law on data protection and privacy in the European Union and the European Economic Area. It also addresses the transfer of personal data outside the EU and EEA areas.

StarStarStarStar

White Hat Hacker

StarStarStarStar

A white hat hacker is an ethical computer security expert who specializes in penetration testing and other testing methodologies to ensure the security of an organization's information systems.

StarStarStarStar

Botnet

StarStarStarStar

A botnet refers to a network of private computers infected with malicious software and controlled as a group without the owners’ knowledge, e.g., to send spam messages.

StarStarStarStar

Phishing

StarStarStarStar

Phishing is a cybercrime where targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

StarStarStarStar

Spyware

StarStarStarStar

Spyware is a type of malware that is installed on a computer without the user's knowledge to collect information about them and relay it to advertisers or other interested parties.

StarStarStarStar

Darknet

StarStarStarStar

The darknet is part of the internet that uses custom software to hide the IP address of participants and which is often associated with illegal activities such as the purchase and sale of drugs, weapons, and stolen data.

StarStarStarStar

The CAN-SPAM Act

StarStarStarStar

The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.

StarStarStarStar

Encryption

StarStarStarStar

Encryption is the process of converting information or data into a code, especially to prevent unauthorized access.

StarStarStarStar

Cybersecurity Information Sharing Act (CISA)

StarStarStarStar

The CISA is a federal law that was passed in 2015 in the United States, which allows for the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies.

StarStarStarStar

The Computer Misuse Act 1990

StarStarStarStar

The Computer Misuse Act (CMA) 1990 is a UK law passed in 1990 that made illegal certain activities, such as hacking into other people’s systems, misusing software, or helping a person to gain access to protected files on someone else's computer.

StarStarStarStar

Keylogger

StarStarStarStar

A keylogger is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard. Keylogger software is also available for smartphones and tablets.

StarStarStarStar

Malware

StarStarStarStar

Malware is short for 'malicious software' and refers to any software intentionally designed to cause damage to a computer, server, client, or computer network.

StarStarStarStar

Cyber Terrorism

StarStarStarStar

Cyber terrorism is the use of the internet to conduct violent acts that result in, or threaten, loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation.

StarStarStarStar

Zero-Day Exploit

StarStarStarStar

A zero-day exploit is a cyber-attack that occurs on the same day a weakness is discovered in software. At that point, the software developers have zero days to fix the issue because an attack has already been made before the vulnerability was known.

StarStarStarStar

Data Breach

StarStarStarStar

A data breach is an incident in which information is accessed without authorization. Data breaches can hurt businesses and consumers in a variety of ways and are a costly expense that can damage lives and reputations.

StarStarStarStar

Cyberstalking

StarStarStarStar

Cyberstalking refers to the use of the internet, email, or other electronic communications to stalk, harass or intimidate someone. This can include false accusations, defamation, slander, and libel.

StarStarStarStar

Trojan Horse

StarStarStarStar

A Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive wooden horse that led to the fall of the city of Troy.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.