1/28
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What does Chapter 18 focus on?
The future evolution of cybercrime, including new technologies like IoT, AI, and cloud computing, and the balance between regulation and civil liberties.
What is the Internet of Things (IoT)?
A network of connected devices (smartphones, appliances, sensors) that collect and share data, increasing convenience but also vulnerability.
How does IoT contribute to cybercrime risk?
Poorly secured devices can be exploited for attacks like the Mirai botnet, or used in state-sponsored cyber operations.
What example shows IoT vulnerability?
The Mirai botnet attack, which hijacked insecure devices to launch large-scale DDoS assaults.
What are the risks of connecting critical infrastructure to the internet?
It exposes essential services (power, water, gas) to hacking and sabotage, as seen in Russian attacks on Ukraine’s power grid.
What is bio-hacking?
The modification or implantation of biological devices (RFID chips, pacemakers) that connect to networks and may be exploited by hackers.
Who demonstrated vulnerabilities in medical implants?
Barnaby Jack, who showed that pacemakers and insulin pumps could be remotely hacked to cause harm.
What is cloud computing?
Internet-based storage and computing services that allow users to access data remotely via models like SaaS, PaaS, and IaaS.
What are major risks of cloud computing?
Data breaches and unauthorized access due to weak security settings or compromised credentials.
What is an example of a cloud-based data breach?
The 2014 iCloud celebrity photo leak and the 2020 Sunburst hack involving Russian state actors.
What is artificial intelligence (AI)?
Systems that process information, learn, and perform human-like or superior tasks such as prediction, analysis, and automation.
What are the three ways AI intersects with crime?
Crimes with AI, crimes on AI, and crimes by AI (Hayward & Maas, 2021).
What is an example of crimes with AI?
Using AI-driven drones for drug delivery or automated phishing attacks.
What is an example of crimes on AI?
Hacking autonomous cars or corrupting AI recognition systems for malicious outcomes.
What is an example of crimes by AI?
Machine learning systems making biased or harmful decisions without human direction.
What is state-sponsored hacking?
Cyberattacks and disinformation campaigns orchestrated or supported by governments for espionage or political influence.
What major event illustrates state-sponsored cybercrime?
Russian interference in the 2016 and 2020 U.S. elections through hacking and propaganda.
What is fake news?
Misinformation created or spread online to deceive, manipulate, or influence public opinion.
Why is fake news effective?
It exploits user biases and algorithms that promote emotionally charged or familiar content.
What are hacktivists and proto-state hackers?
Non-state actors who engage in politically motivated cyberattacks or digital resistance movements.
What tension does Chapter 18 highlight?
The conflict between regulating harmful online behaviors and protecting civil liberties such as free speech and privacy.
What are major freedom of speech challenges online?
Regulating hate speech, disinformation, and obscene content without infringing First Amendment rights.
How do hackers and pirates relate to free speech debates?
They often argue that code and digital content are forms of speech that should be shared freely.
What is online privacy?
The right to control personal data and protect it from surveillance or unauthorized access.
What is the privacy paradox?
The contradiction where people value privacy but still share personal information online.
What is privacy fatigue?
Resignation toward privacy protection, where users feel powerless to control their data exposure.
What did Edward Snowden’s leaks reveal?
Extensive government surveillance programs and the need for transparency in data collection.
Why does cybercrime persist despite regulation?
Technology evolves faster than law enforcement, and civil liberty concerns limit overreach.
What is the main takeaway of Chapter 18?
Cybercrime will continue to evolve with technology, demanding ongoing adaptation, cooperation, and ethical balance.