Chapter 18 – The Futures of Cybercrime

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

What does Chapter 18 focus on?

The future evolution of cybercrime, including new technologies like IoT, AI, and cloud computing, and the balance between regulation and civil liberties.

2
New cards

What is the Internet of Things (IoT)?

A network of connected devices (smartphones, appliances, sensors) that collect and share data, increasing convenience but also vulnerability.

3
New cards

How does IoT contribute to cybercrime risk?

Poorly secured devices can be exploited for attacks like the Mirai botnet, or used in state-sponsored cyber operations.

4
New cards

What example shows IoT vulnerability?

The Mirai botnet attack, which hijacked insecure devices to launch large-scale DDoS assaults.

5
New cards

What are the risks of connecting critical infrastructure to the internet?

It exposes essential services (power, water, gas) to hacking and sabotage, as seen in Russian attacks on Ukraine’s power grid.

6
New cards

What is bio-hacking?

The modification or implantation of biological devices (RFID chips, pacemakers) that connect to networks and may be exploited by hackers.

7
New cards

Who demonstrated vulnerabilities in medical implants?

Barnaby Jack, who showed that pacemakers and insulin pumps could be remotely hacked to cause harm.

8
New cards

What is cloud computing?

Internet-based storage and computing services that allow users to access data remotely via models like SaaS, PaaS, and IaaS.

9
New cards

What are major risks of cloud computing?

Data breaches and unauthorized access due to weak security settings or compromised credentials.

10
New cards

What is an example of a cloud-based data breach?

The 2014 iCloud celebrity photo leak and the 2020 Sunburst hack involving Russian state actors.

11
New cards

What is artificial intelligence (AI)?

Systems that process information, learn, and perform human-like or superior tasks such as prediction, analysis, and automation.

12
New cards

What are the three ways AI intersects with crime?

Crimes with AI, crimes on AI, and crimes by AI (Hayward & Maas, 2021).

13
New cards

What is an example of crimes with AI?

Using AI-driven drones for drug delivery or automated phishing attacks.

14
New cards

What is an example of crimes on AI?

Hacking autonomous cars or corrupting AI recognition systems for malicious outcomes.

15
New cards

What is an example of crimes by AI?

Machine learning systems making biased or harmful decisions without human direction.

16
New cards

What is state-sponsored hacking?

Cyberattacks and disinformation campaigns orchestrated or supported by governments for espionage or political influence.

17
New cards

What major event illustrates state-sponsored cybercrime?

Russian interference in the 2016 and 2020 U.S. elections through hacking and propaganda.

18
New cards

What is fake news?

Misinformation created or spread online to deceive, manipulate, or influence public opinion.

19
New cards

Why is fake news effective?

It exploits user biases and algorithms that promote emotionally charged or familiar content.

20
New cards

What are hacktivists and proto-state hackers?

Non-state actors who engage in politically motivated cyberattacks or digital resistance movements.

21
New cards

What tension does Chapter 18 highlight?

The conflict between regulating harmful online behaviors and protecting civil liberties such as free speech and privacy.

22
New cards

What are major freedom of speech challenges online?

Regulating hate speech, disinformation, and obscene content without infringing First Amendment rights.

23
New cards

How do hackers and pirates relate to free speech debates?

They often argue that code and digital content are forms of speech that should be shared freely.

24
New cards

What is online privacy?

The right to control personal data and protect it from surveillance or unauthorized access.

25
New cards

What is the privacy paradox?

The contradiction where people value privacy but still share personal information online.

26
New cards

What is privacy fatigue?

Resignation toward privacy protection, where users feel powerless to control their data exposure.

27
New cards

What did Edward Snowden’s leaks reveal?

Extensive government surveillance programs and the need for transparency in data collection.

28
New cards

Why does cybercrime persist despite regulation?

Technology evolves faster than law enforcement, and civil liberty concerns limit overreach.

29
New cards

What is the main takeaway of Chapter 18?

Cybercrime will continue to evolve with technology, demanding ongoing adaptation, cooperation, and ethical balance.