Introduction to Cybercrime and Environmental Laws and Protection

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/46

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key terms from the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

47 Terms

1
New cards

Cyber

Refers to computers or computer networks; the electronic medium used for online communication; has revolutionized interaction, communication, and business.

2
New cards

Cyberspace

The virtual world of computers, networks, and digital systems connected through the internet; the spaces between computers where people interact with information and with each other.

3
New cards

Computer

A machine that performs processes, calculations, and operations based on instructions from software or hardware; designed to run applications and integrate hardware and software.

4
New cards

Vulnerability

Weaknesses that make computers susceptible to harm, including data storage capacity, ease of access, and potential loss of evidence.

5
New cards

Supercomputer

The fastest, largest, and most powerful type of computer; extremely expensive; Frontier is an example used for climate modeling, AI, and more.

6
New cards

Mainframe

High-performance, large, and expensive computers used for critical applications, large databases, and high-security environments.

7
New cards

Personal Computer (PC)

A computer used in daily life; smaller and less powerful than supercomputers and mainframes.

8
New cards

Hardware

Physical components of a computer, including input devices, output devices, system unit, storage devices, and communication devices.

9
New cards

Input Device

Hardware that allows a user to enter information into the computer (e.g., keyboard, microphone, camera, mouse, touchpad).

10
New cards

Output Device

Hardware that provides information to the user (e.g., monitor, printer, speaker).

11
New cards

Storage Media

Physical devices that store data, information, and instructions for future use; can be internal or external and may be connected or housed inside a device.

12
New cards

Hard Drive

Internal storage device used to store data; can be internal or external via USB/other interfaces; essential component of a computer.

13
New cards

Floppy Disk

Portable storage medium; largely obsolete due to low capacity and fragility.

14
New cards

CD/DVD

Portable storage media that hold more data than a floppy; widely replaced by newer solutions but still used for certain purposes.

15
New cards

USB Flash Drive

Small, portable storage medium with higher capacity than floppy disks; convenient for backups and transfers.

16
New cards

Software

Instructions (programs) that tell a computer what to do; includes system software and application software.

17
New cards

System Software

Software that provides a platform for other software to run; includes the operating system.

18
New cards

Operating System (OS)

System software that controls hardware and software, manages memory and processes, and enables the computer to operate.

19
New cards

Application Software

Programs designed to perform specific tasks; installed after system software.

20
New cards

Word Processing

Application software used to create and edit text documents (e.g., Microsoft Word).

21
New cards

Spreadsheet

Application software used to organize, analyze, and calculate data (e.g., Microsoft Excel).

22
New cards

Email

Application software used to send and receive electronic mail (e.g., Outlook Express).

23
New cards

Internet

Global network of interconnected computers and networks using standardized protocols to exchange data worldwide.

24
New cards

WAN

Wide Area Network; a network infrastructure that links computers over large geographic areas, including the Internet.

25
New cards

Intranet

A private network restricted to registered users within an organization, protecting sensitive information from external threats.

26
New cards

World Wide Web (WWW)

A service on the Internet that enables browsing of web pages.

27
New cards

Instant Messaging (IM)

Online service that allows real-time text, voice, or video communication (e.g., Skype, Google Talk, Windows Live Messenger).

28
New cards

Network

Collection of interconnected devices that communicate to share resources and information; ranges from LANs to the Internet.

29
New cards

Local Area Network (LAN)

A network within a building or campus for sharing resources and internet access.

30
New cards

Wireless Network

A network that uses wireless technologies (e.g., Wi‑Fi) to connect devices without physical cables.

31
New cards

Firewall

Security system that monitors and controls incoming/outgoing network traffic based on security rules; barrier between trusted and external networks.

32
New cards

Intrusion Detection System (IDS)

Security technology that monitors network traffic and system activities for signs of security breaches; alerts administrators.

33
New cards

Virtual Private Network (VPN)

Technology that creates a secure, encrypted connection over a less secure network (like the Internet), with IP masking.

34
New cards

Mobile Internet

Internet access provided via cellular networks on mobile devices.

35
New cards

Wi‑Fi Hotspot

Location offering Wi‑Fi access that allows devices to connect to the Internet wirelessly.

36
New cards

Broadband

High-speed Internet access delivered via cable or telephone lines; includes DSL.

37
New cards

DSL

Digital Subscriber Line; uses existing copper telephone lines to provide high-speed Internet.

38
New cards

Cable Internet

Broadband access via cable TV lines using a cable modem.

39
New cards

Satellite Internet

Broadband Internet access via satellite, used where other options are unavailable.

40
New cards

Uses of the Internet

Functions including communication, information sharing, and rapid access to information worldwide.

41
New cards

Social Media

Online platforms that enable users to generate, share, and interact with content across the Internet.

42
New cards

Social Media Vulnerability

Large user bases and user-generated content create opportunities for cybercrime, data mining, and manipulation.

43
New cards

Google

Search engine used to find information online.

44
New cards

YouTube

Video sharing platform for watching and uploading videos.

45
New cards

Facebook

Social networking platform for communication and content sharing.

46
New cards

Wikipedia

Free online encyclopedia.

47
New cards

Shopee/Lazada

Online shopping platforms.