Lecture 1-Cyber security

5.0(1)
studied byStudied by 11 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/12

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:04 PM on 2/2/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

13 Terms

1
New cards

Lottery Scam

A scam in which victims are told they have won the lottery and are required to send an amount of money as part of “administrative fees” to claim their winnings

2
New cards

Romance Scam

The perpetrator claims to fall in love with the victim, and wants to marry them. Follows up with a problem, such as injury, loss of travel documents, or requiring financial aid

3
New cards

Military Scams

A scam in which victims are contacted by an official-sounding agency trying to return military officers and their property. Will also claim that a soldier is in jail and is in need of bail money

4
New cards

Grandparent scam

A scam in which the perpetrator phones the victim claiming to be their grandchild and is in need of bail money as they are in jail.

5
New cards

Tax scam

A scam in which a perpetrator sends a fake refund cheque and then requests a portion be returned to them, OR they use threatening language and scare tactics to convince the victim that they need to send money to correct their taxes.

6
New cards

Inheritance scam

Involves a made-up story about a fake relative leaving their estate to the victim. Scammer may pose as a lawyer or bank official requesting immediate “fees”

7
New cards

Technology as target

Criminal offences targeting computers and other information technologies

8
New cards

Technology as an instrument

Criminal offences where the internet and information technologies are instrumental in the commission of a crime

9
New cards

Personally Identifiable Information (PII)

any information that can be used to identify a particular individual, such as sex, race, age, education, SIN, address, etc.

10
New cards

TOR project

A software that allows users to anonymously access encrypted websites on the dark web

11
New cards

Public Safety Canada

the government department responsible for establishing a framework for cybersecurity in Canada

12
New cards

Cyberspace challenges to law enforcement

  1. The sheer volume of cases can be overwhelming

  2. Officers may lack training for dealing with cybercrime

  3. The offender’s identity can be hidden anywhere in the world

13
New cards

Mutual Legal Assistance Treaty (MLAT)

Required when LE in one country assists in gathering and exchanging information with LE in another country while investigating or enforcing laws