1: Evolution of Computing and Cybercrime Definitions

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

computer (physical)

a device that we use (e.g., laptop, desktop, cell phone)

2
New cards

computer (electronic)

device that can store, retrieve, and process data

3
New cards

software

any set of instructions that tell a computer what to do, comprises the entire set of programs, procedures, and routines associated with the operation of a computer system

4
New cards

hardware

the actual physical device; made up of external and internal components

5
New cards

external components

laptop, monitor, keyboard

6
New cards

internal components

CPU or processor, video card

7
New cards

network

a group of two or more connected computers

8
New cards

packet

small segment of a larger message; data sent over computer networks is divided into packets, which care recombined by the computer or device that receives them.

9
New cards

packet switching

refers to the ability of networking equipment to process packets independently from each other; also means that packets can take different network paths to the same destination, as long as they arrive

10
New cards

packet header

a label which provides information about the packet’s contents, origin, and destination

11
New cards

protocol

standardized way of formatting data so any computer can interpret data

12
New cards

internet protocol (IP) address

a series of numbers that identifies any device on a network

13
New cards

computer supported crimes

computer not central to the crime but may contain evidence of the crime (e.g., addresses found in computer of murder suspect)

14
New cards

computer facilitated crime

computer is a tool used to commit the crime (e.g., child exploitation material, fraud)

15
New cards

computer crimes

the computer or the target network is the attack (e.g., hacking, malware, DDoS)

16
New cards

technology as target

criminal offences targeting computers and other information technologies

17
New cards

technology as instrument

internet and information technologies are instrumental in the commission of crime

18
New cards

routine activities theory (RAT)

for a crime to occur, three things must come together in both time and space: a likely offender, a suitable target, the absence of a capable guardian to prevent the crime