cyber 2

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:54 PM on 10/23/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

20 Terms

1
New cards

White Hat Hackers

Ethical hackers who operate in the public's best interest, using tools and techniques to strengthen digital defenses.

2
New cards

Black Hat Hackers

Individuals who hack for personal gains, often causing destruction or theft, acting with malicious intent.

3
New cards

Gray Hat Hackers

Hackers who operate between ethical and malicious hacking, sometimes exposing vulnerabilities with permission.

4
New cards

Phishers

Fraudsters who use deceptive communications to steal personal information, often through fake websites.

5
New cards

Advanced Persistent Threat (APT) Agents

Highly organized state-sponsored groups responsible for targeted cyber attacks.

6
New cards

Insiders

Individuals within an organization who pose the highest risk for cyber attacks.

7
New cards

Cyber Intelligence Process

The tracking, analyzing, and countering of digital security threats using physical espionage and information technology.

8
New cards

Republic Act 10175

The Cybercrime Prevention Act of 2012, which defines and penalizes cyber offenses.

9
New cards

Data Privacy Act of 2012

RA 10173, legislation that protects personal information and governs how it can be used.

10
New cards

Computer Emergency Response Team (CERT)

A team established to coordinate responses to cybersecurity incidents.

11
New cards

Cyber Investigation

The systematic process of detecting, preserving, analyzing, and presenting digital evidence in cybercrime cases.

12
New cards

Phase of Cyber Investigation: Preparation

The step in which special cyber warrants are obtained and coordination with key agencies is established.

13
New cards

Phase of Cyber Investigation: Collection of Evidence

The action taken to collect digital artifacts such as computer logs and data relevant to the cybercrime investigation.

14
New cards

Legal Department of Justice (DOJ)

The department responsible for addressing issues related to cybercrime and coordinating with law enforcement.

15
New cards

Chain of Custody

The process that ensures the integrity of evidence collected during investigations, maintaining a documented trail.

16
New cards

Mutual Legal Assistance Treaty (MLAT)

An agreement between two or more countries for the purpose of gathering and exchanging information in an investigation.

17
New cards

Jurisprudence of Cybercrime

A body of law concerning offenses committed through the use of computer systems and networks.

18
New cards

Section 10: Law Enforcement Authorities

Outlines responsibilities of law enforcement in investigating and prosecuting cybercrimes.

19
New cards

Section 11: Duties of Law Enforcement Authorities

Mandates regular reporting and compliance with cybercrime investigation procedures.

20
New cards

Insider Threats

Risk posed by individuals within an organization who have inside information concerning the organization's security practices.