1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
White Hat Hackers
Ethical hackers who operate in the public's best interest, using tools and techniques to strengthen digital defenses.
Black Hat Hackers
Individuals who hack for personal gains, often causing destruction or theft, acting with malicious intent.
Gray Hat Hackers
Hackers who operate between ethical and malicious hacking, sometimes exposing vulnerabilities with permission.
Phishers
Fraudsters who use deceptive communications to steal personal information, often through fake websites.
Advanced Persistent Threat (APT) Agents
Highly organized state-sponsored groups responsible for targeted cyber attacks.
Insiders
Individuals within an organization who pose the highest risk for cyber attacks.
Cyber Intelligence Process
The tracking, analyzing, and countering of digital security threats using physical espionage and information technology.
Republic Act 10175
The Cybercrime Prevention Act of 2012, which defines and penalizes cyber offenses.
Data Privacy Act of 2012
RA 10173, legislation that protects personal information and governs how it can be used.
Computer Emergency Response Team (CERT)
A team established to coordinate responses to cybersecurity incidents.
Cyber Investigation
The systematic process of detecting, preserving, analyzing, and presenting digital evidence in cybercrime cases.
Phase of Cyber Investigation: Preparation
The step in which special cyber warrants are obtained and coordination with key agencies is established.
Phase of Cyber Investigation: Collection of Evidence
The action taken to collect digital artifacts such as computer logs and data relevant to the cybercrime investigation.
Legal Department of Justice (DOJ)
The department responsible for addressing issues related to cybercrime and coordinating with law enforcement.
Chain of Custody
The process that ensures the integrity of evidence collected during investigations, maintaining a documented trail.
Mutual Legal Assistance Treaty (MLAT)
An agreement between two or more countries for the purpose of gathering and exchanging information in an investigation.
Jurisprudence of Cybercrime
A body of law concerning offenses committed through the use of computer systems and networks.
Section 10: Law Enforcement Authorities
Outlines responsibilities of law enforcement in investigating and prosecuting cybercrimes.
Section 11: Duties of Law Enforcement Authorities
Mandates regular reporting and compliance with cybercrime investigation procedures.
Insider Threats
Risk posed by individuals within an organization who have inside information concerning the organization's security practices.