1/39
A vocabulary set distilling major terms, concepts, and agencies introduced in the lecture excerpts on Cybercrime and Digital Forensics (Chapters 1 & 2).
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cybercrime
Any illegal act in which computers, networks, or digital data are the primary instruments, targets, or places of criminal activity.
Digital Forensics
The scientific process of identifying, preserving, analyzing, and presenting digital evidence in support of criminal, civil, or internal investigations.
Technicways
Behavioral changes and new social patterns that emerge in response to technological innovation.
Digital Native
A person born into a world already saturated with digital technology, for whom computers, the Internet, and mobile devices are part of everyday life.
Digital Immigrant
Someone born before the widespread adoption of digital technology who must adapt to its rapid growth and usage.
Subculture
A distinct group within a larger culture that maintains its own values, norms, jargon, and traditions—often influencing members’ behaviors and identities.
Dark Web
A hidden part of the Internet accessible only with special software (e.g., Tor) where users seek anonymity and illicit markets thrive.
The Onion Router (Tor)
Free, open-source software that anonymizes Internet traffic by routing it through multiple encrypted relays, masking users’ IP addresses.
Cyberdeviance
Online behavior that violates social norms but is not necessarily illegal (e.g., sexting in school, non-criminal trolling).
Cyber-trespass
Illicitly crossing digital boundaries—such as hacking into computers, networks, or accounts without authorization.
Cyber-deception and Theft
Using computers or networks to obtain money, goods, or data by fraud, piracy, phishing, or identity theft.
Cyber-porn and Obscenity
Production, distribution, or consumption of sexually explicit content online, including illegal or obscene material.
Cyber-violence
Online actions that inflict emotional, psychological, or physical harm, including cyberbullying, harassment, and cyberstalking.
Phishing
A social-engineering technique that tricks victims into revealing sensitive information by masquerading as a trustworthy entity in electronic communications.
Malware
Malicious software (viruses, worms, trojans, ransomware, etc.) designed to disrupt, damage, or gain unauthorized access to computer systems.
Distributed Denial of Service (DDoS)
A coordinated flood of Internet traffic from multiple devices that overwhelms and incapacitates a target server or network.
Child Sexual Exploitation Material (CSEM)
Any visual depiction of sexually explicit conduct involving a minor; illegal to create, possess, or distribute.
Cyberterrorism
The politically or ideologically motivated use of computers or networks to cause fear, disruption, or physical/financial harm.
Digital Evidence
Information of probative value that is stored or transmitted in binary form and can be used in court.
Extradition
The legal process by which one jurisdiction surrenders a suspect or convicted criminal to another jurisdiction for prosecution or punishment.
Racketeer Influenced and Corrupt Organizations Act (RICO)
A U.S. law originally targeting organized crime, proposed for expansion to prosecute coordinated hacking and cybercrime enterprises.
Spam
Unsolicited bulk electronic messages, often used to deliver phishing lures or malware.
Spamhaus
A U.K.-based nonprofit NGO that tracks spam and malware sources, providing real-time block lists to ISPs and law-enforcement agencies.
Computer Emergency Readiness Team (CERT)
A public or private group of cybersecurity experts that monitors, analyzes, and responds to computer security incidents.
Fusion Center
State-level intelligence hub in the United States that collects, analyzes, and disseminates information on threats, including cyber-related ones.
Private Investigator (PI)
A licensed civilian professional hired to collect information; in many states, a PI license is required to perform digital-forensic work in civil cases.
Compensatory Damages
Monetary awards in civil cases meant to reimburse a plaintiff for actual losses suffered.
Punitive Damages
Money awarded in civil cases to punish especially harmful conduct and deter future wrongdoing.
Preponderance of Evidence
The civil-law standard of proof requiring that a claim be more likely true than not (>50%).
Beyond a Reasonable Doubt
The criminal-law burden of proof requiring near-certainty of the defendant’s guilt before conviction.
Interpol
International Criminal Police Organization that facilitates cross-border cooperation, databases, and task forces for crimes including cybercrime.
Cyber Civil Rights Initiative (CCRI)
A U.S. nonprofit NGO providing advocacy, resources, and legal reform efforts for victims of non-consensual pornography (revenge porn).
PRISM
A clandestine NSA program (revealed by Edward Snowden) that collects large volumes of Internet communications from U.S. tech companies for intelligence purposes.
KARMA POLICE
A GCHQ mass-surveillance project aiming to profile the web-browsing habits of global Internet users.
Force Multiplier (in cybercrime)
The way digital tools allow a single offender to reach vast numbers of victims quickly, amplifying criminal impact.
Incident Response
The structured process of detecting, investigating, mitigating, and learning from cybersecurity events or breaches.
Write Blocker
Hardware or software that allows read-only access to digital storage during forensic imaging, preserving data integrity.
Chain of Custody
A documented record showing the chronological control, transfer, analysis, and disposition of evidence to maintain its integrity.
Jurisdiction
The legal authority of a law-enforcement agency or court to investigate, charge, or adjudicate an offense within a defined geographic or subject area.
Legitimacy (Police or Corporate)
The public’s belief that an authority’s actions are appropriate, lawful, and deserving of compliance and cooperation.