Cybercrime and Digital Forensics – Key Vocabulary

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/39

flashcard set

Earn XP

Description and Tags

A vocabulary set distilling major terms, concepts, and agencies introduced in the lecture excerpts on Cybercrime and Digital Forensics (Chapters 1 & 2).

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

Cybercrime

Any illegal act in which computers, networks, or digital data are the primary instruments, targets, or places of criminal activity.

2
New cards

Digital Forensics

The scientific process of identifying, preserving, analyzing, and presenting digital evidence in support of criminal, civil, or internal investigations.

3
New cards

Technicways

Behavioral changes and new social patterns that emerge in response to technological innovation.

4
New cards

Digital Native

A person born into a world already saturated with digital technology, for whom computers, the Internet, and mobile devices are part of everyday life.

5
New cards

Digital Immigrant

Someone born before the widespread adoption of digital technology who must adapt to its rapid growth and usage.

6
New cards

Subculture

A distinct group within a larger culture that maintains its own values, norms, jargon, and traditions—often influencing members’ behaviors and identities.

7
New cards

Dark Web

A hidden part of the Internet accessible only with special software (e.g., Tor) where users seek anonymity and illicit markets thrive.

8
New cards

The Onion Router (Tor)

Free, open-source software that anonymizes Internet traffic by routing it through multiple encrypted relays, masking users’ IP addresses.

9
New cards

Cyberdeviance

Online behavior that violates social norms but is not necessarily illegal (e.g., sexting in school, non-criminal trolling).

10
New cards

Cyber-trespass

Illicitly crossing digital boundaries—such as hacking into computers, networks, or accounts without authorization.

11
New cards

Cyber-deception and Theft

Using computers or networks to obtain money, goods, or data by fraud, piracy, phishing, or identity theft.

12
New cards

Cyber-porn and Obscenity

Production, distribution, or consumption of sexually explicit content online, including illegal or obscene material.

13
New cards

Cyber-violence

Online actions that inflict emotional, psychological, or physical harm, including cyberbullying, harassment, and cyberstalking.

14
New cards

Phishing

A social-engineering technique that tricks victims into revealing sensitive information by masquerading as a trustworthy entity in electronic communications.

15
New cards

Malware

Malicious software (viruses, worms, trojans, ransomware, etc.) designed to disrupt, damage, or gain unauthorized access to computer systems.

16
New cards

Distributed Denial of Service (DDoS)

A coordinated flood of Internet traffic from multiple devices that overwhelms and incapacitates a target server or network.

17
New cards

Child Sexual Exploitation Material (CSEM)

Any visual depiction of sexually explicit conduct involving a minor; illegal to create, possess, or distribute.

18
New cards

Cyberterrorism

The politically or ideologically motivated use of computers or networks to cause fear, disruption, or physical/financial harm.

19
New cards

Digital Evidence

Information of probative value that is stored or transmitted in binary form and can be used in court.

20
New cards

Extradition

The legal process by which one jurisdiction surrenders a suspect or convicted criminal to another jurisdiction for prosecution or punishment.

21
New cards

Racketeer Influenced and Corrupt Organizations Act (RICO)

A U.S. law originally targeting organized crime, proposed for expansion to prosecute coordinated hacking and cybercrime enterprises.

22
New cards

Spam

Unsolicited bulk electronic messages, often used to deliver phishing lures or malware.

23
New cards

Spamhaus

A U.K.-based nonprofit NGO that tracks spam and malware sources, providing real-time block lists to ISPs and law-enforcement agencies.

24
New cards

Computer Emergency Readiness Team (CERT)

A public or private group of cybersecurity experts that monitors, analyzes, and responds to computer security incidents.

25
New cards

Fusion Center

State-level intelligence hub in the United States that collects, analyzes, and disseminates information on threats, including cyber-related ones.

26
New cards

Private Investigator (PI)

A licensed civilian professional hired to collect information; in many states, a PI license is required to perform digital-forensic work in civil cases.

27
New cards

Compensatory Damages

Monetary awards in civil cases meant to reimburse a plaintiff for actual losses suffered.

28
New cards

Punitive Damages

Money awarded in civil cases to punish especially harmful conduct and deter future wrongdoing.

29
New cards

Preponderance of Evidence

The civil-law standard of proof requiring that a claim be more likely true than not (>50%).

30
New cards

Beyond a Reasonable Doubt

The criminal-law burden of proof requiring near-certainty of the defendant’s guilt before conviction.

31
New cards

Interpol

International Criminal Police Organization that facilitates cross-border cooperation, databases, and task forces for crimes including cybercrime.

32
New cards

Cyber Civil Rights Initiative (CCRI)

A U.S. nonprofit NGO providing advocacy, resources, and legal reform efforts for victims of non-consensual pornography (revenge porn).

33
New cards

PRISM

A clandestine NSA program (revealed by Edward Snowden) that collects large volumes of Internet communications from U.S. tech companies for intelligence purposes.

34
New cards

KARMA POLICE

A GCHQ mass-surveillance project aiming to profile the web-browsing habits of global Internet users.

35
New cards

Force Multiplier (in cybercrime)

The way digital tools allow a single offender to reach vast numbers of victims quickly, amplifying criminal impact.

36
New cards

Incident Response

The structured process of detecting, investigating, mitigating, and learning from cybersecurity events or breaches.

37
New cards

Write Blocker

Hardware or software that allows read-only access to digital storage during forensic imaging, preserving data integrity.

38
New cards

Chain of Custody

A documented record showing the chronological control, transfer, analysis, and disposition of evidence to maintain its integrity.

39
New cards

Jurisdiction

The legal authority of a law-enforcement agency or court to investigate, charge, or adjudicate an offense within a defined geographic or subject area.

40
New cards

Legitimacy (Police or Corporate)

The public’s belief that an authority’s actions are appropriate, lawful, and deserving of compliance and cooperation.