cyber part 1

0.0(0)
Studied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:48 PM on 10/23/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

23 Terms

1
New cards

Distributed Denial of Service (DDoS)

A cyber attack that floods a target server with traffic from multiple compromised systems, causing website or service downtime and financial loss.

2
New cards

Cyberweapons

Malware, worms, and trojans deployed to infiltrate or damage systems, leading to data theft, espionage, or sabotage.

3
New cards

Phishing Campaigns

Deceptive emails sent from controlled systems to harvest credentials, resulting in identity theft, fraud, or scams.

4
New cards

Cyber Crime

Convergence of computer and internet-based offenses intended to deliberately harm individuals or groups through digital means.

5
New cards

Cyber Criminology

The study of the causation of crimes occurring in cyberspace and their impact on physical space.

6
New cards

Computer as Weapon

Refers to the use of a computer to execute malicious actions against another system or entity.

7
New cards

Automated Attacks

Cyber attacks that can run continuously without direct human input, targeting thousands or millions of victims.

8
New cards

Ransomware

Malware that encrypts files and demands payment for decryption, often used in cyberextortion.

9
New cards

Cyberterrorism

Premeditated use of cyberspace to conduct attacks that aim to cause grave harm to life and property for political purposes.

10
New cards

Identity Theft

Using stolen personal data to open loans or secure services under another person's name.

11
New cards

Business Email Compromise (BEC)

Impersonating executives to trick staff into unwarranted fund transfers.

12
New cards

Cyber Extortion

Demanding payment or benefits from victims in exchange for halting an ongoing cyber attack or restoring access to data.

13
New cards

Illegal Access Act

Laws addressing unauthorized access to computer systems, often included in cybercrime prevention legislation.

14
New cards

Malware

Malicious software designed to infiltrate, damage, or disable computers, networks, and systems.

15
New cards

Obscene Content

Material that offends public morals and is judged by community standards, often regulated by law.

16
New cards

Harassment

The use of ICT to target, intimidate, threaten, or cause distress to individuals or groups.

17
New cards

Cyberbullying

Humiliating or intimidating someone online, typically in school contexts.

18
New cards

Doxxing

Publishing private information about individuals with the intent to invite harassment.

19
New cards

Cyber Fraud

A form of online deception aimed at obtaining unlawful financial gains through various schemes.

20
New cards

Scammers

Individuals who use technology to exploit human psychology for committing fraud or financial deception.

21
New cards

Script Kiddies

Inexperienced hackers who use prewritten scripts to execute cyberattacks without advanced technical skills.

22
New cards

Cryptocurrency in Cybercrime

The use of virtual currencies like Bitcoin to conceal identities and launder proceeds from illegal activities.

23
New cards

Penalties for Cyber Fraud

Include imprisonment and fines, governed by specific acts related to electronic commerce and cybercrime prevention.