1/22
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Distributed Denial of Service (DDoS)
A cyber attack that floods a target server with traffic from multiple compromised systems, causing website or service downtime and financial loss.
Cyberweapons
Malware, worms, and trojans deployed to infiltrate or damage systems, leading to data theft, espionage, or sabotage.
Phishing Campaigns
Deceptive emails sent from controlled systems to harvest credentials, resulting in identity theft, fraud, or scams.
Cyber Crime
Convergence of computer and internet-based offenses intended to deliberately harm individuals or groups through digital means.
Cyber Criminology
The study of the causation of crimes occurring in cyberspace and their impact on physical space.
Computer as Weapon
Refers to the use of a computer to execute malicious actions against another system or entity.
Automated Attacks
Cyber attacks that can run continuously without direct human input, targeting thousands or millions of victims.
Ransomware
Malware that encrypts files and demands payment for decryption, often used in cyberextortion.
Cyberterrorism
Premeditated use of cyberspace to conduct attacks that aim to cause grave harm to life and property for political purposes.
Identity Theft
Using stolen personal data to open loans or secure services under another person's name.
Business Email Compromise (BEC)
Impersonating executives to trick staff into unwarranted fund transfers.
Cyber Extortion
Demanding payment or benefits from victims in exchange for halting an ongoing cyber attack or restoring access to data.
Illegal Access Act
Laws addressing unauthorized access to computer systems, often included in cybercrime prevention legislation.
Malware
Malicious software designed to infiltrate, damage, or disable computers, networks, and systems.
Obscene Content
Material that offends public morals and is judged by community standards, often regulated by law.
Harassment
The use of ICT to target, intimidate, threaten, or cause distress to individuals or groups.
Cyberbullying
Humiliating or intimidating someone online, typically in school contexts.
Doxxing
Publishing private information about individuals with the intent to invite harassment.
Cyber Fraud
A form of online deception aimed at obtaining unlawful financial gains through various schemes.
Scammers
Individuals who use technology to exploit human psychology for committing fraud or financial deception.
Script Kiddies
Inexperienced hackers who use prewritten scripts to execute cyberattacks without advanced technical skills.
Cryptocurrency in Cybercrime
The use of virtual currencies like Bitcoin to conceal identities and launder proceeds from illegal activities.
Penalties for Cyber Fraud
Include imprisonment and fines, governed by specific acts related to electronic commerce and cybercrime prevention.