CJ Today CH14 Key Terms

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards
background check
A process of verifying a person's history, including criminal, employment, and financial records, typically used for security clearance or employment.
2
New cards
botnet
A network of private computers infected with malicious software and controlled as a group without the owners’ knowledge.
3
New cards
compliance
Conforming to laws, regulations, and policies, especially in corporate or technological environments.
4
New cards
corporate violence
Harm caused by corporate actions or negligence, often affecting public health or safety.
5
New cards
cyberattack
An attempt to damage, disrupt, or gain unauthorized access to a computer system or network.
6
New cards
cyber crime
Criminal activities carried out using computers or the internet.
7
New cards
cyber forensics
The use of specialized techniques to recover, analyze, and preserve electronic data for legal evidence.
8
New cards
cyber fraud
Deceptive practices conducted through digital means to gain financial or personal benefit.
9
New cards
cyberstalking
The use of the internet or other electronic means to stalk or harass an individual.
10
New cards
data breach
An incident where sensitive, protected, or confidential data is accessed or disclosed without authorization.
11
New cards
digital evidence
Information stored or transmitted in digital form that may be used in court.
12
New cards
encryption
The process of converting information into a secure format that hides its meaning to unauthorized users.
13
New cards
hacker
Someone who gains unauthorized access to systems or networks, often to steal or alter information.
14
New cards
identity theft
The deliberate use of someone else’s identity, typically for financial gain.
15
New cards
intellectual property
Creations of the mind, like inventions or artistic works, protected by law.
16
New cards
material support
Providing resources or assistance to organizations, often used in the context of terrorism-related charges.
17
New cards
national security letters
Administrative subpoenas used by U.S. government agencies to demand information without a court order.
18
New cards
Patriot Act
A U.S. law passed in 2001 that expanded surveillance and investigative powers to counter terrorism.
19
New cards
phishing
A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity via digital communication.
20
New cards
racketeering
Organized illegal activity, often involving extortion, fraud, or coercion.
21
New cards
regulation
A rule or directive made and maintained by an authority to control or govern conduct.
22
New cards
spam
Unsolicited and often irrelevant or inappropriate messages sent over the internet, typically to large numbers of users.
23
New cards
surveillance
The monitoring of behavior, activities, or information for the purpose of influencing, managing, or protecting people.
24
New cards
true threat
A statement meant to communicate a serious expression of intent to commit an act of unlawful violence.
25
New cards
virus
Malicious software that replicates by inserting itself into other programs and spreading across systems.
26
New cards
worm
A type of malware that replicates itself to spread to other computers, often causing harm or slowing down networks.