1/17
A set of vocabulary flashcards to help students learn and review key terms related to cybercrime and law.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Cybercrime
Any criminal activity that targets a computer, a computer network, or uses a computer to advance a criminal objective.
National Critical Infrastructure (NCI)
Assets, systems, and networks vital to a country, whose incapacitation would have a debilitating effect on security or economy.
Denial of Service Attack (DoS/DDoS)
An attack that overwhelms a system with traffic to make it unavailable to legitimate users.
Advanced Persistent Threat (APT)
A prolonged and targeted cyberattack wherein an intruder gains access to a network and remains undetected.
Digital Forensics
The process of identifying, preserving, analyzing, and presenting digital evidence in a legally acceptable manner.
Chain of Custody
A meticulous record of who has possessed evidence from seizure to presentation in court.
Cyber Terrorism
Crimes that target national security or critical infrastructure, often involving acts of violence or intimidation through cyberspace.
Malware
Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
Cyberstalking
Using the internet or electronic means to harass an individual, causing psychological harm or distress.
Social Engineering
Manipulating individuals into divulging confidential information through psychological tricks.
Cyberlaw
Legal frameworks governing the use of information technology, including the prosecution of cybercrime.
Cryptographic Hashing
The process of using algorithms to convert data into a fixed-size string of characters for data verification.
Polymorphic Malware
Malware that changes its code to evade detection by antivirus software.
Data Localization
Laws requiring data to be stored within a country's borders to enhance privacy and security.
Cross-Border Data Access
Legal mechanisms that enable law enforcement to request data from foreign service providers.
Intellectual Property Theft
The unauthorized use, reproduction, or distribution of intellectual property without permission.
Intrusion Detection System (IDS)
A device or software application that monitors a network or systems for malicious activity or policy violations.
Identity Theft
The act of obtaining and using someone else's personal information, usually for fraudulent purposes.