CYB 203: Cybercrime, Law and Countermeasures

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

flashcard set

Earn XP

Description and Tags

A set of vocabulary flashcards to help students learn and review key terms related to cybercrime and law.

Last updated 2:34 PM on 3/4/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

18 Terms

1
New cards

Cybercrime

Any criminal activity that targets a computer, a computer network, or uses a computer to advance a criminal objective.

2
New cards

National Critical Infrastructure (NCI)

Assets, systems, and networks vital to a country, whose incapacitation would have a debilitating effect on security or economy.

3
New cards

Denial of Service Attack (DoS/DDoS)

An attack that overwhelms a system with traffic to make it unavailable to legitimate users.

4
New cards

Advanced Persistent Threat (APT)

A prolonged and targeted cyberattack wherein an intruder gains access to a network and remains undetected.

5
New cards

Digital Forensics

The process of identifying, preserving, analyzing, and presenting digital evidence in a legally acceptable manner.

6
New cards

Chain of Custody

A meticulous record of who has possessed evidence from seizure to presentation in court.

7
New cards

Cyber Terrorism

Crimes that target national security or critical infrastructure, often involving acts of violence or intimidation through cyberspace.

8
New cards

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.

9
New cards

Cyberstalking

Using the internet or electronic means to harass an individual, causing psychological harm or distress.

10
New cards

Social Engineering

Manipulating individuals into divulging confidential information through psychological tricks.

11
New cards

Cyberlaw

Legal frameworks governing the use of information technology, including the prosecution of cybercrime.

12
New cards

Cryptographic Hashing

The process of using algorithms to convert data into a fixed-size string of characters for data verification.

13
New cards

Polymorphic Malware

Malware that changes its code to evade detection by antivirus software.

14
New cards

Data Localization

Laws requiring data to be stored within a country's borders to enhance privacy and security.

15
New cards

Cross-Border Data Access

Legal mechanisms that enable law enforcement to request data from foreign service providers.

16
New cards

Intellectual Property Theft

The unauthorized use, reproduction, or distribution of intellectual property without permission.

17
New cards

Intrusion Detection System (IDS)

A device or software application that monitors a network or systems for malicious activity or policy violations.

18
New cards

Identity Theft

The act of obtaining and using someone else's personal information, usually for fraudulent purposes.