Cybercrime and Digital Forensics – Key Vocabulary

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/61

flashcard set

Earn XP

Description and Tags

Flashcards covering essential vocabulary from the introductory chapters on technology, cybercrime, policing, and digital forensics.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

62 Terms

1
New cards

Cybercrime

Any illegal act in which computers or networked devices are the primary means or targets of the offense.

2
New cards

Digital Forensics

The identification, preservation, examination, and presentation of electronic evidence for use in legal proceedings.

3
New cards

Computer-mediated Communications (CMC)

Any human communication that occurs through the use of two or more electronic devices.

4
New cards

Technicways

Behavioral changes in society that result from technological innovations.

5
New cards

Digital Native

A person born into a world already saturated with digital technology, who grows up using it naturally.

6
New cards

Digital Immigrant

Someone born before the widespread adoption of digital technology who had to adapt to it later in life.

7
New cards

Dark Web

A hidden part of the Internet accessible only through special software (e.g., TOR) where content is not indexed by standard search engines.

8
New cards

The Onion Router (TOR)

An anonymity network and browser that routes traffic through multiple nodes to conceal users’ locations and identities.

9
New cards

Proxy Server

An intermediary computer that routes Internet traffic, masking the original user’s IP address.

10
New cards

Cyber-trespass

Illegally crossing digital boundaries of ownership, such as hacking into systems without permission.

11
New cards

Cyber-deception and Theft

Online offenses that illegally obtain money, property, or sensitive information through deceitful practices.

12
New cards

Cyber-porn and Obscenity

Distribution or access of sexually explicit materials online, legal status varying by jurisdiction.

13
New cards

Cyber-violence

The use of online communications to inflict psychological, emotional, or physical harm.

14
New cards

Cyberterrorism

Politically or ideologically motivated attacks against computers, networks, or information intended to intimidate or coerce.

15
New cards

Subculture

A group with distinct values, norms, and language that set it apart from the dominant culture.

16
New cards

Distributed Denial of Service (DDoS) Attack

An assault in which multiple compromised systems flood a target with traffic, rendering it unavailable.

17
New cards

Web Defacement

Unauthorized alteration of a website’s appearance or content, often to display a message.

18
New cards

Spam

Unsolicited bulk electronic messages, typically email.

19
New cards

Phishing

Fraudulent practice of sending deceptive messages to trick individuals into revealing sensitive data.

20
New cards

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.

21
New cards

Botnet

A network of compromised computers remotely controlled by an attacker, often used for DDoS or spam.

22
New cards

Digital Evidence

Information stored or transmitted in binary form that may be relied on in court.

23
New cards

Incident Response

The organized approach to addressing and managing the aftermath of a security breach or cyberattack.

24
New cards

Computer Emergency Readiness Team (CERT)

A group of experts that handles and responds to cybersecurity incidents for an organization, sector, or nation.

25
New cards

Spamhaus

A nonprofit organization that tracks spam and related cyberthreats and provides real-time block lists.

26
New cards

Cyber Civil Rights Initiative (CCRI)

An NGO that assists victims of non-consensual pornography and advocates for stronger legal protections.

27
New cards

Fusion Center

A state or regional hub that gathers, analyzes, and shares threat intelligence among law-enforcement agencies.

28
New cards

Interpol

The International Criminal Police Organization that facilitates cross-border police cooperation and intelligence sharing.

29
New cards

PRISM

A U.S. National Security Agency program that collected electronic communications data from major tech companies.

30
New cards

KARMA POLICE

A GCHQ program aimed at profiling Internet users worldwide through large-scale metadata collection.

31
New cards

Civil Law

Legal domain governing disputes between private parties, often resulting in monetary compensation.

32
New cards

Criminal Law

Body of law that relates to crimes and their prosecution by the state.

33
New cards

Preponderance of Evidence

The burden of proof in civil cases requiring that a claim is more likely true than not (>50% likelihood).

34
New cards

Beyond a Reasonable Doubt

The high standard of proof required for criminal convictions.

35
New cards

Compensatory Damages

Monetary awards intended to reimburse a plaintiff for actual losses in a civil case.

36
New cards

Punitive Damages

Monetary awards meant to punish a defendant for egregious wrongdoing and deter future misconduct.

37
New cards

Private Investigator (PI)

A licensed professional hired to conduct investigations, sometimes including digital forensic work, for private parties.

38
New cards

Licensing (for PIs)

State-mandated certification allowing individuals to legally conduct private investigations.

39
New cards

Child Sexual Exploitation Material (CSEM)

Illegal images or videos depicting sexual activities involving minors.

40
New cards

Revenge Porn (Non-consensual Pornography)

Distribution of sexual images without the subject’s consent, often to humiliate or harm.

41
New cards

Identity Theft

Illicit acquisition and use of another person’s personal data for financial gain or deception.

42
New cards

Data Breach

An incident in which sensitive, protected, or confidential data are accessed or disclosed without authorization.

43
New cards

Social Engineering

Manipulating individuals into divulging confidential information or performing actions that compromise security.

44
New cards

Romance Scam

Fraud in which offenders create fake online relationships to extract money from victims.

45
New cards

Force Multiplier (in cybercrime)

A technology that allows one offender to victimize many targets with minimal additional effort.

46
New cards

Extradition

Legal process of surrendering an accused or convicted person from one jurisdiction to another.

47
New cards

Jurisdiction

Legal authority granted to law-enforcement bodies to enforce laws within a defined territory or over certain crimes.

48
New cards

Safe Haven (for cybercriminals)

A country lacking relevant laws or extradition treaties, enabling offenders to operate with limited risk of prosecution.

49
New cards

International Criminal Police Organization (Interpol)

Global agency that assists member nations in combating transnational crime, including cyber-offenses.

50
New cards

Lawful Access

Governmental ability, granted by court order, to obtain data or communications for investigative purposes.

51
New cards

Encryption Key Disclosure Law

Statute that compels individuals to surrender encryption keys or passwords to law-enforcement agencies.

52
New cards

Legitimacy (policing)

Public perception that law-enforcement actions are appropriate, just, and deserve compliance.

53
New cards

Threat Intelligence

Information about existing or emerging hazards to assets that can inform defensive decisions.

54
New cards

Write Blocker

Hardware or software tool that prevents changes to digital storage devices during forensic imaging.

55
New cards

Digital Imaging (forensics)

Creating a bit-for-bit copy of electronic media to preserve evidence for analysis.

56
New cards

Slack Space

Unused storage in file clusters that may contain remnants of previously deleted data.

57
New cards

File Carving

Recovering files based on signatures without using file system metadata.

58
New cards

Chain of Custody

Documented and unbroken trail of evidence handling that proves integrity from seizure to courtroom.

59
New cards

Best Practices for Seizing Electronic Evidence

Guidelines issued to aid first responders in correctly identifying, collecting, and preserving digital evidence.

60
New cards

RICO (Racketeer Influenced and Corrupt Organizations Act)

U.S. law originally targeting organized crime, proposed for expansion to prosecute coordinated cybercriminal groups.

61
New cards

CERT-US

The U.S. government’s Computer Emergency Readiness Team, part of CISA, offering incident response and advisories.

62
New cards

Five Eyes

Intelligence alliance of the U.S., U.K., Canada, Australia, and New Zealand that shares signals intelligence data.