Cybercrime L2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

hackers

digital safecrackers

2
New cards

hackers

their motivation is often malicious, but

some actually work for the greater good.

3
New cards

white hat hackers

Engage in legal hacking (ethical hacking) to improve digital

security for those who contract them

4
New cards

black hat hackers

  1. Are cybercriminals who orchestrate scams and exploit vulnerabilities with the intent to cause harm.

  2. The aim is usually to make money.

  3. They are the most dangerous hackers

5
New cards

gray hat hackers

  1. an ambiguous ethical hacking area between white and black.
    2. they don't exploit vulnerabilities to cause harm but not for free

6
New cards

red hat hackers

  1. "superheroes"

  2. They typically target black hat hackers t

7
New cards

blue hat hackers

  1. white hat hackers who are employed by an organization

  2. work as part of the team often work for IT department

8
New cards

Script kiddies and green hat hackers

inexperienced hackers

9
New cards

Script kiddies

rely on social engineering, because

they aren't skilled enough

10
New cards

green hat hackers

want to develop the technical

skills to one day become white or blue hat hackers

11
New cards

hacktivist

  1. fight back against perceived political or social injustice

  2. group is Anonymous,

12
New cards

state-sponsored hackers

  1. Work for governments.

  2. Some are white hat hackers who work to improve national cybersecurity, but others use black hat tactics to harm other countries

13
New cards

whistleblower

who works for an organization and decides to expose

wrongdoing from within.

14
New cards

surface web

• Also called the Visible Web, Indexed Web, Indexable Web, or

Lightnet.

• Is that portion of the World Wide Web that is readily available

to the general public and searchable with standard web search

engines (Google or Bing). It is the opposite of the Deep Web.

15
New cards

deep web

  1. Cannot be found or directly accessed via web search engines like Google or Bing, therefore, cannot be accessed it easily.

  2. represents the majority of the network.

  3. Minimal illegal activities a

16
New cards

dark web

  1. cannot be accessed by a search engine (or indeed, a user) without an appropriately permissioned account.

  2. Large-scale illegal activity

17
New cards

TOR

  1. free software for enabling anonymous communication

  2. "The Onion Router"

  3. encryption, nested like the layers of an onion, used to anonymize communication.

18
New cards

RA 8484 or the "Access Device Regulation Act of 1998."

  1. Before the year 2000, there was only one law that prevents a cybercrime from happening.

  2. t can be used to obtain money, good,

    services or any other thing of value o

19
New cards

"I LOVE YOU”

Created by Onel De Guzman

20
New cards

Republic Act RA 8792, otherwise known as

the "Electronic Commerce Act of 2000.”

  1. admissibility of electronic data messages, documents and signatures

  2. he Philippines as a legitimate player in the

    global marketplace. It has placed the Philippines among the countries penalizing cybercrime.

21
New cards

RA 10175 also known as CYBERCRIME PREVENTION ACT OF 2011”

in 2012 they passed a new law which

strengthens the already existing laws in order to penalize more

acts that can be considered as a form of cybercrime t