Criminology Unit 6

Primary tabs

Lauren Graham's picture

No Description Set

Bookmark to learn: Login to use bookmarks.

Bookmark to learn: Login to use bookmarks.

Add to collection ... add Criminology Unit 6 to your collections:

Help using Flashcards ...just like in real life ;)

  1. Look at the card, do you know this one? Click to flip the card and check yourself.
  2. Mark card Right or Wrong, this card will be removed from the deck and your score kept.
  3. At any point you can Shuffle, Reveal cards and more via Deck controls.
  4. Continue to reveal the wrong cards until you have correctly answered the entire deck. Good job!
  5. Via the Actions button you can Shuffle, Unshuffle, Flip all Cards, Reset score, etc.
  6. Come back soon, we'll keep your score.
    “Repetition is the mother of all learning.”
  7. Signed in users can Create, Edit, Import, Export decks and more!.

Bookmark to learn: Login to use bookmarks.

Share via these services ...

Email this deck:

Right: #
Wrong: #
# Right & # Wrong of #

Anonymous

a well-known network of individuals who are involved in hacktivism

Black hats

individuals focused on taking advantage of security problems for personal
gain

Copyright infringement

the use of protected works without permission

Cracking

breaching security to access computer networks

Cyberbullying

the use of electronic technologies to intimidate another person

Cybercrime

crime that makes use of the computers and the internet

Cyberspy

an individual responsible for gaining secret information and providing it to
another interested party

Cyberstalking

following and harassing another person online or via electronic technologies

Cyberterrorists

individuals and groups who make malicious cyberattacks for political
reasons

Cybertheft

theft through the use of computers and the internet

Cybervandalism

cyberattacks designed to maliciously modify content or programs

Cyberwarfare

cyberattacks that interfere with another government or organization for
political or military reasons

Cyberwarriors

individuals involved in causing or preventing cyberattacks against a
government or organization

Cyberespionage

the use of computers and the internet to spy on governments or organizations

Denial-of-service attack (DoS)

a cyberattack that causes a device or network to be unavailable often by overloading it

Gray hates

individuals that may not be as ethical as white hats but not as malicious as
black hats

Hacking

the use of technical skills to address problems or to take advantage of
problems

Hacktivist

a person who maliciously uses computer skills to advance a political view or movement

Identity theft

the illegal use of another person’s information for one’s own gain

Industrial espionage

theft of information from a company through spying

Infrastructure

the interconnected networks, devices, systems, and facilities that are
central to the operation of society

Intellectual property

works or concepts that are considered the property of the individuals or organizations who create them

Internet activism

efforts to advance a political view or movement through the use of technology

Just war theory

the view that war should only be undertaken when there are compelling reasons to do so

Logic bombs

malicious code that waits for specific circumstances to activate

Malvertising

malicious advertising designed to spread malware

Malware

software that maliciously interferes with normal operations of a computer or
computer system

Noncombatant immunity

the view that civilians should be protected from harm during a conflict

Offensive (proactive) security

measures taken to to prevent security breaches

Pharming

redirecting a user to a fake version of a reputable website

Phising

fraudulent attempts to induce a person to reveal personal information based
on appearing to be a legitimate organization

Reactive security

responses to security threats after a breach has occurred

Salami slice fraud

the stealing of small fractions of money

Skimming

the use of an electronic device to steal personal information

Spyware

software that gathers information about a user and may gain control of a
user’s device

The dark web

a collection of websites that is not accessible through typical search engines and browsers

Trojan horse

a type of malware that misleads the user into thinking that the program is safe

United States Cyber Command (USCYBERCOM)

a grouping within the military that focuses on defending U.S. military networks from cyberattacks

Vigilante justice

attempts to punish others that are conducted outside of the legitimate criminal justice system

Virus

a type of malware designed to spread from one user to another

Warez

illegally copied works distributed online

Website defacement

a cyberattack in which a website is maliciously changed without the website owner’s permission

Whistleblower

an individual who speaks up when they have knowledge of illegal or unethical activities within an organization

White hats

individuals who work with an organization to identify security problems

Wikileaks

an organization that serves as a platform for anonymously publishing
confidential information and other secrets

Worm

a type of malware that spreads malicious code by replicating on its own