Final Cyber Flashcards

(82 cards)

1
Q

The realm of computerized interactions and exchanges

A

Cyber space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When the internet plays a role in a crime

A

Cyber crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

By the Navy (Department of Defence) - The Aim was to create a secure and resilient communication and coordination.

A

Advanced Research Projects Agency Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Small files are created every time users visit the website (To Spy)

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Multitasking or paying attention to multiple things (Not good).

A

Continuous Partial Attention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Didn’t mention their use of cookies to users. (first web browser)

A

Netscape Navigator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spread of false information that misleads you

A

Misinformation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Purposefully spreading lies with the intent to confuse

A

Disinformation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Unauthorized access into someone else’s device.

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cyber attack where it prevents the computer user or owner access to the services on their computer.

A

Denial Of Service (DOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Prevents user from accessing files or opening programs until hacker receives payment

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Appears as a useful function, but has destructive capabilities

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What was the first online dating site and when decade was it made in?

A

Match.com (80’s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

4 Illegalities following computer intrusion

A

Theft of computer resources, Theft of
proprietary/confidential
information, Distribution of “malicious
software”, Systems sabotage,
alteration and destruction,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hacking in the service of political activism advances political ideologies

A

Hacktivism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Management of problematic content across platforms like social media, marketplaces, and forums.

A

Content Moderation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Reduces visibility of postings without alerting the user.

A

Shadow Banning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Obtaining documents unauthorized.

A

Doxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Spreading of gained unauthorized info to the public.

A

Leaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Websites that are hacked and their content is altered either for a prank or political corruption.

A

Website Defacement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Intellectual property theft (copyright).

A

Piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Rights over intangibles made (Patents, Trademarks, Copyrights).

A

Intellectual Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The estimated amount of piracy that happens

A

Dark figure of crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Practice of downloading or extracting audio or video content from streaming platforms (like YouTube, Spotify, etc.) without permission.

A

Stream Ripping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Email Scam
Phishing
26
Text Scam
Smishing
27
Voice call Scam, used to be a landline phone now mobile
Vishing
28
Psychological manipulation of people to trick them into divulging sensitive information or performing actions that compromise security, such as clicking malicious links or transferring money.
Social engineering
29
Trust in someone because of their position.
Authority+Trust
30
Trust because of likability (Tom Brady promoting product).
Likability + Familiarity
31
Imposes a tight timeframe to make you make decisions.
Urgency + Scarcity (FOMO)
32
Conform to others actions in online context.
Social Proof + Consensus
33
Usually last resort, Like mentioning IRS and that you will be sued.
Threats + intimidation
34
Illegal selling of auctioned items online.
Internet Auction Fraud
35
Selling of stolen goods.
Fencing
36
Inflated bid activity/fake drive up of prices.
Shill Bidding
37
Selling goods that are not the real thing.
Product Inauthenticity
38
Selling product but never sending product to consumer.
Non delivery of items
39
Victim is promised major payout, but required to provide payment upfront in which scammer takes money + leaves (Spanish Prisoner=Is Oldest)
Advanced fee frauds
40
Hook victims by conforming to their romantic interests, then exploiting romantic interest for gain.
Romance scams
41
Fraud of the stock market
Investment fraud
42
Drives up stock on false pretenses, then sells the stock at a high
Pump and Dump
43
Prohibits lawmakers from encroaching upon freedom of expression
First Amendment
44
Target groups based on racial ethnic, religion, gender, sexuality.
Hate Speech
44
Average person, applying contemporary community standards would find that the work is _________.
Obscene
45
Intention to demean, exclude, or harm certain class (targeted).
Intended
46
Encourages others to commit violence.
Inciteful
47
The risk or harm is immediate, intervention is needed.
Imminent
48
Miller vs California is an example of?
Obscene
49
Challenging or irritating person or group
Trolling
50
Online harassment aimed at conversation about gender
Gender Trolling
51
Persistent stalking via electronic communication
Cyber Stalking
52
Stalking of celebrities (Rare)
Star stalking
53
You think you know them/ they dont know you
Stranger stalking
54
Classmate/ employee stalking
Acquaintance stalking
55
You used to have a relationship with them (could be romance) (most common)
Astranged stalking
56
Child or children depicted in a sexualized manner or engaged in a sexual activity (obscene/ illegal imagery)
Child pornography
57
Image depicting a minor in a sexualized way (illegal because of obscenity)
Child sex abuse images (CSAIs)
58
Depicting a minor sexualized by their viewers
Jail bait
59
Experiences sexual attraction to minors (map)
Minor attracted person
60
Torture/ sexual abuse. Woman as victims depicts raps, torture, and brutality
Hurtcore
61
Building emotional connection with a child to manipulate, exploit, or abuse (taken time over months)
Grooming
62
Non-consensual distribution of nude photographs or videos of people
Revenge Porn
63
Sexually explicit messages or images are exchanged via text messages. (It’s legal, however, it’s on the internet forever)
Sexting
64
Taking pictures up shirts or dresses
Creepshots/ up-skirts
65
Repeated + Persistent unwanted communication
Stalking
66
Prevent devices from accessing electronic devices remotely
Faraday bags
67
FBI investigation where agents took control of the dark web (Website) and ran it to ID people involved
Operation Pacifier
68
A camera system that takes pictures or videos of vehicles running red lights/ flags, certain things, codes, words
red light scanner
69
People who pretend to fall for online scams to waste scammers’ time, gather evidence, or expose them
Scam baiters
70
Every key stroke you make has exhaust somewhere in the world
Digital Exhaust
71
Digging + Searching for your info. Once they find it, they take it
Data Minors
72
Organizes your data by creating datasets about you, which can then be sold.
Data Brokers
73
Machines or software that perform tasks like learning, reasoning, problem solving, and understanding language.
Artificial Intelligence
74
Things or objects that connect to the internet. Can literally be anything.
Internet of things
75
Practice of using science and tech to enhance the body (Chip in the mind)
Bio Hacking
76
Digitally altered video, audio, images, created using AI to make someone appear to say or do something that never did
Deepfakes
77
Exhaustion + resignation stemming from a thought that you cant do anything to protect your private information
Privacy Fatigue
78
People who care about privacy but give info away by regular internet use
Privacy paradox
79
Misinformation + Disinformation
New Mind Control
80
Pitting us against each other through technology
Electronic warfare
81
Another word for content moderation
Censorship