Cybercrime / criminal law Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is cyber-enabled crime?

A

Cyber-enabled crime refers to crimes that are made possible by the use of computers and the internet, such as hacking and malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is cyber-assisted crime?

A

Cyber-assisted crime refers to crimes that are committed with the assistance of computers and the internet, such as drug trade on online forums.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the criminal dependencies in cybercrime?

A

The criminal dependencies in cybercrime include technical skills, reputation-management, and infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the legal challenges in cybercrime governance?

A

The legal challenges in cybercrime governance include:
1. Global cybercrime landscape (international cooperation needed)
2. Bullet-proof criminal service providers (hosting providers)
3. Technology and the rule of law (apple vs fbi)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the current policing practice (minus the ones of Wet Computercriminaliteit 3) of cybercrime?

A

The current policing practice of cybercrime include investigative measures:
1. subpoena
2. seizing
3. search warrant
4. wiretapping
5. traditional measrues, such as infiltration

Note: 1,2,3 are quite impactful for the company, 4 not at all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the new legal aspects in cybercrime governance?

A

The new legal aspects in cybercrime governance include the responsibility and understanding of lawmakers in regulating cybercrime, net neutrality and internet freedom, and privacy concerns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Wet computercriminaliteit III?

A

Wet computercriminaliteit III refers to the new rules and regulations on cybercrime in the Netherlands:
1. hacking of computers/servers
2. blocking of domains/servers/information.

Note: decryption order was DROPPED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does attribution refer to in cybercrime?

A

Attribution refers to the process of identifying the individuals or groups responsible for carrying out cyber attacks. This often involves using various forensic techniques, such as analyzing network traffic, examining malware, and tracing IP addresses, to trace the origin of the attack and identify the attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does disruption refer to in cybercrime?

A

Disruption refers to the act of interrupting or impeding the activities of cybercriminals. It involves using various techniques to disrupt their operations, compromise their infrastructure, and prevent them from carrying out attacks or achieving their objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are legal challenges when it comes to cross-border hacking?

A
  • Sovereignty (2)
  • Jurisdiction (2)
  • Difference in legal approaches (2)
  • Solvability (2)
  • (Responsibility uncertainty)
  • New law: hacking computer despite unknown location (2)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly