Cybercrime Law Flashcards
Global domain of information systems that include the internet, telecommunications networks, computer systems, etc.
Cyberspace
Practice of defending devices and data from malicious attacks; a shared responsibility between society and individuals
Cybersecurity
Criminal activities that involve computers, networks, or both at the same time (e.g. viruses and malware)
Cybercrime
T or F: The primary effect of cybercrime is FINANCIAL
True
What organization defines cybercrime as a wide range of malicious activities that compromise network integrity and availability, and copyright infringements
Council of Europe Convention on Cybercrime
What organization defines cybercrime as a wide range of malicious activities that compromise network integrity and availability, and copyright infringements
Council of Europe Convention on Cybercrime
3 Categories of Cybercrime
- computing device as the TARGET
- computing device as a WEAPON
- computing device as an ACCESSORY TO CRIME
Type of cybercrime that wants to gain network access
Computing device as the target
Type of cybercrime that launches a denial of service attack (shuts down a machine or network)
Computer is used as a weapon
Type of cybercrime that stores illegal data in a computer
Computer is used as an accessory to crime
The 3 Pillars of Cybersecurity
- People
- Process
- Data and Information
3 Types of Data Sources
- Information Technology
- Operational Data
- Personal Data
The CIA Triad
- Confidentiality
- Integrity
- Availability
Refers to when data is only available to authorized parties
Confidentiality
Refers to when data is not tampered and unadulterated
Integrity
Refers to data accessibility to authorized users
Availability
UNODC stands for?
United Nations Office on Drugs and Crime
→ intentional input, alteration, deletion, or suppression of computer data resulting in illegitimate data with the intent to pass it off as authentic
→ e.g. impersonation for fraudulent purposes
Fraud or Forgery
→ criminal unlawfully assumes the identity of the victim and the information related to it for illicit purposes
→ can be bank, email, and/or card fraud
Identity Offenses and Spam
Scammed practice of misdirecting users to a fraudulent website
Pharming