Definitionen Flashcards
crime scene
any location, such as buildings, garden or filed, or person (whether alive or dead) that is to be searched for physical (or digital) evidence
profiling
activity of collecting information about someone, especially criminal, in order to give a discription of them
Locard’s exchange principle
with contact between to items, there will be an exchange
physical evidence
actual evidence, that can be touched and picked up, that is relevant to the case
trace evidence
created when objects make contact or interred with something else
gun-shot residues, paint residues, chemicals, glass and illicit drugs
contact evidence
demonstrates wether and how two subjects, objects or locations were at one time associated with each other
presumtive test’s
qualitative analysis that allows to identify or confirm the presence of a substance in a sample
forensic science
any science that is used in the service of the justice system
anti-social-behavior
behavior by a person, which causes harassment , alarm or distress to persons not of the same household
misdemeanour
a crime considered to be one of the less serious types of crime
felony
serious crime that can be punished by one or more years in prison
assault
the crime of trying or threatening o hurt someone physically
arson
the crime of setting fire to something
bribery
the crime of giving someone money or something else of value, often illegally, to persuade that person to something you want (mostly illegal)
burglary
the crime of illegally entering a building and stealing things
cybercrime
illegal activity that is done using the internet
forgery
something that is falsely made or copied in order to deceive people
hijacking
to take control of an aircraft or other vehicle using violence
homicide
an act of murder
larceny
the act of stealing something of high value without entering a building
manslaughter
the crime of killing a person without intending to
money laundering
the crime of moving money that has been obtained illegally through banks and other buisnesses to make it seem as if the money has been obtained legally
mugging
the act of attacking and robbing someone in the streets to steal their money
rape
to force someone to have sex when they are unwilling, using violence or threatening behavior
shoplifting
to steal things from a shop or store
slander
to make a false spoken statement that causes people to have a bad opinion of someone
smuggling
to move (someone/something) from one country into another illegally and secretly
speeding
driving faster than allowed
tax fraud
criminal attempt to evade the imposition or payment of a tax
vandalism
the crime of intentionally damaging other’s people property
to tamper
touch or change something without permission
to contaminate
to make something less pure or to make it poisonous
to deteriorate
to become worse
to mislable
to put information that is not correct on something
body fluids
blood, semen salvia and vomit
saliva
liquid produced in your mouth to keep the mouth wet and to help prepare food to be digested
dripping, spotting, splashing blood pattern
wet blood from a wound
spatter blood patern
wet blood split up by force
smears, swipes wipes blood patern
through contact with wet blood on something
collecting ways of DNA
swopping
cutting bits of material out
hunting riffle
has a hand-operated lever or slide to eject the cartridge after firing and load a fresh one into the chambre
shotgun
fires a handful small pellets that spread, rather than a single bullet
reduces the need to aim
semiautomatic gun
quicker to fire and load than a revolver:
quick-change magazine in the grip holds to 30 cartridges
revolver
pulling the trigger turns the cylinder, positioning a cartridge before the barrel, then cocks and finally releases the hammer
submachine gun
can switch between automatic and semi-automatic fire
rifles use larger ammo
explosion
the violent effect produced by the rapid build-up of gas pressure at a location because of the sudden liberation of energy and, inmost cases, gas at that location
explosive
any substance that is capable of producing an explosion
deflagration
a type of chemical reaction in which the speed at which the reaction front moves through the explosive is less than the speed of sound in the material
detonation
a type of chemical explosion in which the speed at which the reaction moves through the explosive is greater than the speed of sound in the material
high explosive
an explosive that normally detonates rather than deflagerates
condensed explosive
an explosive that is either a solid or liquid
dispersed explosive
an explosive that is either a gas or an aerosol
debris
broken or torn pieces of something larger,
like a building
black hat hacker
person who attempts to find computer security vulnerbilities and exploit them for personal financial gain or other malicious reasons
known software exploit
known vulnerbility or bugs that can be used to get control of a computer
technial legal breach
minor divergence from terms of the contact
password protection policy
set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them proberly
internet safety guidance
behaviour guideline / tips for stay safe while using the internet
secure equipment disposal
making sure that the information on the item that is to disposed is irretrievable until the point of irretrievable desturction
hackers
skilled computer expert that uses their technical knowledge to solve problems and overcome boundries
cracker
black hat hacker
Web defacement
Changeing the appearance of a website without permission
phishing
Attempts to obtain sensitive data by creating a false URL
Shoulder surfing
Type of social engineering
Looking over victims shoulder to obtain information
exploit packs
Toolkit for cybercriminals
Peer to peer
computer system which is connected by a network
Sexting
Sending sexually explicit massages
flaming
Form of bulling through die Internet
Cyberstalking
Online harassment or abuse
Encryption
Encoding data so that unauthorized users can’t read them
Decrypting
Technique to decode secret data
Spyware
Designed to obtain personal information without permission
Piracy
Illegal copy and Distribution of copyrighted software, games or music files
Plagiarism
Pretending that someone else’s work is your own
Malicious software
Program that causes harm to a computer or network
Phishing
Getting passwords by using emails that look like they from real organizations, but are in fact fake
Ip spoofing
Making one computer look like another in order to gain unauthorized access
trojan
Installs various applications so that the hacker can take control over your computer and steal informations
Scam
Tricks you with promotions for holidays and lotteries and asks you for money to access the supposed price
Worm
Infects computers connected to the network and even blocks access to communication
Backdoor
Opens back door and takes control of the affected system
BOT
Program, which once inside your computer allows us to take control of it remotely
Ransomeware
Blocks pc, takes control, encrypts files and demands ransom to return them to you
Keylogger
Collects, saves and sends all of the inputs on the keyboard
Harassment
Unwanted behavior which you find offensive or makes you feel intimidated orhumiliated
Fraud
Wrongful or criminal deception intended to result in financial or personal gain
Direct evidence
Establish the elements of a crime through an eyewitness account of the criminal act
Indirect evidence
Based on the fact being inferred from another fact known as circumstantial evidence
Physical evidence
Any actual tangible thing, and is animal, vegetable or mineral
Preliminary survey
Condition of the crime scene as it was found
Web defacement
Changeing the appearance of a website without permission
phishing
Attempts to obtain sensitive data by creating a false URL
Shoulder surfing
Type of social engineering
Looking over victims shoulder to obtain information
exploit packs
Toolkit for cybercriminals
Peer to peer
computer system which is connected by a network
Sexting
Sending sexually explicit massages
flaming
Form of bulling through die Internet
Cyberstalking
Online harassment or abuse
Encryption
Encoding data so that unauthorized users can’t read them
Decrypting
Technique to decode secret data
Spyware
Designed to obtain personal information without permission
Piracy
Illegal copy and Distribution of copyrighted software, games or music files
Plagiarism
Pretending that someone else’s work is your own
Malicious software
Program that causes harm to a computer or network
Phishing
Getting passwords by using emails that look like they from real organizations, but are in fact fake
Ip spoofing
Making one computer look like another in order to gain unauthorized access
trojan
Installs various applications so that the hacker can take control over your computer and steal informations
Scam
Tricks you with promotions for holidays and lotteries and asks you for money to access the supposed price
Worm
Infects computers connected to the network and even blocks access to communication
Backdoor
Opens back door and takes control of the affected system
BOT
Program, which once inside your computer allows us to take control of it remotely
Ransomeware
Blocks pc, takes control, encrypts files and demands ransom to return them to you
Keylogger
Collects, saves and sends all of the inputs on the keyboard
Harassment
Unwanted behavior which you find offensive or makes you feel intimidated orhumiliated
Fraud
Wrongful or criminal deception intended to result in financial or personal gain