Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
14 Cards in this Set
- Front
- Back
Application of scientific principles to the process of discovering information from a digital device |
Digital forensics |
|
A specific term which refer to any criminal activity which has been committed through or facilitated by the internet |
Cybercrime |
|
A relatively new term for any criminal activity which involves the Unauthorized access |
Digital crime |
|
Stealing or using another person's copyrighted material |
Copyright violation |
|
Breaking or deciphering codes |
Cracking |
|
Spying on person or business |
Espionage |
|
The law that punishes cybersex, child pornography and libel also known as Cybercrime prevention act of 2012 |
RA 10175 |
|
Directing individuals to fake websites |
Phishing |
|
Type of malware that is often disguised as legitimate software |
Trojans |
|
Known as an act providing for the recognition and use of electronic commercial and non-commercial transactions and documents. E-commerce act of 2000 |
RA 8792 |
|
Access device refers to any card, plate, cod. Access device regulation act of 1998 |
RA 8484 |
|
Known as an act protecting individual personal information. Data privacy act of 2012 |
RA 10173 |
|
Overloading a system or disrupting services of a host cconnected to the internet |
Denial of service attack |
|
Indefinite place where individuals transact |
Cyberspace |