Cyber Crime and Cyber Terrorism + Cyber War and Cyber Strategy Flashcards

(40 cards)

1
Q

What is cyber crime?

A

Any illegal activity involving a computer or network, either as a tool or target (e.g., hacking, fraud). Motivated by profit or ideology. Example: Phishing scams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three main penalties under the UK Computer Misuse Act 1990?

A

1) Unauthorized access (6 months + £5k fine), 2) Data modification (5 years), 3) Aiding cybercrime (10 years).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s the projected global cost of cybercrime by 2027?

A

$23.82 trillion — equivalent to the world’s 3rd largest economy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s the difference between effects-based and intent-based cyberterrorism?

A

Effects-based: Causes fear like traditional terrorism (e.g., fake nuclear plant meltdown). Intent-based: Politically motivated coercion (e.g., hacking govt sites for ideological demands).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What percentage of cyber attacks targeted the US in 2005 compared to other nations?

A

10x more than the next most-targeted country — due to its critical infrastructure and geopolitical role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name 3 ways terrorists use the internet.

A

1) Recruitment (e.g., ISIS on Telegram), 2) Training (bomb-making guides), 3) Encrypted communication (avoiding surveillance).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Thomas Rid’s argument against cyber warfare?

A

“Cyber war will not take place” — lacks lethality; better classified as espionage/sabotage. Example: Russian election interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is cyberspace called the “fifth domain” of warfare?

A

Considered as critical as land, sea, air, and space. Example: US Cyber Command integrates cyber ops with military strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s the key challenge of deterrence in cyberspace?

A

Attribution problems — hackers mask identities, making retaliation difficult. Example: NotPetya attack blamed on Russia but denied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What was Stuxnet, and why was it significant?

A

A US/Israel-created malware that destroyed Iran’s nuclear centrifuges — first confirmed cyber weapon causing physical damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name 3 types of cyber crime listed in Figure 2.1’s global police data.

A

1) Illegal data interference, 2) Computer-related fraud, 3) Child pornography distribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the “cyber crime-terrorism nexus”?

A

Criminal networks providing tools/services to terrorists (e.g., dark web hackers selling malware to extremists).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s the PRISM surveillance program?

A

NSA mass data collection from tech companies (Google, Facebook) — revealed by Snowden in 2013.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is ransomware? Give a real-world example.

A

Malware encrypting data until payment. Example: 2021 Colonial Pipeline attack caused fuel shortages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a zero-day exploit?

A

An unknown software vulnerability exploited before a patch exists. Example: NSA stockpiling zero-days for attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s the key criticism of cyber utopianism?

A

Overestimates internet’s democratic power — authoritarians adapt (e.g., China’s Great Firewall).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is hacktivism?

A

Politically motivated hacking (e.g., Anonymous leaking govt documents). Blurs crime/protest lines.

18
Q

What is the “militarization of cyberspace”?

A

States integrating cyber capabilities into military doctrine. Example: Over 60 nations now have cyber armies.

19
Q

What’s the UK’s National Cyber Force (NCF)?

A

Offensive cyber unit merging defense/intelligence — criticized for ethical gray zones in operations.

20
Q

What is a supply chain attack?

A

Compromising software/hardware before it reaches users. Example: 2020 SolarWinds hack spread via updates.

21
Q

What is the “attribution problem” in cyber attacks?

A

Difficulty proving perpetrators due to spoofing/proxies. Example: Russian GRU hid behind fake identities in NotPetya.

22
Q

What is a DDoS attack?

A

Overwhelming a target with traffic to crash services. Example: 2016 Dyn attack disrupted Twitter/Netflix.

23
Q

What is the dark web’s role in cyber crime?

A

Hosts illegal markets (e.g., drugs, malware) but also protects whistleblowers. Example: Silk Road.

24
Q

What is social engineering?

A

Manipulating people into revealing secrets (e.g., phishing emails). Exploits psychology, not tech flaws.

25
What is AI’s role in cyber warfare?
Automates attacks/defenses (e.g., deepfake propaganda). Risks accidental escalation due to speed.
26
What is "carbon inequality" in cyber terms?
The 1% of states (US/China/Russia) conduct 90% of sophisticated cyber attacks (analogy to emissions disparity).
27
What is the UN Cybercrime Treaty’s goal?
Harmonize global laws — but critics fear repressive states (China/Russia) will abuse it for censorship.
28
What is a "Cyber Pearl Harbor"?
Hypothetical catastrophic attack crippling infrastructure. Never occurred but feared (e.g., grid + banks down).
29
What is the zero trust model?
"Never trust, always verify" access requests. Example: Google’s BeyondCorp framework.
30
What are IoT vulnerabilities?
Poorly secured smart devices (e.g., cameras) hijacked for attacks. Example: Mirai botnet.
31
What is cyber espionage?
State-sponsored hacking to steal secrets. Example: China’s APT41 stealing COVID vaccine research.
32
What is the encryption debate?
Conflict between privacy (strong encryption) and law enforcement access (e.g., Apple vs. FBI over iPhone backdoors).
33
What are deepfake threats?
AI-generated fake media for disinformation. Example: Fake CEO audio causing stock crashes.
34
What is blockchain’s security promise?
Decentralized ledgers resist tampering. Example: Bitcoin — but vulnerable to 51% attacks.
35
What is cyber insurance?
Coverage for cyber incident losses. Risk: May incentivize paying ransoms (e.g., Colonial Pipeline).
36
What is the "offense-defense balance" in cyber strategy?
Offense (preemptive strikes) vs. defense (resilience). NATO leans defensive to avoid escalation.
37
What is a cyber mercenary?
Hackers-for-hire (e.g., NSO Group’s Pegasus spyware sold to governments to target dissidents).
38
What is critical infrastructure’s cyber risk?
Outdated systems (power grids, hospitals) are easy targets. Example: 2015 Ukraine grid hack.
39
What is cyber peacekeeping?
Proposed UN efforts to de-escalate cyber conflicts — lacks enforcement due to power disputes.
40
What is the cyber arms race?
Nations competing for cyber weapons (US vs. China vs. Russia). Unlike nukes, no treaties regulate it.