Definitionen Flashcards

1
Q

crime scene

A

any location, such as buildings, garden or filed, or person (whether alive or dead) that is to be searched for physical (or digital) evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

profiling

A

activity of collecting information about someone, especially criminal, in order to give a discription of them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Locard’s exchange principle

A

with contact between to items, there will be an exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

physical evidence

A

actual evidence, that can be touched and picked up, that is relevant to the case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

trace evidence

A

created when objects make contact or interred with something else

gun-shot residues, paint residues, chemicals, glass and illicit drugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

contact evidence

A

demonstrates wether and how two subjects, objects or locations were at one time associated with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

presumtive test’s

A

qualitative analysis that allows to identify or confirm the presence of a substance in a sample

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

forensic science

A

any science that is used in the service of the justice system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

anti-social-behavior

A

behavior by a person, which causes harassment , alarm or distress to persons not of the same household

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

misdemeanour

A

a crime considered to be one of the less serious types of crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

felony

A

serious crime that can be punished by one or more years in prison

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

assault

A

the crime of trying or threatening o hurt someone physically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

arson

A

the crime of setting fire to something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

bribery

A

the crime of giving someone money or something else of value, often illegally, to persuade that person to something you want (mostly illegal)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

burglary

A

the crime of illegally entering a building and stealing things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

cybercrime

A

illegal activity that is done using the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

forgery

A

something that is falsely made or copied in order to deceive people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

hijacking

A

to take control of an aircraft or other vehicle using violence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

homicide

A

an act of murder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

larceny

A

the act of stealing something of high value without entering a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

manslaughter

A

the crime of killing a person without intending to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

money laundering

A

the crime of moving money that has been obtained illegally through banks and other buisnesses to make it seem as if the money has been obtained legally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

mugging

A

the act of attacking and robbing someone in the streets to steal their money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

rape

A

to force someone to have sex when they are unwilling, using violence or threatening behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
shoplifting
to steal things from a shop or store
26
slander
to make a false spoken statement that causes people to have a bad opinion of someone
27
smuggling
to move (someone/something) from one country into another illegally and secretly
28
speeding
driving faster than allowed
29
tax fraud
criminal attempt to evade the imposition or payment of a tax
30
vandalism
the crime of intentionally damaging other's people property
31
to tamper
touch or change something without permission
32
to contaminate
to make something less pure or to make it poisonous
33
to deteriorate
to become worse
34
to mislable
to put information that is not correct on something
35
body fluids
blood, semen salvia and vomit
36
saliva
liquid produced in your mouth to keep the mouth wet and to help prepare food to be digested
37
dripping, spotting, splashing blood pattern
wet blood from a wound
38
spatter blood patern
wet blood split up by force
39
smears, swipes wipes blood patern
through contact with wet blood on something
40
collecting ways of DNA
swopping cutting bits of material out
41
hunting riffle
has a hand-operated lever or slide to eject the cartridge after firing and load a fresh one into the chambre
42
shotgun
fires a handful small pellets that spread, rather than a single bullet reduces the need to aim
43
semiautomatic gun
quicker to fire and load than a revolver: | quick-change magazine in the grip holds to 30 cartridges
44
revolver
pulling the trigger turns the cylinder, positioning a cartridge before the barrel, then cocks and finally releases the hammer
45
submachine gun
can switch between automatic and semi-automatic fire | rifles use larger ammo
46
explosion
the violent effect produced by the rapid build-up of gas pressure at a location because of the sudden liberation of energy and, inmost cases, gas at that location
47
explosive
any substance that is capable of producing an explosion
48
deflagration
a type of chemical reaction in which the speed at which the reaction front moves through the explosive is less than the speed of sound in the material
49
detonation
a type of chemical explosion in which the speed at which the reaction moves through the explosive is greater than the speed of sound in the material
50
high explosive
an explosive that normally detonates rather than deflagerates
51
condensed explosive
an explosive that is either a solid or liquid
52
dispersed explosive
an explosive that is either a gas or an aerosol
53
debris
broken or torn pieces of something larger, like a building
54
black hat hacker
person who attempts to find computer security vulnerbilities and exploit them for personal financial gain or other malicious reasons
55
known software exploit
known vulnerbility or bugs that can be used to get control of a computer
56
technial legal breach
minor divergence from terms of the contact
57
password protection policy
set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them proberly
58
internet safety guidance
behaviour guideline / tips for stay safe while using the internet
59
secure equipment disposal
making sure that the information on the item that is to disposed is irretrievable until the point of irretrievable desturction
60
hackers
skilled computer expert that uses their technical knowledge to solve problems and overcome boundries
61
cracker
black hat hacker
62
Web defacement
Changeing the appearance of a website without permission
63
phishing
Attempts to obtain sensitive data by creating a false URL
64
Shoulder surfing
Type of social engineering | Looking over victims shoulder to obtain information
65
exploit packs
Toolkit for cybercriminals
66
Peer to peer
computer system which is connected by a network
67
Sexting
Sending sexually explicit massages
68
flaming
Form of bulling through die Internet
69
Cyberstalking
Online harassment or abuse
70
Encryption
Encoding data so that unauthorized users can’t read them
71
Decrypting
Technique to decode secret data
72
Spyware
Designed to obtain personal information without permission
73
Piracy
Illegal copy and Distribution of copyrighted software, games or music files
74
Plagiarism
Pretending that someone else’s work is your own
75
Malicious software
Program that causes harm to a computer or network
76
Phishing
Getting passwords by using emails that look like they from real organizations, but are in fact fake
77
Ip spoofing
Making one computer look like another in order to gain unauthorized access
78
trojan
Installs various applications so that the hacker can take control over your computer and steal informations
79
Scam
Tricks you with promotions for holidays and lotteries and asks you for money to access the supposed price
80
Worm
Infects computers connected to the network and even blocks access to communication
81
Backdoor
Opens back door and takes control of the affected system
82
BOT
Program, which once inside your computer allows us to take control of it remotely
83
Ransomeware
Blocks pc, takes control, encrypts files and demands ransom to return them to you
84
Keylogger
Collects, saves and sends all of the inputs on the keyboard
85
Harassment
Unwanted behavior which you find offensive or makes you feel intimidated orhumiliated
86
Fraud
Wrongful or criminal deception intended to result in financial or personal gain
87
Direct evidence
Establish the elements of a crime through an eyewitness account of the criminal act
88
Indirect evidence
Based on the fact being inferred from another fact known as circumstantial evidence
89
Physical evidence
Any actual tangible thing, and is animal, vegetable or mineral
90
Preliminary survey
Condition of the crime scene as it was found
91
Web defacement
Changeing the appearance of a website without permission
92
phishing
Attempts to obtain sensitive data by creating a false URL
93
Shoulder surfing
Type of social engineering | Looking over victims shoulder to obtain information
94
exploit packs
Toolkit for cybercriminals
95
Peer to peer
computer system which is connected by a network
96
Sexting
Sending sexually explicit massages
97
flaming
Form of bulling through die Internet
98
Cyberstalking
Online harassment or abuse
99
Encryption
Encoding data so that unauthorized users can’t read them
100
Decrypting
Technique to decode secret data
101
Spyware
Designed to obtain personal information without permission
102
Piracy
Illegal copy and Distribution of copyrighted software, games or music files
103
Plagiarism
Pretending that someone else’s work is your own
104
Malicious software
Program that causes harm to a computer or network
105
Phishing
Getting passwords by using emails that look like they from real organizations, but are in fact fake
106
Ip spoofing
Making one computer look like another in order to gain unauthorized access
107
trojan
Installs various applications so that the hacker can take control over your computer and steal informations
108
Scam
Tricks you with promotions for holidays and lotteries and asks you for money to access the supposed price
109
Worm
Infects computers connected to the network and even blocks access to communication
110
Backdoor
Opens back door and takes control of the affected system
111
BOT
Program, which once inside your computer allows us to take control of it remotely
112
Ransomeware
Blocks pc, takes control, encrypts files and demands ransom to return them to you
113
Keylogger
Collects, saves and sends all of the inputs on the keyboard
114
Harassment
Unwanted behavior which you find offensive or makes you feel intimidated orhumiliated
115
Fraud
Wrongful or criminal deception intended to result in financial or personal gain