At what age are you no longer a child?
18
What is Espionage
the practice of spying or of using spies
What real world event caused the creation of This act.
September, 11
What is Artificial intelligence
Simulation of human intelligence in machines that are programmed to think, learn, and problem-solve like humans.
What is Locard Principles
when two objects come into contact there is an exchange of evidence
Who has control over what information websites can keep on children?
The parents
What is an example of cyber espionage?
Malicious software like trojan horses and spyware.
What is the purpose of Homeland Securtiy
Set to improve the nations security.
What is the Dark Web
a part of the internet that is intentionally hidden and requires special tools to access.
What is need to be classified as a serial killer.
You have to kill at least two victims in separate events. With a cooling off period between each murder
At what age does the COPPA rule no longer apply to you? (Hint the answer is not 18)
13
What country is most known for Cyber espionage?
Russia
Who created homeland security act
President George W. Bush
What is Digital Forensics
the recovery, investigation, analysis, and preservation of data from digital devices for use in legal contexts.
What are the different types of evidence.
1.Trace
2.Direct
3.Indirect
Does the Coppa rule apply to the federal government?
Yes
What are the punishments for committing Cyber espionage?
Imprisonment, fines, economic sanctions, and civil lawsuits
What Section of the cabinet is Homeland security under.
United States Department of Homeland Security
What is Ethical considerations
the moral principles and values that guide decision-making, actions, and behaviors, especially in situations that involve others' rights, well-being, and dignity.
What is a latent fingerprint.
An invisible impression of a person's unique finger print that has been left on a surface.
What happens if someone breaks the Coppa rule?
Fines, civil lawsuits, criminal proceedings, state attorney general investigations, Reputational damage, termination of service
How to prevent cyber espionage?
Identify the techniques used in cyber espionage attacks.
Who is secretary of homeland security
Alejandro Mayorkas
what are Privacy Rights
the legal protections and principles that safeguard an individual's personal information and private life from unwanted intrusion, exposure, or misuse by others, including government entities, businesses, or individuals.
Define objectivity and subjectivity
Objectivity is the quality of being based on facts and evidence, while subjectivity is based on personal opinions and feelings