CC 201 Final Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

bitcoin

"mined" via high-powered computers that solve complex math problems

Public Key

don't care if people have it -your address

Private Key

don't want people to have it -your house key

ciphertext

encrypted text, indecipherable -decrypt to get back to plain text

PGP (Pretty Good Privacy)

encryption mechanism created in 1991 by Phil Zimmerman

social learning theory four key elements

1.differential association 2.definitions 3.differential reinforcement 4.imitation

according to the routine activities theory, what three things have to converge?

1.motivated offender 2.suitable target 3.absence of a capable guardian

general strain theory three primary categories

1.threatened or actual failure to achieve positively valued goals 2.threatened or actual removal of positive stimuli 3.threatened or actual presentation of negative stimuli

Botnet

A form of malware that combines aspects of Trojan horse programs and viruses and allows an infected computer to receive commands and be controlled by another user through Internet Relay Chat channels on the Web via http protocols

Network Investigative Technique (NIT)

A form of malware used to compromise the data of suspects in criminal cases online

Dark Web

A portion of the Internet that can only be reached via the use of specialized encryption software and browser tools

entrance node, exit node

ISPS can see the ____ and ___

no

Is bitcoin anonymous?

solving crimes

Pro of techniways

Tor

The Onion Router

Tor

The Onion Router -developed in the late 1990s -federally funded by US Naval Research Laboratory, NSF, and others -currently a 503(c) non-profit organization in Cambridge, MA

Dread Pirate Roberts

The online pseudonym for Ross Ulbricht (creator of the first Silk Road)

Access key

The password used by encryption programs that unlocks a file using the same algorithm that encrypted the information in order to decrypt it

Deterrence Theory

Theory that is most often applied to the death penalty

Affinity

exciting and attractive

Freenet

first publicly available Darknet -not censored -P2P file sharing -must be configured properly for anonymity -known for hosting and facilitating child pornography -friend to friend mode acts as an anonymous intranet -launched in 2000

freenet

first publicly available darknet

Ross Ulbricht (Silk Road)

founded after several failed jobs and decision to sell shrooms online -had no coding experience, had friend help -ordered hits on people who got in his way

Zeronet

full open source platform launched in 2015 -built in Python -hard to set up/fun to play around with -no IP address, instead uses a private key

operation SaboTor

government has been pressured to shut down these darkness sites due to the latest opioid crisis -shut down over 50 sites -seized 51 firearms, $7 million, and lots of drugs

fiat

government sponsored, the gold standard

social learning theory

holds that individuals who have a greater proportion of beliefs supportive of deviant behavior will be more likely to engage in deviant activites

neutralization

idea that people drift/stray away and commit crime

plaintext

information intended to be seen once encrypted

darknet

isolated & potentially anonymous networks that require a separate software to access

Darknet

isolated and potentially anonymous networks that require a separate software to access

freenet

known for hosting and facilitating child pornography

china

most bitcoin mining happens in _______

Drift

motion in and out of delinquency

zero net

no IP address, instead uses a private key

cryptocurrency

no centralized backing, solely available online

denial of an injury

no one or thing will get hurt or damaged

Deep Web

not been crawled and indexed, therefore not available on normal web browsers

condemnation of the condemners

one of the five basic techniques Sykes & Matza developed that allows individuals to break from conformity, operating on the basis that those who would condemn their actions are hypocritical and doing so out of personal spite

appeal to higher loyalties

one of the five basic techniques Sykes & Matzo developed that allows individuals to break from conformity, operating on the basis that an offense is for the greater good of the group

differential reinforcement

one of the four principal components of Aker's social learning theory, arguing that the punishments or positive reinforcement we receive after engaging in crime will influence our willingness to perform that act again

differential association

one of the four principal components of Aker's social learning theory, arguing that who we associate with influences our willingness to engage in crime and our exposure to definitions supporting offending

definitions

one of the four principal components of Aker's social learning theory, suggesting that the way and individual views a behavior will affect their willingness to engage in that activity

zero net

owner can sign and publish site updates

Space Transition Theory

people can have a different persona online -anonymity and ability to escape

dark web

portion of the internet that can only be reached via the use of specialized encryption software and browser tools

Techniways

process of behavioral changes because of technological changes

encryption

process of encoding a message in such a way that only those who are authorized parties can access it

certainty

refers to how likely it is that an individual will be caught and punished for an offense within deterrence theory

zero net

sites cannot be taken down once put up

denial of responsibility

some other person, event, or situation will be directly responsible for the offense and should be blamed

argot

special language used by subcultures to refer to individuals in and out of the group and to demonstrate connection to the subculture

imitation

suggestions that an individuals first act of deviance or criminality is an attempt to model the behavior of their peer and intimate others

celerity

swiftness, in the context of deterrence theory

drift

temporary transition to deviance from conformity caused by justifications held by an individual that justifies why the commission of deviance is acceptable and not in conflict with their general belief system

Invisible Internet Project-I2P

the longer your computer is connected, the more you are trusted and the quicker your access becomes -interface of a 2003 web platform -history of illicit activity -old, clunky, slow

digital drift

theory proposed by Goldsmith and Brewer that extends Matza's drift theory to on-line spaces to account for individual involvement in cybercrime

denial of a victim

there is no discernible victim or the "victim" deserved it

deterrence theory

this perspective argues that humans will be deterred from choosing to commit crime if they believe that punishments will be certain, swift, and proportionately severe

DROWN

uses an existing but obsolete protocol to break encryption and steal sensitive information from web browsers, email servers, and VPN sessions

absence of a capable guardian

variable in routine activity theory that references the lack of physical, personal, or social protection that can minimize harm to a target

motivated offender

variable within routine activity theory that constitutes any individual or group who has both the inclination and ability to commit crime

Silk Road

was shutdown when an IRS agent found a personal email address to sign up for a site to promote

22 million

what is the bitcoin cap?

general theory of crime

what separates noncriminal from criminal is controlled: social pressure

according to the deterrence theory, what are the three punishments that will deter from committing crime?

1. certainty 2.celerity 3.severity

5 techniques of neutralization

1.denial of responsibility 2.denial of injury 3.denial of a victim 4.condemnation of the condemners 5.appeal to higher loyalties

Microsoft Digital Crimes Unit

A working group created by the Microsoft corporation to combat cybercrime in conjunction with law enforcement

Self-Radicalization

Adhering to radical ideology by seeking information on your own

social learning theory

Akers expanded upon Sutherland's original differential association theory by introducing principal components of operant conditioning, namely that behavior followed by rewards or reinforcements will be more likely to continue, while acts followed by punishment will be less likely

DROWN

An attack using an older application in the OpenSSL library to encrypt data in order to break encryption and steal sensitive information

Silk Road

An online market developed to enable individuals to buy and sell narcotics through various mechanisms internationally -garnered great attention from both researchers and the popular media due in part to the fact that transactions were paid using bitcoins -developed by Ross Ulbricht

Ross Ulbricht (Silk Road)

Arrested in a library in California -convicted of Money Laundering, hacking, conspiracy to traffic false identity, conspiracy to traffic drugs -serving a double life sentence plus 40 years with no chance of parole

.com, .org, etc.

Clearnet addresses ends in

routine activity theory

Cohen and Felson (1979) argued that direct-contact predatory victimization occurs with the convergence in both space and time of three primary components: 1. a motivated offender 2. a suitable target 3. the absence of a capable guardian

furthering crime -can use your data to track you, learn about you, and stalk you -fraud from stealing data

Con of techniways

operation bayonet

Dutch Police got on the trail of many DNMS -10 month investigation -about 3,600 dealers -over 24,000 drug listings

Operation Bayonet

Dutch police got on the trail of many DNMs -10 month investigation -about 3,600 dealers -over 24,000 drug listings but they wanted to take it over not shut it down

Appeal to higher loyalties

One of the five basic techniques Sykes and Matza developed that allows individuals to break from conformity, operating on the basis that an offense is for the greater good of the group

Pretty Good Privacy

PGP stands for

Community-oriented Policing (COPS)

Pairing up with community to solve problems -online reporting mechanisms

.onion

Tor addresses end in

Clearnet activities

Tor browser can be used for

Affiliation

ability to interact and deepen relationships in deviant subcultures

adding negative stimuli or in the removal of positive stimuli

according to the social learning theory, punishment may take form of

tor

addresses end in .onion

Internet of Things (IoT)

all non-computing devices connected via the internet -fit bit -smart refrigerator -Alexa device -toasters -routers -printers

Relays

all of the places where the signal has been scrambled

criminality

although definitions supporting criminal activity are critical to the offender to justify their behavior, _________ will occur if it is reinforced through some means, whether social or financial

general strain theory

an individual-level theory developed by Robert Agnew that discusses the role of frustrations leading to negative emotions which, if not addressed appropriately, can lead individuals to engage in crime as a response

Cryptomarkets

anonymous market places like bay or Etsy for criminal products/services

algorithms

another name for encryption

American Kingpin

book all about Silk Road

zero net

built in python, fully open source -hard to set up -fun to play around with

tor browser

can be used for clearnet activities

play pen

child pornography site based in Tor, FBI ran the site for 2 weeks

Clearnet

crawled and indexed publicly accessible website that are available on web browsers


Conjuntos de estudio relacionados

306 Ricci Chapter 12: Nursing Management During Pregnancy

View Set

Exam 1: Mobility Practice 30 Questions

View Set

AP English Language and Composition Rhetorical Devices Review

View Set

Chapter 12: Insurance, Licenses, and Permits

View Set

Westward Expansion/Slavery/Causes of Civil War

View Set

INFS2608 Lecture 5 - Relational Model and Relational Algebra

View Set

Economics Chap 14, EC 112- Final Exam

View Set