Cyber Criminology Final
What is the following is an example of sabotage?
Cecere's removing, modifying, and mistranslation of numerous documents concerning organized crime investigations
ELF emerged from a group called:
Earth First!
The "Monkey Wrench Gang," a 1975 book written by Edward Abbey inspired the development of what group:
Earth/Environmental Liberation Front
what is the misappropriation of trade secrets with the knowledge or intent that the offense will benefit a foreign government, foreign instrumentality, or foreign agent.
Economic espionage
Traditional money laundering techniques include all of the following except which one
Electronic transfer of "e-cash"
Which crime is essentially a theft in violation of trust?
Embezzlement
Which technique of neutralization occurs when an individual believes that the victim "had it coming"?
Denial of victim
A ________________ uses multiple systems to attack one or more victim systems or websites with the intent of denying service to legitimate users wishing to log on or utilize the attacked server
Denial-of-Service attacks
The contemporary warez scene has expanded to includes:
Digitally compressed movies before they are actually released, dvd decoding, console games
The category of stalkers that believe the victim is in love with him or her is called:
Erotomaniacs
what has its roots as an elementary and basic tradecraft
Espionage
Domestic spies hired by corporate competitors that are intent on gaining a competitive advantage over American firms are what type of corporate spies?
Outsiders
A liberal mainstream site, operated by PETA, that is youth oriented is called:
PETA 2
_____________ attempt to lure potential victims to fraudulent websites for the purpose of gathering sensitive personal information
Phishing schemes
A terrorist group that hacks into an electrical power grid in order to cause a massive blackout and disrupt normalcy in the name of economic equality has subscribed to which theory?
Political theory
A __________________ has no constant section of code
Polymorphic virus
The greatest cost of a virus or malicious code attack is
loss of work hours and time spent patching systems
This group tends to define hackers and their activities in terms of the danger associated with hacking and its sometimes malicious intent
media
According to the Sans Institute, the number-one cyber threat is:
increasingly sophisticated website attacks that exploit browser vulnerabilities
An individual that engages in computer crime, fraud, and robbery in an effort to obtain financial success has adopted which form of Merton's modes of adaptation?
innovation
According to Merton, a(n) ___________ accepts the goal of economic success but rejects the institutionalized means to obtain it.
innovator
the primary difference between data alteration and network intrusion is the
intent of the intruder
The unique feature of a worm is that it:
is self-replicating
Which hacker subculture norm is concerned with the potential criminal charges of information sharing in the real world and in cyberspace?
law
he first documented case of industrial espionage occurred in the:
1700s
During what decade did electronic funds transfers (EFTs) begin to expand money laundering opportunities?
1960s
What famous text introduced in 1986 railed against adults, law enforcement, and schools and evoked the angst of young hackers?
The Hacker Manifesto
The Bank Secrecy Act of 1970 requires that financial institutions keep records of cash transactions over what amount?
$10,000
The FBI has estimated that over a five-year period, ALF and ELF have committed more than 600 criminal acts in the United States, which have resulted in damages that exceeded:
$43 million
What is a major obstacle for law enforcement in investigating Internet exploitation?
The Internet offers relative anonymity
A recent study by the United Nations estimated that over ________________ percent of all cybercrime worldwide was perpetrated by organized crime associations.
80
The U.S. Department of Commerce has estimated that employee theft played a role in ________ of business failures.
95%
Which of the following best describes the Tor Network?
A secretive online world that where real-time illegal transactions take place
___________________, a form of racist propaganda, was found in the automobile of Timothy McVeigh when he was arrested after the bombing of the Murrah Federal Building in Oklahoma City, Oklahoma.
Anarchist Diaries
According to Cohen and Felson, crime occurs when there is a convergence in time and space of three factors. Which of the following is NOT one of those factors?
An adequate sight line from the location
According to the CERT Insider Threat Study on Illicit Cyber Activity Involving Fraud, what is the average time between beginning fraud and the company detecting the fraud?
Approximately 32 months
The Supreme Court decided that two sections of the Child Pornography Prevention Act were unconstitutional in:
Ashcroft v. NAMBLE
A call center with access to customer credit reports selling customer data to an outside organized crime organization for the purposes of identity theft is an example of which form of attack method?
Authorized use of an organization's systems
Which organized crime enterprises have traditional clan structures?
Balkan criminal enterprises
What best describes the link between child pornography and pedophilia?
Child pornography serves as a primary facilitator for pedophilia
An insider using passwords stolen from coworkers in order to conceal changes he made to credit reporting data in exchange for money is an example of which form of attack method?
Comprised accounts
Which law has become the primary vehicle for the prosecution of Internet fraud crimes?
Computer Fraud and Abuse Act (CFAA)
The "Nigerian 419" scheme is primarily what type of computer crime?
Confidence scheme
A judge tells a defendant, "You are sentenced to prison not because of your crimes, but so that others will not engage in the same crimes." This is an example of which type of deterrence:
General deterrence
This group tends to define hackers and their activities in terms of creative problem solving and as a "pro-social" activity
Hacker subculture
Which of the following is not a characteristic of the "Hacker Ethic"?
Hackers should not be judged by their hacking
A hacker that uses his skills and attitudes to convey a political message is known as a:
Hacktivist
Which of the following is NOT a lawful limitation on speech?
Hate
According to Kohlberg, right corresponds to seeing one's own needs met, taking responsibility for oneself, and allowing others to do the same in which stage of moral development?
Hedonistic orientation stage
what is/are the most frequent type of consumer fraud complaint
Identity theft
what is the misappropriation of trade secrets related to or included in a product that is produced for or placed in interstate or foreign commerce to the economic benefit of anyone other than the owner.
Industrial espionage
_____________ can be defined as information, which has been identified as relevant, collected, verified, and interpreted within the context of specific objectives
Investigation
Deceptive practices involving the use of capital to create more money is known as:
Investment fraud
Which is the largest organized crime group in the world?
Japanese Yakuza
This group tends to define hackers and their activities in terms of the illegality of hacking
Law enforcement
The most famous instance of an organization placing specific, personal information on a website is the _________________ Files case
Nuremberg
Which of the following is not a characteristic of the hacker subculture norm technology?
Mentoring inexperienced hackers
Which of the following is NOT one of the four primary environments viruses operate in?
Microviruses
what is the act of concealing the source of assets that have been illegally obtained
Money laundering
Which country ranks second behind only the United States in losses associated with Internet fraud schemes?
Nigeria
what is/are the most widely reported type of Internet fraud
Online auction fraud
Which of the following type of Trojan horse turns a victim's computer into a zombie server available to the whole world or to the attacker only?
Proxy/Wingate Trojans
According to Kohlberg, which two stages of moral development are completed by age 7?
Punishment and obedience orientation stage and hedonistic orientation stage
Which subtype of child molester typically leads the most stable life?
Regressed child molester
what is designed to impose a sanction on convicted offenders in order to prevent them from continuing to commit criminal acts in the future.
Specific deterrence
What theorists developed a learning theory of crime?
Sutherland
Which of the following is not a form of secondary support FinCen provides to local law enforcement agencies?
The actual prosecution of money-laundering cases
Which government passed a law called "The new Personal Information International Disclosure Protection Act" to protect their citizens from having any information provided through PATRIOT Act investigations?
Vancouver
High-tech games, heavy metal music, black cults, and links to other social youth movements are techniques used on the Internet by what types of groups?
White supremacy and hate groups
Which magazine has tried to establish credibility among important figures in computer culture by refusing to stigmatize the word "hacker"?
Wired
_____________ manifest(s) in several ways, including changes to the browser, redirecting startup pages on Internet browsers, replacing the search function within the browser, and generating pop-up ads and frames that can be difficult to delete or shut down
adware
child pornography is an example of which type of computer crime?
computer as incidental to crime
Historically, the missing dimension in quality intelligence has been:
analysis
what is not a common theme to emerge from the research on the problems of a computer crime?
behavioral approached of cyber criminals
Malicious code attacks that combine elements of worms, Trojans, and viruses are known as:
blended threats
___________________ can reach very large sizes and may include thousands of machines
botnets
Which country has become the most active source of national and industrial espionage?
china
A university enacts a policy in which any student that is caught illegally downloading media files will be automatically expelled from the university. The university hopes that students will be deterred from engaging in illegal downloading. This policy is an example of which theory?
choice theory
Following the continuing changes and improvements in technology is an example of which type of hacker subculture norm?
commitment
A __________________ is a court document signed by a judge that instructs the police to perform a specific task.
court order
What is defined as a malicious hacker?
cracker
what is another term for digital crime
cybercrime
According to the 2013 Symantec Internet Security Threat Report, the majority of computer users are being compromised through their:
e-mail attachments
The groups ALF and ELF can best be described as:
environmental-special interests groups
What is defined as a hacker who performs both legal and illegal hacker activities?
gray hat
Losses from insider fraud are primarily due to:
misappropriation of cash and/or noncash assets by employees.
what forms of technology expanded the scope of hacker activities?
personal computers, computer networks, modems
what is considered in the calculation costs associated with each type of computer crime?
reputational damage, anti-virus software, loss of revenue
What is defined in terms of their activities related to denial of service attacks?
script kiddie
The largest group of attackers, comprising over 95% of the attacker population, is referred to as:
script kiddies
Traveling abroad to have sex with underage children is known as:
sex tourism
The _________________ is an underground website named after a great East-to-West trade route.
silk road
Hackers appear to exhibit a subculture that includes:
slang, group customs and norms, socialization processes
A virus can be categorized based on:
the type of environment it operates in
An unauthorized program typically contained within a legitimate program is known as a:
trojan
Macro viruses are most commonly associated with:
typical business software applications
According to CERT the primary reason for an act of sabotage is:
unmet expectations
criminal statistics/data on computer crime are
virtually non-existent; there is no centralized source
Which 1983 film introduced the public to the unexplored world of computer hacking?
war games
"Neutralization techniques" may be defined as:
ways that embezzlers overcome lingering shame associated with the crime of embezzlement.