Cyber Criminology Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the following is an example of sabotage?

Cecere's removing, modifying, and mistranslation of numerous documents concerning organized crime investigations

ELF emerged from a group called:

Earth First!

The "Monkey Wrench Gang," a 1975 book written by Edward Abbey inspired the development of what group:

Earth/Environmental Liberation Front

what is the misappropriation of trade secrets with the knowledge or intent that the offense will benefit a foreign government, foreign instrumentality, or foreign agent.

Economic espionage

Traditional money laundering techniques include all of the following except which one

Electronic transfer of "e-cash"

Which crime is essentially a theft in violation of trust?

Embezzlement

Which technique of neutralization occurs when an individual believes that the victim "had it coming"?

Denial of victim

A ________________ uses multiple systems to attack one or more victim systems or websites with the intent of denying service to legitimate users wishing to log on or utilize the attacked server

Denial-of-Service attacks

The contemporary warez scene has expanded to includes:

Digitally compressed movies before they are actually released, dvd decoding, console games

The category of stalkers that believe the victim is in love with him or her is called:

Erotomaniacs

what has its roots as an elementary and basic tradecraft

Espionage

Domestic spies hired by corporate competitors that are intent on gaining a competitive advantage over American firms are what type of corporate spies?

Outsiders

A liberal mainstream site, operated by PETA, that is youth oriented is called:

PETA 2

_____________ attempt to lure potential victims to fraudulent websites for the purpose of gathering sensitive personal information

Phishing schemes

A terrorist group that hacks into an electrical power grid in order to cause a massive blackout and disrupt normalcy in the name of economic equality has subscribed to which theory?

Political theory

A __________________ has no constant section of code

Polymorphic virus

The greatest cost of a virus or malicious code attack is

loss of work hours and time spent patching systems

This group tends to define hackers and their activities in terms of the danger associated with hacking and its sometimes malicious intent

media

According to the Sans Institute, the number-one cyber threat is:

increasingly sophisticated website attacks that exploit browser vulnerabilities

An individual that engages in computer crime, fraud, and robbery in an effort to obtain financial success has adopted which form of Merton's modes of adaptation?

innovation

According to Merton, a(n) ___________ accepts the goal of economic success but rejects the institutionalized means to obtain it.

innovator

the primary difference between data alteration and network intrusion is the

intent of the intruder

The unique feature of a worm is that it:

is self-replicating

Which hacker subculture norm is concerned with the potential criminal charges of information sharing in the real world and in cyberspace?

law

he first documented case of industrial espionage occurred in the:

1700s

During what decade did electronic funds transfers (EFTs) begin to expand money laundering opportunities?

1960s

What famous text introduced in 1986 railed against adults, law enforcement, and schools and evoked the angst of young hackers?

The Hacker Manifesto

The Bank Secrecy Act of 1970 requires that financial institutions keep records of cash transactions over what amount?

$10,000

The FBI has estimated that over a five-year period, ALF and ELF have committed more than 600 criminal acts in the United States, which have resulted in damages that exceeded:

$43 million

What is a major obstacle for law enforcement in investigating Internet exploitation?

The Internet offers relative anonymity

A recent study by the United Nations estimated that over ________________ percent of all cybercrime worldwide was perpetrated by organized crime associations.

80

The U.S. Department of Commerce has estimated that employee theft played a role in ________ of business failures.

95%

Which of the following best describes the Tor Network?

A secretive online world that where real-time illegal transactions take place

___________________, a form of racist propaganda, was found in the automobile of Timothy McVeigh when he was arrested after the bombing of the Murrah Federal Building in Oklahoma City, Oklahoma.

Anarchist Diaries

According to Cohen and Felson, crime occurs when there is a convergence in time and space of three factors. Which of the following is NOT one of those factors?

An adequate sight line from the location

According to the CERT Insider Threat Study on Illicit Cyber Activity Involving Fraud, what is the average time between beginning fraud and the company detecting the fraud?

Approximately 32 months

The Supreme Court decided that two sections of the Child Pornography Prevention Act were unconstitutional in:

Ashcroft v. NAMBLE

A call center with access to customer credit reports selling customer data to an outside organized crime organization for the purposes of identity theft is an example of which form of attack method?

Authorized use of an organization's systems

Which organized crime enterprises have traditional clan structures?

Balkan criminal enterprises

What best describes the link between child pornography and pedophilia?

Child pornography serves as a primary facilitator for pedophilia

An insider using passwords stolen from coworkers in order to conceal changes he made to credit reporting data in exchange for money is an example of which form of attack method?

Comprised accounts

Which law has become the primary vehicle for the prosecution of Internet fraud crimes?

Computer Fraud and Abuse Act (CFAA)

The "Nigerian 419" scheme is primarily what type of computer crime?

Confidence scheme

A judge tells a defendant, "You are sentenced to prison not because of your crimes, but so that others will not engage in the same crimes." This is an example of which type of deterrence:

General deterrence

This group tends to define hackers and their activities in terms of creative problem solving and as a "pro-social" activity

Hacker subculture

Which of the following is not a characteristic of the "Hacker Ethic"?

Hackers should not be judged by their hacking

A hacker that uses his skills and attitudes to convey a political message is known as a:

Hacktivist

Which of the following is NOT a lawful limitation on speech?

Hate

According to Kohlberg, right corresponds to seeing one's own needs met, taking responsibility for oneself, and allowing others to do the same in which stage of moral development?

Hedonistic orientation stage

what is/are the most frequent type of consumer fraud complaint

Identity theft

what is the misappropriation of trade secrets related to or included in a product that is produced for or placed in interstate or foreign commerce to the economic benefit of anyone other than the owner.

Industrial espionage

_____________ can be defined as information, which has been identified as relevant, collected, verified, and interpreted within the context of specific objectives

Investigation

Deceptive practices involving the use of capital to create more money is known as:

Investment fraud

Which is the largest organized crime group in the world?

Japanese Yakuza

This group tends to define hackers and their activities in terms of the illegality of hacking

Law enforcement

The most famous instance of an organization placing specific, personal information on a website is the _________________ Files case

Nuremberg

Which of the following is not a characteristic of the hacker subculture norm technology?

Mentoring inexperienced hackers

Which of the following is NOT one of the four primary environments viruses operate in?

Microviruses

what is the act of concealing the source of assets that have been illegally obtained

Money laundering

Which country ranks second behind only the United States in losses associated with Internet fraud schemes?

Nigeria

what is/are the most widely reported type of Internet fraud

Online auction fraud

Which of the following type of Trojan horse turns a victim's computer into a zombie server available to the whole world or to the attacker only?

Proxy/Wingate Trojans

According to Kohlberg, which two stages of moral development are completed by age 7?

Punishment and obedience orientation stage and hedonistic orientation stage

Which subtype of child molester typically leads the most stable life?

Regressed child molester

what is designed to impose a sanction on convicted offenders in order to prevent them from continuing to commit criminal acts in the future.

Specific deterrence

What theorists developed a learning theory of crime?

Sutherland

Which of the following is not a form of secondary support FinCen provides to local law enforcement agencies?

The actual prosecution of money-laundering cases

Which government passed a law called "The new Personal Information International Disclosure Protection Act" to protect their citizens from having any information provided through PATRIOT Act investigations?

Vancouver

High-tech games, heavy metal music, black cults, and links to other social youth movements are techniques used on the Internet by what types of groups?

White supremacy and hate groups

Which magazine has tried to establish credibility among important figures in computer culture by refusing to stigmatize the word "hacker"?

Wired

_____________ manifest(s) in several ways, including changes to the browser, redirecting startup pages on Internet browsers, replacing the search function within the browser, and generating pop-up ads and frames that can be difficult to delete or shut down

adware

child pornography is an example of which type of computer crime?

computer as incidental to crime

Historically, the missing dimension in quality intelligence has been:

analysis

what is not a common theme to emerge from the research on the problems of a computer crime?

behavioral approached of cyber criminals

Malicious code attacks that combine elements of worms, Trojans, and viruses are known as:

blended threats

___________________ can reach very large sizes and may include thousands of machines

botnets

Which country has become the most active source of national and industrial espionage?

china

A university enacts a policy in which any student that is caught illegally downloading media files will be automatically expelled from the university. The university hopes that students will be deterred from engaging in illegal downloading. This policy is an example of which theory?

choice theory

Following the continuing changes and improvements in technology is an example of which type of hacker subculture norm?

commitment

A __________________ is a court document signed by a judge that instructs the police to perform a specific task.

court order

What is defined as a malicious hacker?

cracker

what is another term for digital crime

cybercrime

According to the 2013 Symantec Internet Security Threat Report, the majority of computer users are being compromised through their:

e-mail attachments

The groups ALF and ELF can best be described as:

environmental-special interests groups

What is defined as a hacker who performs both legal and illegal hacker activities?

gray hat

Losses from insider fraud are primarily due to:

misappropriation of cash and/or noncash assets by employees.

what forms of technology expanded the scope of hacker activities?

personal computers, computer networks, modems

what is considered in the calculation costs associated with each type of computer crime?

reputational damage, anti-virus software, loss of revenue

What is defined in terms of their activities related to denial of service attacks?

script kiddie

The largest group of attackers, comprising over 95% of the attacker population, is referred to as:

script kiddies

Traveling abroad to have sex with underage children is known as:

sex tourism

The _________________ is an underground website named after a great East-to-West trade route.

silk road

Hackers appear to exhibit a subculture that includes:

slang, group customs and norms, socialization processes

A virus can be categorized based on:

the type of environment it operates in

An unauthorized program typically contained within a legitimate program is known as a:

trojan

Macro viruses are most commonly associated with:

typical business software applications

According to CERT the primary reason for an act of sabotage is:

unmet expectations

criminal statistics/data on computer crime are

virtually non-existent; there is no centralized source

Which 1983 film introduced the public to the unexplored world of computer hacking?

war games

"Neutralization techniques" may be defined as:

ways that embezzlers overcome lingering shame associated with the crime of embezzlement.


Conjuntos de estudio relacionados

Health Insurance Tricky Questions Review

View Set

Medical Terminology Exam 2 review

View Set

Chapter 54 Drugs Acting on the Upper Respiratory Tract PrepU

View Set