IST 610 - Chapter 3 Security Management
What will law enforcement officials usually require of the victim in order to pursue harassment allegations?
A credible threat of harm
What is a cookie?
A small file made that contains data and then is stored on your computer
Submitting a fake but very high bid to deter other bidders is referred to as what?
Bid shielding
Which of the following occurs when a fraudulent buyer submits high bids to discourage other bidders, and then retracts the bids so people they know can get the item at a lower price?
Bid shielding
Which of these could be considered a course of conduct directed at a specific person that causes substantial emotional distress in such person and serves no legitimate purpose?
Harassment
______ theft and ______ fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception.
Identity
What is the top rule for avoiding Internet fraud?
If it seems to good to be true, it probably is
Why is it useful to have a separate credit card dedicated to online purchases?
If the credit card number is used illegally, you will limit your financial liability
Investing with well-known, reputable brokers protects against what?
Investment fraud
Why is cyber stalking a serious crime?
It can be a prelude to violent crime
If you are a victim of cyber stalking, what should you do to assist the police?
Keep electronic and hard copies of all harassing communications
If you are posting anonymously in a chat room and another anonymous poster threatens you with assault or even death, is this person's post harassment?
Probably not because both parties are anonymous, so the threat is not credible
Artificially inflating a stock in order to sell it at a higher value is referred to as what?
Pump and dump
The most common Internet investment fraud is known as what?
The Nigerian fraud
What is the most likely problem with unsolicited investment advice?
The advice might not be truly unbiased
Identity theft is most often attempted in order to accomplish what goal?
To make illicit purchases
Why should a cybercrime law be specific?
To prevent defendants from finding loopholes
One way to protect yourself on auction sites is?
Use a separate credit card with a low limit
What percentage of cyber stalking cases escalate to real-world violence?
About 19%
What is cyber stalking?
Any use of electronic communications to stalk a person
A file on your computer that websites use to store information about you is a
Cookie
Which of the following is one way to protect yourself against identity theft?
Do not provide personal information to anyone unless it is absolutely necessary
What is the top way to protect yourself from cyber stalking?
Do not use your real identity online
Which of the following is not one of the Security and Exchange Commission's tips for avoiding investment fraud?
Don't invest online
According to the U.S. Department of Justice, identity theft is generally motivated by what?
Economic gain
What are the four categories of auction fraud?
Failure to send, failure to disclose, sending something of lesser value, failure to deliver
What is the first step in protecting yourself from identity theft?
Never provide personal data about yourself unless absolutely necessary
The top rule for chat room safety is what?
Never use your real name or any real personally identifying characteristics
Which country is described by experts as having the strictest cybercrime laws?
None of these
When using a chat room, one way to protect yourself from online harassment is
Not to use your real name
What must exist for cyber stalking to be illegal in a state or territory?
Nothing; existing stalking laws can apply
Which of the following is not an efficient method of protecting yourself from auction fraud?
Only use auctions for inexpensive items
Which of the following is the process to try to induce someone to provide you with personal information?
Phishing
What can you do on your local computer to protect your privacy?
Set your browser's security settings
A seller bidding on her own item to drive up the price is referred to as what?
Shill bidding
Firefox and Internet Explorer are examples of
Web browsers