Chapter 17 Exam: Computer Crime

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

hardware disabler

A device found on or around a computer designed to ensure a self-destruct sequence of any potential evidence is referred to as a _____.

cracker

A person who gains unauthorized access to a computer system by cracking software protection for the sole purpose of committing a crime is known as a _____.

worm

A self-contained program that travels from computer to computer across network connections, often clogging networks and information systems as it spreads, is known as a _____.

antistatic packaging

All digital evidence should be packed in _____ and in a way that will prevent it from being bent, scratched, or otherwise deformed.

e-crime

Any criminal violation in which a computer or electronic form of media is used is called cybercrime or _____.

the need for an intellectual challenge

Crackers are motivated by _____.

transnational problem

Cybercrime is a _____.

by instituting internal security precautions such as firewalls and virus protection

How can computer crime be prevented?

all 50

In the past decade, _____ states have enacted tough computer crime control laws by either modifying existing statutes or by adding computer crime chapters to their criminal codes.

cybercrime investigative teams

Many departments have formed _____ comprising various specialists, similar to the approach taken in cases involving complex art thefts, bank embezzlements, narcotics trafficking, or other types of crime in which a generalist investigator has little expertise.

sniffing

Monitoring data traveling along a network is referred to as _____.

virus

Replacing or destroying data, and then leaving open a "back door" to later initiate a denial of service attack are the two primary purposes of a _____.

electronic evidence

The NIJ has defined _____ as "information and data that is of value to an investigation that is stored on, received or transmitted by an electronic device."

jurisdictional

The global reach of the Internet poses _____ issues in computer crime cases because equipment being employed criminally could be located in one community and the computer that is illegally entered electronically could be in another state or country.

restrict access to

The responding officer should _____ any digital evidence, including computers, storage media, personal digital assistants (PDAs), cell phones, digital cameras, and iPads.

the residual physical representation of data that have been erased

The term data remanence refers to _____.

crackers, vandals, and criminals.

The three general categories of cybercriminals are _____.

phishing

The use of unsolicited e-mails to deceive Internet users into providing sensitive information, such as Social Security or credit card numbers, while pretending to be a legitimate business, is known as _____.

pirating of proprietary information and copyrighted material

Theft of intellectual property involves the _____.

the provision was overly broad and an unconstitutional infringement on the First Amendment

Virtual child pornography, illegal in Canada and the European Union, was also declared illegal in the United States under the Child Pornography Prevention Act (CPPA) of 1996. The Supreme Court ruling in Ashcroft v. Free Speech Coalition (2002) held that _____.

Submit digital evidence for analysis and data recovery.

What is a common protocol for processing a crime scene involving electronic evidence?

encryption

What is a sophisticated technique of putting information in code and thus obscuring a normally comprehensible message?

firewall

Which term best describes a software or hardware protective measure that blocks ports of access to a computer or network to prevent unauthorized access and stop malicious programs from entering?

cyberterrorism

Which term is best described as "...the premeditated, politically motivated attack against information, computer systems, computer programs and data that results in violence against noncombatant targets by sub-national groups or clandestine agents"?

pharming

Which type of cybercrime involves hijacking a domain name to redirect online traffic away from a legitimate website toward a fake site, such as a bogus bank website?


Ensembles d'études connexes

EXAM 1 (Chapters 1-5) Business Strategy

View Set

MICRO InQuizitive chapter 9, and 10, 11

View Set

Test one guidelines (z test/ t test)

View Set

Across Five Aprils Chapters 3-4 Review

View Set