Cyber-Terrorism Quiz 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The ethics code of the present day hacker subculture can be traced back to the 1960s to early computer programmers. Which of the following is not one of the tenets early computer programmers believed?

A government or other regulatory body should oversee all activities on the internet

In the hacker subculture, a "cracker" is considered which of the following?

A malicious hacker

Hackers engage in a range of activities. Those activities include which of the following?

All the above

Hackers, through the hacker subculture of values and definitions, justify their activities as beneficial and "prosocial". The hacker subculture definitions of prosocial hacking differentiate hackers' activities from computer crimes. Which of the following concepts do hackers use in defining their activities as prosocial?

All the above

Today hackers are able to develop a deeper understand of computer technology by using which of the following tools?

All the above

Cyber criminals who are from inside an organization, whether as a member of an organized criminal group or perpetrated individually as a disgruntled employee, present less risk for cybercrime and corporate and industrial espionage than system intrusions from outside hackers.

False

Gray hat hackers are malicious hackers who routinely engage in hacking activities which are in conflict with accepted hacker ethics

False

Since the 1950s hackers have had to worry about breaking laws regarding computers. It was in the early 1950s that Congress and state legislatures began to criminalize hackers' activities.

False

The issue of authorization to access a computer system is not important when it comes to hacking. Any person who commits a system intrusion is breaking the law.

False

There is universal agreement and consensus as to the meaning of the word "hacker". Within this meaning of "hacker", it is commonly accepted that all hackers engage in illegal activity.

False

The hacker subculture has developed several categories to describe hackers based on that person's adherence to hacker ethics. Which of the following is not one of those categories?

Fashion hat hackers

Developing a broad knowledge of computer systems, hardware, programming, and networking is not necessary for hackers to be effective. Skilled hackers are able to conduct their activities by using tools developed by others, without an extensive understanding of how computers and their components operate.

True

During a system intrusion by a hacker there is a great danger that data may be intentionally or unintentionally altered. The potential for serious economic harm or catastrophic loss of life is very real in computer intrusion cases when data are altered.

True

Hacktivists use their hacker skills and attitudes to convey a political message and/or as a means of protest against the activities and policies of a government and/or businesses.

True

Mainstream analyses do not provide much information on distinguishing hackers from computer criminals. In fact, some computer crime fighters flatly deny that there is a distinction. However in the underground hacker media the distinction is of primary importance. For hackers, the distinction rests upon the attitudes with which the hacker approaches the activity. Most forms of hacking are considered criminal by the law enforcement community, but the actions of hackers may be perfectly acceptable to those within the hacker subculture.

True

Software cracking involves viruses and Trojan horse programs used to steal money and data, automate attacks, and control systems remotely.

True

The practice of social engineering is designed to acquire sensitive information from the human running the machine (i.e. a company's computer) rather than using advanced computer skills to beat electronic security.

True

The social norm of law has become part of the hacker subculture because hackers may want to know if their hacks or related activities are legal. This has led to a split between those hackers who feel there is no need to break the law and those hackers who view hacking in any form as acceptable.

True

To hackers the primary difference between simple network intrusion and data alteration is the intent of the person committing the intrusion. Hackers believe simple network intrusion does not deprive the owner of the data or the use of the data, and therefore is not criminal. The problem for law enforcement is that it is often hard to determine the intent of the intruder.

True

White hat hackers are ethical hackers who conduct their hacking activities for legitimate reasons, including: testing software, verifying software function and security, training, and testing the computer security defenses of an organization.

True

The hacker subculture is based on five social norms. Which of the following is not one of those social norms?

Class structure

When a hacker does not have permission to enter or use a computer or network the hacker is doing which of the following?

Committing a federal crime

A hacker can be defined as an individual with a profound interest in computers and technology that has used this knowledge to access computer systems with or without authorization from the system's owner.

True

By the start of the new millennium (the 2000s) most computers around the world were interconnected and sensitive financial and government information became commonly stored in accessible databases online. As a consequence, the computer security industry was booming and the nature of computer hacking and attacks changed. Hackers in Russia, and China became more of a significant problem, especially for U.S. businesses and governments. Today, the hacker community is very segmented, with individuals engaging in legal and illegal hacks against all manner of targets around the world for curiosity, profit, fame, patriotism, warfare, and even religious ideology.

True


Ensembles d'études connexes

5.1 Migration as a component of population change

View Set

MyProgrammingLab 6.2,6.3,6,4, MPL

View Set

CH 5: The Self-Employment Contributions ACT (SECA)

View Set

Chapter 24 Homework: The Digestive System

View Set

Chapter 1 Fundamentals of Nursing

View Set