Tech & Cyber Crime Final Exam
Home security systems, thermostats, and appliances that can be controlled via the web are examples of the _______
Internet of Things
What is the name of the US bill that failed to pass in 2012 in order to combat rates of piracy and counterfeiting?
Stop Online Piracy Act
What is the name of the malware used to compromise and harm uranium enrichment facilities in Iran?
Stuxnet
The Computer Fraud and Abuse Act was extended to apply to cyberterror and warfare acts through the creation of what act?
The PATRIOT act
What is the name of the downloadable program individuals can use to anonymize their online activity from others that has been a focus of law enforcement investigations over the last few years?
Tor
Which of the following anonymization tools have been targeted by law enforcement to better identify cybercriminals?
Tor
What is the name of the hacker who maintained propaganda websites and posted hacker training tutorials for the e-jihad?
Youni Tsoulis
Search warrants are not required in which of the following circumstances in the US?
all of the above
What is the name of the UK organization that informs critical infrastructure owners of emerging threats and coordinates incident responses?
centre for the Protection of National Infrastructure
What is the name for services that allow individuals to remotely access files stored on web servers via the Internet?
cloud storage
The term ________ references direct relationships between police and the general public to identify certain forms of crime that are viewed as a challenge and finding ways to work together to combat the issue.
community policing
Which of the following forms of attack are commonly used by groups to disable websites and online services?
denial of service
Generally speaking, if a criminal suggests that their victim was asking for it, they are applying which technique of neutralization?
denial of victim
What theory considers the decision-making processes of offenders and views the likelihood of offending as a judgement of risk relative to offending rewards?
deterrence theory
Akers' dynamic process of social learning begins with which of the following elements?
differential associations
Criminological researchers have found that individuals with low self-control are substantially more likely to be victims of cybercrime.
false
Cybercrime research suggests that differential associations to deviant peers have no association with individual involvement in cybercrimes.
false
Grabosky argued that cybercrimes are most likely an issue of 'new wine, but no bottles.'
false
Ideologically-driven cyberattacks will not increase over the next decade due to the relative stabilization of Internet use across the world.
false
In the US, computer files are considered in plain view since they must be opened in order to view them, and are considered legal under the plain view doctrine.
false
In the US, the Frye standard states that scientific evidence can be admissible so long as it was developed in a rigorous fashion.
false
It is relatively easy to predict the future of cybercrime due to the stability of technology and its use.
false
Law enforcement in the US can compel suspects to provide decryption keys in the event encrypted evidence is identified on their digital devices but there is no information present to suggest there is incriminating evidence present in those files.
false
Private industry and security vendors are not establishing working groups to deal with cybercrime.
false
The term e-jihad is often used to describe the range of groups who view that the white race has been sublimated by non-white racial and ethnic groups.
false
Under the Frye standard, the credentials of an expert witness can also be a part of the reliability test.
false
What standard recognizes that scientific evidence can only be admitted if it is generally viewed as reliable by the scientific community?
frye standard
Which of the following is not a part of the Daubert standard for the admissibility of scientific evidence?
grant funding
What is the term used to describe the use of hacking techniques to promote an activist agenda or express a political/social opinion?
hacktivism
Which of the following is not a way that extremist groups use the Internet?
humor
Which of the following is the source of low self-control in the general theory of crime?
ineffective parenting
What is the term used to refer to the use of information technology to gain advantage over an opponent, including the spread of false information?
information warefare
What is the term used for legislation that mandates an individual provide encryption keys or passwords to law enforcement in digital forensic investigations?
key disclosure laws
What theory has been integrated with routine activities theory to account for individual differences in the risk of victimization?
low self-control
Which of the following is not a component of routine activities theory?
low self-control
Which of the following types of media have not been used by extremist groups to promote their agenda?
none of the above
What is the name for the doctrine that allows police to search and seize evidence that may not be indicated in a search warrant but is in plain view of the officer and incriminating?
plain view
What is the name for a legal document signed by a judge or magistrate that authorizes law enforcement to conduct a search?
search warrant
What is the term used to refer to the process where individuals accept a radical ideology without directly engaging others as part of that movement?
self-radicalization
Which of the following is not a type of strain identified in Agnew's general strain theory?
strain from achieving positively valued goals
Which of the following is not a technique of neutralization?
support for social movements
Which of the following is not a part of the scientific method?
theory
A subculture provides its members with rationalizations for behavior, justifications for action, and unique ways to identify other members through verbal and non-verbal cues.
true
Agnew and other researchers have found that cyberbullying may be accounted for by strain, as individuals who feel anger and frustration can easily vent online.
true
At present, US courts do not have complete agreement over the legal use of warrantless searches of cellphones seized incident to an arrest.
true
At this time, there have been few real instances of a cyberterror attack against the US or UK.
true
Criminological theorists have yet to consider how socio-economic backgrounds affect the risk of cybercrime victimization and offending behaviors.
true
It is possible that wearable devices like FitBits will change the way we interact with the Internet, and our behaviors generally.
true
Nation-state-sponsored attackers tend to target critical infrastructure and intellectual property targets in order to gain economic or political advantage over another nation.
true
One advantage of the Internet is that it allows extremist groups to communicate their message directly to wide audiences without the need to interact with traditional media outlets.
true
Research suggests that cybercrime is not easily deterred through traditional methods or mechanisms of punishment.
true
Researchers have found a substantial link between low self-control and participation in simple forms of computer hacking.
true
Smart devices like thermostats and wearable technology constitute the Internet of Things.
true
The Internet is enabling the process of self-radicalization, where individuals gain access to radical messages and join movements without actually engaging with others in the real world.
true
The term fake news recently emerged to describe false news stories planted online in order to sway public opinion or divert attention away from real events.
true
Though there is no single definition of cyberterror, better definitions recognize the value of the Internet as a communications mechanism and target for attacks by extremist groups.
true