Intro Cyber Crime 5 and 6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Traditional money laundering techniques include all of the following except which one. Transformation of hard currency to real property or merchandise "Smurfing" Electronic transfer of "e-cash" Physical transport of cash from one location to another

Electronic transfer of "e-cash"

Which crime is essentially a theft in violation of trust?

Embezzlement

__________________ has its roots as an elementary and basic tradecraft.

Espionage

T/F According to the CERT Insider Threat Study on Illicit Cyber Activity Involving Fraud, the average time between getting hired and starting fraud is just under 8 months.

False

T/F Bitcoins are not an anonymous form of electronic payment.

False

T/F Espionage as a Service actors are usually better trained and better financed than state actors and typically do not leave forensic traces of their activities.

False

T/F Experts can easily calculate the amount of money laundering that occurs in the United States each year.

False

T/F Historically, embezzlers were persons of high social status.

False

T/F Identify theft complaints are continually rising each year.

False

T/F Identity crimes are easy to prosecute once detected.

False

T/F Many technically elite embezzlers are motivated by financial problems.

False

T/F The Computer Fraud and Abuse Act of 1986 is the first federal act to define and enforce penalties for trade secret theft.

False

T/F The U.S. Treasury Department's Financial Crimes Enforcement Network's (FinCEN) main goal is to prosecute money launderers.

False

T/F The primary avenue of redress for corporations seeking to litigate charges of corporate espionage is the criminal courts.

False

T/F To date, no one has been sentenced under the Economic Espionage Act.

False

Deceptive practices involving the use of capital to create more money is known as:

Investment fraud

Which is the largest organized crime group in the world?

Japanese Yakuza

Which of the following is not a form of secondary support FinCen provides to local law enforcement agencies?

The actual prosecution of money-laundering cases

Which of the following is NOT a characteristic of the modern embezzler? The embezzler has a fiduciary relationship with the victim. The embezzler is motivated by a desire for a more affluent lifestyle. The embezzler possesses specialized skills required to use computer systems. The embezzler is limited by the physical nature of the theft act.

The embezzler is limited by the physical nature of the theft act.

T/F The advent of large-scale computerized databases in the financial services field has made embezzlement a more technically oriented crime requiring more sophisticated knowledge than was the case 30 years ago.

True

T/F The first cyber-related attack on the United States occurred in 1870 on the electronic phone system.

True

T/F The most prevalent form of online auction fraud is nondelivery of goods.

True

T/F The profiles of individuals at the higher levels of drug trafficking and cybercrime share common personality traits.

True

Losses from insider fraud are primarily due to:

misappropriation of cash and/or noncash assets by employees.

According to CERT the primary reason for an act of sabotage is:

unmet expectations.

Neutralization techniques" may be defined as: ways that Internet fraud perpetrators overcome shame and guilt associated with fraud schemes. techniques that money launderers use to "smurf" ill-gotten cash. ways that embezzlers overcome lingering shame associated with the crime of embezzlement. enforcement practices associated with stopping acts of corporate espionage.

ways that embezzlers overcome lingering shame associated with the crime of embezzlement.

T/F Opportunities for identity crimes have increased primarily because consumers are increasingly asked to use their social security numbers as a personal identifier.

True

T/F Organized cartels use social media sites to collect intelligence about their targets.

True

T/F Research has shown that corporate insiders engage in most acts of corporate espionage.

True

T/F Technology has made it easier for money launderers to move money in a series of transactions over a short period of time.

True

T/F The Russian Business Network focuses on criminal cyber activities full time.

True

The Bank Secrecy Act of 1970 requires that financial institutions keep records of cash transactions over what amount?

$10,000

The first documented case of industrial espionage occurred in the:

1700s

During what decade did electronic funds transfers (EFTs) begin to expand money laundering opportunities?

1960s

A recent study by the United Nations estimated that over ________________ percent of all cybercrime worldwide was perpetrated by organized crime associations

80

The U.S. Department of Commerce has estimated that employee theft played a role in ________ of business failures.

95%

Which of the following best describes the Tor Network?

A secretive online world that where real-time illegal transactions take place

Corporate espionage schemes may target which of the following? Customer lists All of the above Research and development data Product specifications

All of the above

When insiders conspire with or are recruited by outside organized crime groups, the fraud is typically related to: Financial gains resulting from data manipulation Financial gains resulting from system manipulation Bulk exfiltration of data to the outsiders All of the above

All of the above

Which of the following has increased the occurrence of corporate espionage in the last few decades? The constant use of e-mail as a means of intra-office communication Global commerce conducted over the Internet All of the above Corporate community's increasing use of information and technology to conduct business

All of the above

Which of the following is NOT a milestone of fraud cases according to the CERT Insider Threat Study on Illicit Cyber Activity Involving Fraud? Applying for a job at the target company Getting hired by the target company The target company detecting fraud The target company reporting the fraud

Applying for a job at the target company

According to the CERT Insider Threat Study on Illicit Cyber Activity Involving Fraud, what is the average time between beginning fraud and the company detecting the fraud?

Approximately 32 months

Which organized crime enterprises have traditional clan structures?

Balkan criminal enterprises

Which of the following is an example of sabotage? Yonggang's misappropriation of Dupont's trade secrets Hitachi's acquisition of the IBM Adironack Workbooks Cecere's removing, modifying, and mistranslation of numerous documents concerning organized crime investigations All of the above

Cecere's removing, modifying, and mistranslation of numerous documents concerning organized crime investigations

Which country has become the most active source of national and industrial espionage?

China

Which law has become the primary vehicle for the prosecution of Internet fraud crimes?

Computer Fraud and Abuse Act (CFAA)

The "Nigerian 419" scheme is primarily what type of computer crime?

Confidence scheme

_______________________ is the misappropriation of trade secrets with the knowledge or intent that the offense will benefit a foreign government, foreign instrumentality, or foreign agent.

Economic espionage

___________ is/are the most frequent type of consumer fraud complaint.

Identity theft

__________________ is the misappropriation of trade secrets related to or included in a product that is produced for or placed in interstate or foreign commerce to the economic benefit of anyone other than the owner.

Industrial espionage

_________________________ is the act of concealing the source of assets that have been illegally obtained.

Money laundering

Which country ranks second behind only the United States in losses associated with Internet fraud schemes?

Nigeria

___________________ is/are the most widely reported type of Internet fraud.

Online auction fraud

Domestic spies hired by corporate competitors that are intent on gaining a competitive advantage over American firms are what type of corporate spies?

Outsiders

_____________ attempt to lure potential victims to fraudulent websites for the purpose of gathering sensitive personal information.

Phishing schemes

Which of the following is NOT a characteristic of the cybercriminal profile as described by the Cyberpunk Project? Limited use of alcohol and/or drugs College or self-educated Reserved in public Primarily female

Primarily female

Which of the following is NOT an example of an early cybercriminal activity? Russian hacker Vladimir Levin's $10 million theft from CitiGroup Ross Ulbricht's underground website Silk Road Theft of classified information on the U.S. military by Dark Dante Kevin Mitnick's attack on the U.S. phone system

Ross Ulbricht's underground website Silk Road

Which of the following is NOT a country associated with Balkan criminal enterprises? Albania Russia Croatia Bulgaria

Russia

Which of the following is NOT an inherent weakness early cybercriminals exploited in computer systems and networks? Poorly coded applications accessible through the Internet Library access controls on systems attached to the globally connected Internet Salami slicing Poor process controls that did not consider reviewing application or system error logs

Salami slicing

The _________________ is an underground website named after a great East-to-West trade route.

Silk Road

Which of the following is NOT a low-tech means identity thieves use to steal personal information? Direct theft of mail Skimming devices Shoulder surfing Dumpster diving

Skimming devices

T/F According to the U.S. Department of Commerce, employee theft costs U.S. businesses almost a billion dollars per week.

True

T/F Cybercrime is an evolved state of traditional crime.

True

T/F Espionage as a Service is not like traditional corporate espionage where one company targets a competitor.

True

T/F Experts believe that the establishment of consumer awareness and monitoring programs is the most viable avenue toward thwarting the growth of identity theft.

True

T/F Fraudsters primarily use company data to commit identity theft, insurance fraud, and embezzlement when working alone or with other internal co-conspirators.

True

T/F In fraud crime involving management-level employees, average losses are higher than in lower-level employee crimes.

True

T/F Many fraud schemes committed over the Internet are simply new takes on old schemes.

True

T/F Most U.S.-based Middle Eastern criminal enterprises are found in Illinois, Ohio, New Jersey, and New York.

True

T/F Nigerian fraud schemes cost the United States an estimated $1 billion to $2 billion each year.

True


संबंधित स्टडी सेट्स

Книга 연세 2-2 грамматики

View Set

Intermediate Macroeconomics Final

View Set

Unit 4 Political Organization of Space

View Set

Occupational Rehabilitation/Return to Work

View Set

Abeka 7th Grade History, Chapter 23 Review

View Set

Chapter 22: Physiologic and Behavioral Adaptations of the Newborn

View Set

BLAW Exam 1 (ch.1, 3, 4, 27, 28, 29 & 37)

View Set

Cambridge English Profile Level C2

View Set