Intro cyber crime chap 1-4

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is most true? Most research of cybercrime focuses on behavioral approaches. Early researchers felt that computer crime would be a large problem. Case studies offer generalizations on cybercriminals. A great deal of effort is dedicated to computer security.

A great deal of effort is dedicated to computer security.

Which of the following is not true? Al Qaeda leaders have claimed to be actively planning a "cyber jihad" against the United States. U.S. officials have found evidence of al Qaeda researching digital switches that run critical infrastructure. Al Qaeda produced the computer virus "Stuxnet." U.S. officials have found evidence of al Qaeda using LOphtCrack.

Al Qaeda produced the computer virus "Stuxnet."

Which of the following is most true? The authors of the text treat digital crime and digital terrorism as separate concepts. The text focuses on mainly on Macintosh-based systems. All forms of digital crimes are covered in the text. Practitioners in both the criminal justice field and the computer science field typically have limited knowledge of each other's occupations.

All forms of digital crimes are covered in the text

Which of the following is not considered in the calculation of costs associated with each type of computer crime? Reputational damage Loss of revenue All of the above are considered in the calculation of costs. Anti-virus software

All of the above are considered in the calculation of costs.

According to Cohen and Felson, crime occurs when there is a convergence in time and space of three factors. Which of the following is NOT one of those factors? A suitable target The absence of a capable guardian An adequate sight line from the location A motivated offender

An adequate sight line from the location

Which of following is not a common theme to emerge from the research on the problems of computer crime? Computer fraud within government agencies Behavioral approaches of cybercriminals The work of hackers Incidences of network incursion

Behavioral approaches of cybercriminals

A university enacts a policy in which any student that is caught illegally downloading media files will be automatically expelled from the university. The university hopes that students will be deterred from engaging in illegal downloading. This policy is an example of which theory?

Choice Theory

Data alteration, denial of service, network intrusions, thefts of information, and computer vandalism are examples of which type of computer crime?

Computer as a target

The salami slice technique, pyramid schemes, and bunko schemes are examples of which type of computer crime?

Computer as an instrument of a crime

Which type of computer crime describes actions in which the computer is used only to further a criminal end? In other words, the computer or data contained therein is not the object of the crime.

Computer as an instrument of a crime

Child pornography is an example of which type of computer crime?

Computer as incidental to crime

Which of the following is not one of the four categories of computer crime? Computer vandalism The computer as incidental to the crime The computer as a target Crimes associated with the prevalence of computers

Computer vandalism

Which of the following is not a reason that choice theory became popular among criminologists in the 1970s? Crime-producing traits and factors were discovered. The practice of rehabilitation came under attack after the "Nothing Works" article appeared. The public began to view punishment as the primary reason for incarceration. The reported crime rate in the 1960s and 1970s increased significantly.

Crime-producing traits and factors were discovered.

Intellectual property violations, component theft, counterfeiting, and identity theft are examples of which type of computer crime?

Crimes associated with the prevalence of computers

Which of the following is not a characteristic noted by Anderson and colleagues in 2012? Traditional crimes that have changed with the advent of the Internet New crimes that have been originated since the advent of the Internet Crimes that facilitate other crimes through the proper use of computers Traditional crimes that are now "cyber" because they are conducted online

Crimes that facilitate other crimes through the proper use of computers

According to Agnew's General Strain Theory, which of the following is NOT a source of strain? Disjunction between expectations and achievements Presentation of negative stimuli Failure to achieve positively valued goals Cultural goal of economic success

Cultural goal of economic success

According to the authors of the text, another term for digital crime is:

Cybercrime

Which of the following is most true? Cybercrime is well researched. Cybervictimization is likely leveling off. Cybercrime has significantly increased since the 1990s. Law enforcement was prepared to handle the newest threats of digital crime.

Cybercrime has significantly increased since the 1990s.

Which of the following is least true? Cyberterrorism may include prolonged loss of infrastructure. Cyberterrorism is premeditated. Cyberterrorism is a politically or ideologically motivated attack. Cyberterrorism is defined by the group perpetrating it.

Cyberterrorism is defined by the group perpetrating it.

Which technique of neutralization occurs when an individual believes that the victim "had it coming"?

Denial of victim

According to Hirschi, which of the following is NOT an element of the social bond? Belief Attachment Emotional Commitment

Emotional

An unauthorized intrusion is easy to identify once it has occurred.

False

Computer crime is not an international problem.

False

Computerized theft never deprives a legitimate owner of a tangible asset.

False

Critical infrastructure is not an attractive target to terrorists.

False

Data hiding is difficult to accomplish, but relatively easy to discover in Internet files.

False

Estimates on the cost of cybercrime are largely derived from criminal reports.

False

Information attacks are the use of cyber communication to distribute or coordinate plans for a terrorist attack, incite an attack, or otherwise assist in the facilitation of terrorism.

False

Information warfare is always a component of cyberterrorism.

False

It is relatively easy to place a monetary value on the loss of intellectual property.

False

Research has shown that most dangers of economic computer crimes come from outsiders.

False

The Department of Justice systematically collects computer crime data.

False

The nation of Japan currently poses a larger threat to the United States in terms of information warfare than that posed by China.

False

A judge tells a defendant, "You are sentenced to prison not because of your crimes, but so that others will not engage in the same crimes." This is an example of which type of deterrence:

General deterence

Which of the following is not one of the five essential components of infrastructure? Communication networks People Information networks Government

Government

According to Kohlberg, right corresponds to seeing one's own needs met, taking responsibility for oneself, and allowing others to do the same in which stage of moral development?

Hedonistic orientation stage

What major category of information warfare/cyberterror do "cyber-plagues" fall into?

Information attacks

What major category of information warfare/cyberterror does "website defacement" fall into?

Information attacks

An individual that engages in computer crime, fraud, and robbery in an effort to obtain financial success has adopted which form of Merton's modes of adaptation?

Innovation

Which of the following is most true? Estimates concerning the costs of cybercrime are derived from crime statistics. Estimates of costs are easy to calculate across different categories of computer crime. It can take months or even years to identify an actual monetary value for the loss of intellectual property. Employers always report computer crimes committed by employees.

It can take months or even years to identify an actual monetary value for the loss of intellectual property.

Which of the following is NOT a personality characteristic conducive to crime identified by the Gluecks? Lack of self-control Lack of self-esteem Impulsivity Resentment

Lack of self-esteem

Which of the following is NOT a finding of Holt and Bossler's empirical study of routine activities theory and online harassment? Individuals engaging in media piracy and viewing pornography were at increased risk of malware infection. Routine computer use increased the odds of online harassment. Personal and peer involvement in deviance had no influence on the risk of online harassment. Computer software created specifically to decrease malware victimization had no impact.

Personal and peer involvement in deviance had no influence on the risk of online harassment.

Which is not a category of cyberterrorism? Physical attacks Information attacks Technological facilitation Promotion

Physical attacks

Which of the following is NOT a characteristic of Marxist thought? Groups of people revolting against ruling elites have changed history. Trust, order, and security maintained the ruling status of the wealthy elites. Political change can be achieved without conflict. Successful revolutionary strategy began with a core group of leading individuals.

Political change can be achieved without conflict.

A terrorist group that hacks into an electrical power grid in order to cause a massive blackout and disrupt normalcy in the name of economic equality has subscribed to which theory?

Political theory

Which of the following is one of the four categories that encompasses cyberterrorism and/or information warfare? Stenography Correct! Promotion Unauthorized intrusions Cryptography

Promotion

What major category of information warfare/cyberterror does "recruiting" fall into?

Propaganda

Which of the following is not a component of information warfare? Propaganda Security measures Psychological operations Physical destruction

Propaganda

According to Kohlberg, which two stages of moral development are completed by age 7?

Punishment and obedience orientation stage and hedonistic orientation stage

Which of the following is not a wave in the development of warfare as identified by Alvin Toffler? Agrarian wave Renaissance wave Information wave Industrial wave

Renaissance wave

Which of the following is NOT an assumption of deterrence theory? Individuals are rational actors. Individuals view risks of particular crimes as unpleasant. Sanctions must be swift, severe, and absolute. Offenders must be aware of the penalty for particular crimes.

Sanctions must be swift, severe, and absolute.

_____________ is designed to impose a sanction on convicted offenders in order to prevent them from continuing to commit criminal acts in the future.

Specific deterence

Which of the following theorists developed a learning theory of crime? Agnew Merton Sutherland Kohlberg

Sutherland

What major category of information warfare/cyberterror does "cryptography" fall into?

Technological facilitation

What major category of information warfare/cyberterror does "data hiding" fall into?

Technological facilitation

Which of the following is not an example of Donn Parker's work as an early commentator on problems associated with computer crime? The observation that researchers felt that computer crime was not worthy of specific explicit research. The observation that losses increase substantially with intentional acts involving computers. The ease with which criminals could misuse information. The "cyber" prefix to describe computer crimes.

The "cyber" prefix to describe computer crimes.

Which of the following is least true? China views cyberspace as a way of compensating for its deficiency in conventional warfare. Cyber warfare is incorporated in military training in China. The Chinese government restricts the use of cyber warfare to the Chinese military. Information warfare is considered necessary to the Chinese government to support its objectives and strategy.

The Chinese government restricts the use of cyber warfare to the Chinese military.

Which of the following is not true? The Russians carry out cyber operations alongside psychological operations. The Russians view information warfare from a holistic approach. The Russians view cyber capabilities as tools of information warfare. The Russians view military cyber operations differently than those cyber operations employed for hacktivism, cyber aggression, and cybercrime.

The Russians view military cyber operations differently than those cyber operations employed for hacktivism, cyber aggression, and cybercrime.

Which of the following is most true? Digital terrorism does not pose as great a threat as digital crime. Digital crime is another term for digital terrorism. Digital crime and digital terrorism are not on parallel tracks. The processes and dynamics involved in the production of digital crime and digital terrorism are virtually the same.

The processes and dynamics involved in the production of digital crime and digital terrorism are virtually the same.

Which of the following is most true? The public relies on computers for a host of societal functions. Threats of cyberterrorism are grossly exaggerated. The public perception is that law enforcement and government officials are well-equipped to deal with cybercrime. Digital crimes are not of great concern to the public.

The public relies on computers for a host of societal functions.

Which of the following is not one of the three major credit reporting bureaus that control the information on all persons applying for credit in the United States? Trans Union Trans Credit Experian Equifax

Trans credit

"Cyber" refers to almost anything "real" or "virtual" attached to a computer or network.

True

A cryptographic key is necessary to read encoded material.

True

A subculture is a set of values, norms, and beliefs that differ from those of the dominant culture.

True

A virus is a piece of code that attaches itself to other instructions within a computer.

True

A worm is a program that reproduces itself over a computer network by breaking into computers much like a virtual hacker.

True

According to Merton, the cultural goal of American society is economic success.

True

According to the Russian perspective, cybercrime and cyberterrorism are acceptable techniques of information warfare.

True

Case studies offer generalizations about trends in cybercriminality or patterns of offending.

True

Cohen and Felson argue that the motivation to commit crime and the supply of offenders are constant.

True

Computers may be used as both criminal instruments and instruments of warfare.

True

Data alteration and denial directly targets the computer by attacking the useful information stored or processed by the computer.

True

Deterrence theory assumes that individuals are rational actors.

True

In general, the threat of computer crime victimization increases with industrialization.

True

Infrastructure attacks are those attacks designed to destroy a system that includes critical data.

True

It is estimated that 100 million attacks against U.S. businesses and governments take place each day.

True

Many hackers acknowledge their activities are illegal, but legitimize and justify the actions using various rationales.

True

Rapid growth in the computer security industry has largely occurred without adequate research on the nature of cybercrimes and criminals.

True

Social control theory assumes that people will violate the law.

True

Sutherland's theory of differential association clearly explains how behavior is learned.

True

The Internet is the best tool for propaganda and recruitment among terrorists.

True

The United States is likely the nation that is most vulnerable to digital terrorism.

True

The expanded use of Social Security numbers is the primary reason for the ease of identity theft.

True

The full extent of computer theft is unknown because many thefts go unreported.

True

The propagation of a worm that does not actually damage anything and is more of a nuisance than anything else is a form of denial of injury according to Sykes and Matza's techniques of neutralization.

True

The text seeks to merge knowledge of criminal justice and knowledge of computer science.

True

Hackers appear to exhibit a subculture that includes: slang. all of the above. socialization processes. group customs and norms.

all of the above.

Using a cell phone to encourage a flash mob is a form of:

cyber and technological facilitation.

Which technique of neutralization occurs when an individual believes his actions were beyond his control?

denial of responsibility

Requesting funds for a terrorist organization through a chat room is an example of:

direct solicitation.

Psychological theory identifies the specific reasons a person becomes a pedophile.

false

Research has shown that most criminals fall into stage 3 or 4 of Kohlberg's stages of moral development.

false

The greatest threat to civil aviation security is:

heavy reliance on other types of infrastructure.

Website defacement is a form of:

information attack.

Distributed denial-of-service attacks are an example of:

information attacks.

According to Merton, a(n) ___________ accepts the goal of economic success but rejects the institutionalized means to obtain it.

innovator

The primary difference between data alteration and network intrusion is the

intent of the intruder.

Despite its contention that modern technological advancements are incompatible with fundamentalist Islam culture, al Qaeda has become a primary foe in the digital terrorism area.

true

The type of attack the hacker group "Anonymous" carried out against the private intelligence industry provider Stratfor is considered:

unauthorized intrusions.

Criminal statistics/data on computer crime are

virtually nonexistent; there is no centralized source.


संबंधित स्टडी सेट्स

Social and Behavioral Research - Belmont Report and It's Principles

View Set

Principles of Financial Accounting Chpt 8

View Set

UNIT 5 CH 23-3 AND 23-4 question from text book

View Set

Chapter 24: Alterations in Genitourinary Function

View Set

Administering IV Medications by Piggyback

View Set

M&B Chapter 11 - Banking Industry: Structure and Competition, CH 11 Banking Industry: Structure and Competition, Chapter 14 Money Supply Process, Practice Problems: M&B, Central Banks and the Federal Reserve System, Chapter 13: Central Banks and the...

View Set