intro to cyber mid term

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Hate speech

US law-that incites or produces 'imminent lawless action', such as direct threats of violence

Phishing and spoofing

this type of online fraud takes the form of the mass distribution of emails disguised as institutions such as banks, credit card companies, and e-sellers

'spear-phising'

this type of phishing are more custom tailored attacks, such as pretending to be someone close to the victim

'smishing'

this type of phishing takes form of the mass distribution of fraudulent messages through cellular text messages

Hacktivism

A term commonly used to describe hacking for the purposes of political activism and protest is ____________

Alt-Right

A strain of extreme political conservatism characterized by implicitly or explicitly racist and white supremacist ideology

Ritualists

According to Merton (1938) which of the five adaptations of strain describe individuals who reject the culturally approved goals while socially approved means to do so?

Conformists

According to Merton (1938), which of the five adaptations of strain describe individuals who accept both the institutionally approved goals and means?

Cost the government at least $10,000 in damages

All of these components are involved in the definition of cyberterrorism EXCEPT that the act _____________

Labeling Process

Constructing and viewing the hacker as an "archetypal 'cybercriminal'" is an example of what Becker (1963) would identify as the _____________

intellectual property

Copyrights, patents, trade secrets, and trademarks are best classified as form of ________________

2010

Hate sites had risen to 11,500 by __________________

mailbox

In 1988, Gold and Schifreen hacked into Prince Philip's ___________

'Knock-Off NIgel'

In the early 2000s, the UK released a series of anti-piracy ads featuring a signing troubadour slandering a man for engaging in activities like buying counterfeit goods and downloading pirates movies, dubbing the man _____________

DEF CON attendance

In attempts to estimate interest in hacking, what is the example the book provides as an indicator?

computer software

In terms of scope and scale, this commercial sector reports the largest financial losses to piracy at $52.24 billion according to 2016 data

An innovative, free use of technology

In the 1960s hacking was generally viewed as _________

Stormfront

Klux klan leader, Don Black founded online hate website

Investment fraud

Out of the online frauds discussed in the book, this category entailed the highest mean dollar losses to victim (over $30,000 per victim)

Male activity

Studies in hacking reveal it to be an overwhelmingly _____________________-

techniques of neutralization

Sykes and Matza (1957) state that delinquents will provide justification for their behavior before engaging in criminal activity in attempts to nullify dominants social control. What do they call this phenomenon?

Richard Machado

The "Asian hater" he email 59 mainly asian students asserting that he would kill them all

ensure secure and resilient communication and coordination of military activities

The Advanced Research Projects Agency Network's original purpose was to ____________

Does not

The Race Relations Act (1965), the Public Order Act (1986), and the Serious Organised Crime and Police Act (2005)

The "dark web"

The collection of websites unindexed by search engines on the internet is referred to as ___________

Web Browser

The researchers at CERN physics laboratory in Switzerland are credited in developing one of the first?

The US PATRIOT Act of 2001

This act considerably strengthen penalties under the Computer Fraud and Abuse Act of 1986, including the provision for the life imprisonment of convicted 'cyberterrorist'

Website defacements

This form of hacking is the cyber-equivalent to the traditional protest method by which a particular site, associated with opposing or oppressive political interests, is physically occupied by activists

Doxxing and leaking

This form of hacktivism attempts to ruin and alter online sites as a form of protest

The 'Spanish prisoner'

This is one of the oldest and best-known frauds or "cons" about a trickster who solicits help from an Englishman to help him arrange for his sister's escape from her captors

Social contract theory

This notion posits that human beings are willings to surrender some of their freedoms to be protected from those whose unfettered exercise of freedom harms others.

Virtual private networks

This privacy-enhancing measure allow users to hide their IP addresses by rerouting network traffic thereby bypassing attempts by regulatory bodies to block access to websites hosting or indexing pirated content

Rational choice theory

This theory assumes that offenders conducts cost-benefit analyses before conducting criminal behavior

Romance scams

This type of online of online fraud exploits the victims' emotional investment in a perceived relationship or potential relationship for monies and gifts.

Sci-Hub

This website generated controversy by hosting a free-to-access repository of scholarly publications

The decentralized and fragmented nature of the Internet make it difficult

What is a major reason peer-to-peer file-sharing remains extraordinarily resilient to shutdown attempts?

A program where persons can get paid to turn over co-workers using unauthorized copies of software

What is the BSA's "No privacy" program?

The offender should be public scrutinized

Which of the following is not one the Beccaria's three components of effective punishment?

Hacking

Which one of the following actions are classified as "computer-focused crimes"

water system

Which one of the following is NOT classified under a nation's critical information infrastructure?

Neuromancer

William Gibson (1984) introduced "cyberspace to the popular lexicon through his novel _______________

Computer Fraud and Abuse Act

With in the US. this act made it a crime to knowingly access computers without authorization, obtain unauthorized information with intent to defraud, or cause damage to protected computers

Dementia

Within the literature, hacker criminality has been linked to all of theses psychological factors Expect_____________

Elliot Rodger

killed 6 people because he was anger stemming from a misogynistic view and women refusing to have sex with him. He posted a youtube video.

pepe the frog

meme from an Alt-right to appeal younger generation

Netscape Navigator

the first commercial Web browser was ____________

cybernetics

the term "cyber" was coined by Norbert Wiener and Arturo Rosenblueth in the 1040s as they pioneered the field of_____________

Virtual Sit-Ins and blockades

this from of hacktivism involves exposing collection of private information on an individual, often with the goal of shaming, silencing, or coercing the person

differential association theory

this theory credits the propensity to commit crime to intimate peer groups which encourage favorable definitions to crime.

Social Engeneering

this type of online fraud focuses on tricking people into handing over sensitive information like login credentials, social security numbers, and any other details that could compromise a person's security. Sometimes described as "human hacking"


संबंधित स्टडी सेट्स

Routing and Switching Essentials (V6.0) - RSE 6.0 Chapter 8 Exam

View Set

Chapter 16: Infectious Diseases Affecting the Skin

View Set

Logical Fallacies -- Definitions

View Set