cyber crime

Ace your homework & exams now with Quizwiz!

who was the first to highlight the disparities between street crimes and crimes of the privileged class

Edwin Sutherland

What do hackers do?

Find holes, infiltrate computer systems to breach computer security

where are most middle eastern crime groups based

Illinois, Ohio, New Jersey,and New York

what organized crime group presents the most danger to the U.S.

La Cosa Nostra

what is most know for the deep web

TOR

what're acts committed by corporate executives

White collar Crimes

what is sabotage

a category of insider threat that describes an individual taking revenge against an organization primarily because he or she is angry.

what can embezzlement be classified as

a computer assisted crime

what is a black hat hacker

a cracker or malicious hacker

what is a gray hat hacker

a hacker who sometimes behaves ethically but can occasionally violate that

what are insider threats

a malicious criminal who has or had legitimate access to an organization's computing environment, and has intentionally exceeded or intentionally used access in a manner that negatively affected the confidentiality, integrity, or availability of the organization's information or information systems.

who are crackers

a malicious hacker

what are hackers

a person who uses a computer to gain unauthorized access

what is embezzlement

a theft in violation of trust

what is a white hat hacker

an ethical hacker who received permission to hack

what is cyber crime

an evolved state of traditional crime

what is the deep web

an uncharted part of the internet not accessible through regular internet browsers

who are cybercriminals

are from inside an organization present the highest risk for cybercrime and corporate and industrial espionage.

what flourishes in the deep web

criminal and illegal activities

what were hackers portrayed as in the 80s

criminals

who are script kitties

do not have enough skill to write their own programs or explore new exploits themselves. Instead they download attacks programs.

what do Mexican and South American organized crime groups mainly do

drug trafficking `

what is the electronic disturbance theater

electronic company of cyber activists, critical theorists, and performance artists who engage in the development of both the theory and practice of non-violent acts of defiance across and between digital and non-digital spaces.

what is the hacker dialect called

eleet speek, or k-rad

where can internal fraud come from

employees, managers, and board members

what is EaaS

espionage as a service

how are middle eastern crime groups organized

for theft or financial rings

what was documented by levy in his book the hackers

hacker ethic

what is a hacktivist

hackers who come together to challenge the treatment of their peers by the government

what is phreaking

hacking into payphones to get free calls

what is the most frequent type of consumer fraud complaint

identity theft

what does modern day embezzlement not consist of as much

physical theft

what is the economic espionage act of 1996

punishes intentional trade secret misappropriation. ... without authorization copies, downloads, uploads, alters, destroys, transmits, or conveys a trade secret, receives, buys, or possesses a trade secret, knowing that the trade secret has been stolen or obtained wrongfully.

what has espionage evolved too

similar to traditional crime

when was espionage first reported

the 1700's

when did la cosa nostra form

the 1800's

when did criminal hacking emerge

the 80s and 90s

Where did the work hack derive from

the Massachusetts institute of technology

what is money laundering

the act of concealing the source of assets that have been illegal obtained

what is the difference between a hacker and a cybercriminal

the attitude in which the approaches an activity

what is the most common characteristic of a hacktivist

the use of hacker skills and attitudes to portray political messages

what is espionage

theft of intellectual property for gain

what is Russia commonly referred to as

" Hack zone " because of all the hackers that live in Russia

how much does insider fraud cost U.S. businesses a year

$40 million

what tools do law enforcement authorities have to enforce money laundering crimes

- bank secrecy act - money laundering control act - U.S. treasury departments financial crimes enforcement network ( FinCEN )

Eurasian criminal enterprises

- began operating in the U.S. in the 70's - including Russian organized crime

what methods do identity thieves uses to steal personal information

- dumpster diving - direct theft of mail -shoulder surfing - hacking information from corporate databases -bribing of employees who have internal access to customer identifiers

what new opportunities has electronics provided for money laundering

- electronic cash transfer - electronic cash exchange system

what are the three types of espionage

- industrial - economic - corporate

what are examples of intellectual property

- invention - patents - literary and artistic works - designs

what does our society rely on technology wise

- online banking - atm - sharing files remotely - email

the social world of computer hacking is shaped by five social norms

- technology - knowledge - Commitment - categorization - law

what 7 factors have increased corporate espionage

- the increase in use of information and computer technology -global commerce has increasingly been conducted electronically over the internet - increase in spy tactics among corporate rivals - companies victimized by corporate espionage can pursue civil actions

what are the different types of hackers

- white hat hacker - gray hat hacker - black hat hacker - hacktivist

what was the hacker manifesto

-a text that railed against adults, law, enforcement, and schools, evoking the angst of young hackers everywhere.

in a classical sense what is a hacker

-someone who has mastered the art of programming to the point that he or she can simply sit down and "hack" in a program that works.

how much did the Nigerian prince scheme cost the U.S. a year

1-2 billion

when did the first cyberattack against America take place

1870

when were there no laws about hacking

1950s-1970s

since when have middle eastern crime groups been active in the U.S.

1970's

when did complaints of identity theft peak

2007,2008

how much of worldwide cybercrime is committed by organized crime groups

80%

how much of corporate espionage is committed by insiders

85%

what is operation avalanche

•2016 multinational law enforcement taskforce including EuroPol, EuroJust, German police, U.S. D. of J, and FBI dismantled an international criminal infrastructure "Avalanche".

what is one major hacker conference

DEFCON

balkan criminal enterprises

These organizations originate from or operate in Albania, Bosnia-Herzegovina, Croatia, Kosovo, the former Yugoslav Republic of Macedonia, Serbia and Montenegro, Bulgaria, Greece, and Romania

what is tbml

trade based money laundering

why is TBML vulnerable

transportation of large volumes of goods obscures the nature and character of any single trade transaction -nations have limited resources to verify the exchange of goods across the borders

what is industrial espionage

unethical theft of business or trade secrets


Related study sets

Extra English : Unit 12 What's in a name

View Set

SAFe 4 Practitioner Certification

View Set

Real Estate 100 - Chapter 12 -- Landlord and Tenant Relations

View Set

Exam 4 Study Guide (Chapters 12-15)

View Set

Chapter 20: Anxiolytic and Hypnotic Agents

View Set