intro to cyber mid term
Hate speech
US law-that incites or produces 'imminent lawless action', such as direct threats of violence
Phishing and spoofing
this type of online fraud takes the form of the mass distribution of emails disguised as institutions such as banks, credit card companies, and e-sellers
'spear-phising'
this type of phishing are more custom tailored attacks, such as pretending to be someone close to the victim
'smishing'
this type of phishing takes form of the mass distribution of fraudulent messages through cellular text messages
Hacktivism
A term commonly used to describe hacking for the purposes of political activism and protest is ____________
Alt-Right
A strain of extreme political conservatism characterized by implicitly or explicitly racist and white supremacist ideology
Ritualists
According to Merton (1938) which of the five adaptations of strain describe individuals who reject the culturally approved goals while socially approved means to do so?
Conformists
According to Merton (1938), which of the five adaptations of strain describe individuals who accept both the institutionally approved goals and means?
Cost the government at least $10,000 in damages
All of these components are involved in the definition of cyberterrorism EXCEPT that the act _____________
Labeling Process
Constructing and viewing the hacker as an "archetypal 'cybercriminal'" is an example of what Becker (1963) would identify as the _____________
intellectual property
Copyrights, patents, trade secrets, and trademarks are best classified as form of ________________
2010
Hate sites had risen to 11,500 by __________________
mailbox
In 1988, Gold and Schifreen hacked into Prince Philip's ___________
'Knock-Off NIgel'
In the early 2000s, the UK released a series of anti-piracy ads featuring a signing troubadour slandering a man for engaging in activities like buying counterfeit goods and downloading pirates movies, dubbing the man _____________
DEF CON attendance
In attempts to estimate interest in hacking, what is the example the book provides as an indicator?
computer software
In terms of scope and scale, this commercial sector reports the largest financial losses to piracy at $52.24 billion according to 2016 data
An innovative, free use of technology
In the 1960s hacking was generally viewed as _________
Stormfront
Klux klan leader, Don Black founded online hate website
Investment fraud
Out of the online frauds discussed in the book, this category entailed the highest mean dollar losses to victim (over $30,000 per victim)
Male activity
Studies in hacking reveal it to be an overwhelmingly _____________________-
techniques of neutralization
Sykes and Matza (1957) state that delinquents will provide justification for their behavior before engaging in criminal activity in attempts to nullify dominants social control. What do they call this phenomenon?
Richard Machado
The "Asian hater" he email 59 mainly asian students asserting that he would kill them all
ensure secure and resilient communication and coordination of military activities
The Advanced Research Projects Agency Network's original purpose was to ____________
Does not
The Race Relations Act (1965), the Public Order Act (1986), and the Serious Organised Crime and Police Act (2005)
The "dark web"
The collection of websites unindexed by search engines on the internet is referred to as ___________
Web Browser
The researchers at CERN physics laboratory in Switzerland are credited in developing one of the first?
The US PATRIOT Act of 2001
This act considerably strengthen penalties under the Computer Fraud and Abuse Act of 1986, including the provision for the life imprisonment of convicted 'cyberterrorist'
Website defacements
This form of hacking is the cyber-equivalent to the traditional protest method by which a particular site, associated with opposing or oppressive political interests, is physically occupied by activists
Doxxing and leaking
This form of hacktivism attempts to ruin and alter online sites as a form of protest
The 'Spanish prisoner'
This is one of the oldest and best-known frauds or "cons" about a trickster who solicits help from an Englishman to help him arrange for his sister's escape from her captors
Social contract theory
This notion posits that human beings are willings to surrender some of their freedoms to be protected from those whose unfettered exercise of freedom harms others.
Virtual private networks
This privacy-enhancing measure allow users to hide their IP addresses by rerouting network traffic thereby bypassing attempts by regulatory bodies to block access to websites hosting or indexing pirated content
Rational choice theory
This theory assumes that offenders conducts cost-benefit analyses before conducting criminal behavior
Romance scams
This type of online of online fraud exploits the victims' emotional investment in a perceived relationship or potential relationship for monies and gifts.
Sci-Hub
This website generated controversy by hosting a free-to-access repository of scholarly publications
The decentralized and fragmented nature of the Internet make it difficult
What is a major reason peer-to-peer file-sharing remains extraordinarily resilient to shutdown attempts?
A program where persons can get paid to turn over co-workers using unauthorized copies of software
What is the BSA's "No privacy" program?
The offender should be public scrutinized
Which of the following is not one the Beccaria's three components of effective punishment?
Hacking
Which one of the following actions are classified as "computer-focused crimes"
water system
Which one of the following is NOT classified under a nation's critical information infrastructure?
Neuromancer
William Gibson (1984) introduced "cyberspace to the popular lexicon through his novel _______________
Computer Fraud and Abuse Act
With in the US. this act made it a crime to knowingly access computers without authorization, obtain unauthorized information with intent to defraud, or cause damage to protected computers
Dementia
Within the literature, hacker criminality has been linked to all of theses psychological factors Expect_____________
Elliot Rodger
killed 6 people because he was anger stemming from a misogynistic view and women refusing to have sex with him. He posted a youtube video.
pepe the frog
meme from an Alt-right to appeal younger generation
Netscape Navigator
the first commercial Web browser was ____________
cybernetics
the term "cyber" was coined by Norbert Wiener and Arturo Rosenblueth in the 1040s as they pioneered the field of_____________
Virtual Sit-Ins and blockades
this from of hacktivism involves exposing collection of private information on an individual, often with the goal of shaming, silencing, or coercing the person
differential association theory
this theory credits the propensity to commit crime to intimate peer groups which encourage favorable definitions to crime.
Social Engeneering
this type of online fraud focuses on tricking people into handing over sensitive information like login credentials, social security numbers, and any other details that could compromise a person's security. Sometimes described as "human hacking"