IST 610 - Chapter 3 Security Management

Ace your homework & exams now with Quizwiz!

What will law enforcement officials usually require of the victim in order to pursue harassment allegations?

A credible threat of harm

What is a cookie?

A small file made that contains data and then is stored on your computer

Submitting a fake but very high bid to deter other bidders is referred to as what?

Bid shielding

Which of the following occurs when a fraudulent buyer submits high bids to discourage other bidders, and then retracts the bids so people they know can get the item at a lower price?

Bid shielding

Which of these could be considered a course of conduct directed at a specific person that causes substantial emotional distress in such person and serves no legitimate purpose?

Harassment

______ theft and ______ fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception.

Identity

What is the top rule for avoiding Internet fraud?

If it seems to good to be true, it probably is

Why is it useful to have a separate credit card dedicated to online purchases?

If the credit card number is used illegally, you will limit your financial liability

Investing with well-known, reputable brokers protects against what?

Investment fraud

Why is cyber stalking a serious crime?

It can be a prelude to violent crime

If you are a victim of cyber stalking, what should you do to assist the police?

Keep electronic and hard copies of all harassing communications

If you are posting anonymously in a chat room and another anonymous poster threatens you with assault or even death, is this person's post harassment?

Probably not because both parties are anonymous, so the threat is not credible

Artificially inflating a stock in order to sell it at a higher value is referred to as what?

Pump and dump

The most common Internet investment fraud is known as what?

The Nigerian fraud

What is the most likely problem with unsolicited investment advice?

The advice might not be truly unbiased

Identity theft is most often attempted in order to accomplish what goal?

To make illicit purchases

Why should a cybercrime law be specific?

To prevent defendants from finding loopholes

One way to protect yourself on auction sites is?

Use a separate credit card with a low limit

What percentage of cyber stalking cases escalate to real-world violence?

About 19%

What is cyber stalking?

Any use of electronic communications to stalk a person

A file on your computer that websites use to store information about you is a

Cookie

Which of the following is one way to protect yourself against identity theft?

Do not provide personal information to anyone unless it is absolutely necessary

What is the top way to protect yourself from cyber stalking?

Do not use your real identity online

Which of the following is not one of the Security and Exchange Commission's tips for avoiding investment fraud?

Don't invest online

According to the U.S. Department of Justice, identity theft is generally motivated by what?

Economic gain

What are the four categories of auction fraud?

Failure to send, failure to disclose, sending something of lesser value, failure to deliver

What is the first step in protecting yourself from identity theft?

Never provide personal data about yourself unless absolutely necessary

The top rule for chat room safety is what?

Never use your real name or any real personally identifying characteristics

Which country is described by experts as having the strictest cybercrime laws?

None of these

When using a chat room, one way to protect yourself from online harassment is

Not to use your real name

What must exist for cyber stalking to be illegal in a state or territory?

Nothing; existing stalking laws can apply

Which of the following is not an efficient method of protecting yourself from auction fraud?

Only use auctions for inexpensive items

Which of the following is the process to try to induce someone to provide you with personal information?

Phishing

What can you do on your local computer to protect your privacy?

Set your browser's security settings

A seller bidding on her own item to drive up the price is referred to as what?

Shill bidding

Firefox and Internet Explorer are examples of

Web browsers


Related study sets

Foundations Chapter 26 Documentation and Informatics

View Set

Microbiology Learning catalytics lecture 12-26

View Set

Social Psychology- Chapter 5 & 6

View Set

AP European History Unit 5 Exam FINAL Review

View Set

ACCOUNTING 210 FINAL QUIZ PROBLEMS

View Set

Lesson 5, Aviation Midterm 1, Lesson 6, Lesson 7, Lesson 8, Lesson 9, Lesson 10, Aviation Midterm 2, Lesson 11, Lesson 12, Lesson 13, Lesson 14, Lesson 15, Lesson 16

View Set

suffix -ive, Suffix -ive quiz, -ive Suffix Test

View Set

Ch 3 Legal, Regulatory and Professional Environment

View Set

Lecture 6 - Promoting parent-child health

View Set

Personal Finance Unit 3.3 Real Estate and Other Investments

View Set

Freedom of Speech and Press Part 2

View Set