Digital Crime test 2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/67

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

68 Terms

1
New cards

White Collar Criminals

THESE TYPES OF CRIMINALS DO NOT FIT INTO THE MOLD OF TRADITIONAL DEFINITIONS OF "CRIMINALS"

2
New cards

Embezzlement

THIS IS THE UNLAWFUL MISAPPROPRIATE FOR PERSON USE OF MONEY, PROPERTY, OR SOME OTHER THING OF VALUE THAT HAS BEEN ENTRUSTED TO AN OFFENDER'S CARE, CUSTODY, OR CONTROL

3
New cards

15th century English common law

EMBEZZLEMENT HAS BEEN RECOGNIZED SINCE...?

4
New cards

Not a high social status, usually committed by those engaged in managing financial affairs of societal elites

EMBEZZLEMENT IS COMMITTED BY WHAT CLASS OF PEOPLE?

5
New cards

Knowledge related to manipulation of large-scale computerized financial databases

THIS HAS BECOME THE PRIMARY TOOL OF THE MODERN EMBEZZLER.

6
New cards

Internal Perpetrator

AN EMBEZZLER IS ALMOST ALWAYS AN INSIDER, ALSO KNOWN AS A...?

7
New cards

•Traditional was often limited by physical nature; limit to how much cash could be stolen

•Modern may not require physical theft of anything

•Advent of technologically driven financial management techniques may have narrowed the pool of potential embezzlers to those individuals who possess the specialized skills required to use computer information systems

NAME A DIFFERENCE BETWEEN TRADITIONAL AND MODERN EMBEZZLEMENT.

8
New cards

Corporate Espionage

THIS IS ANY THEFT OF PROPRIETARY BUSINESS INFORMATION THROUGH SPYING OR DECEPTION, PARTICULARLY THE THEFT OF "TRADE SECRETS"

9
New cards

Embezzlement

THIS IS KNOWN AS THE "THEFT IN THE VIOLATION OF TRUST"

10
New cards

Computer-assisted crime

IS EMBEZZLEMENT A COMPUTER-ASSISTED OR COMPUTER-FOCUSED CRIME?

11
New cards

False. Oftentimes, modern embezzlers do not have financial issues, but simply wish to live a more affluent lifestyle.

TRUE OR FALSE: MODERN EMBEZZLERS TEND TO HAVE FINANCIAL ISSUES, WHICH IS THE REASON FOR THEIR CRIMES.

12
New cards

Trade Secrets

THESE MAY INCLUDE CUSTOMER LISTS, PRODUCT SPECIFICATIONS, R&D DATA, COMPUTERIZED SOURCE CODES, MEMORANDA DETAILING CORPORATE STRATEGIES, PRICING LISTS, ETC.

13
New cards

"insiders" in corporate espionage

have legitimate access to a company's computer networks, such as employees, IT personnel, or corporate executives

14
New cards

"outsiders" in corporate espionage

crack into a corporation's computer networks without any form of legitimate access rights.

15
New cards

insiders

85% OF ALL CORPORATE ESPIONAGE SCHEMES

ARE CARRIED OUT BY?

16
New cards

Domestic spies hired by corporate competitors

Foreign nationals hired by adversarial governments that wish to gain a competitive advantage over American firms

GIVE AN EXAMPLE OF AN "OUTSIDER" FOR CORPORATE ESPIONAGE.

17
New cards

Hired to perform specific, limited jobs, like database management or product introductions

Resemble temporary workers more than full-time employees, called "kites"

Lack of loyalty, or competitors may hire them based on their recent work history

PROBLEMS THAT HAVE COME FROM THE GROWTH OF INDEPENDENT CONTRACTORS.

18
New cards

Corporate community's increasing use of computer technologies to conduct business provides spies easier access to valuable proprietary information.

WHY HAS CORPORATE ESPIONAGE BEEN INCREASING?

19
New cards

Small businesses

WHAT ARE INCREASINGLY THE TARGET OF CORPORATE ESPIONAGE?

20
New cards

Manufacturing (24% of all attacks) Finance (19%) Services (17%) Government (12%)

THE MOST FREQUENTLY ATTACKED INDUSTRIES IN CORPORATE ESPIONAGE.

21
New cards

Economic Espionage Act of 1996

THIS OUTLINES THE SEPARATE OFFENSES FOR CORPORATE SPYING BETWEEN FOREIGN NATIONALS AND DOMESTIC SPIES.

22
New cards

Money Laundering

THIS IS THE ACT OF CONCEALING THE SOURCE OF ASSETS THAT HAVE BEEN ILLEGALLY OBTAINED.

23
New cards

to hide the source of ownership of all such funds through the creation of a seemingly legitimate history or paper trail.

THE PRIMARY OBJECTIVE OF MONEY LAUNDERING IS...

24
New cards

Embezzlement and money laundering

NAME THE TWO "OLD" TYPES OF WHITE COLLAR CRIMES THAT FOUND RENEWED LIFE WITH TECHNOLOGY.

25
New cards

Identity Theft

THE MOST FREQUENT CONSUMER FRAUD COMPLAINT IS...?

26
New cards

Smurfing.

THIS IS THE DIVISION OF LARGE AMOUNTS OF CASH INTO SMALLER DENOMINATIONS SO AS TO CONCEAL ITS COMMON ORIGIN.

27
New cards

THE PRIMARY MEANS OF LAUNDERING.

1. Cash that was illegally obtained could be physically transported from its place of origin to a jurisdiction that had less stringent banking and reporting requirements.

2. Launderer could quickly transform hard currency into legitimate real property, such as real estate, commercial interests, or personal luxuries.

3. Launderers turn to smurfing.

28
New cards

The sudden large-scale purchasing of property may

cause notice by authorities.

NAME THE MAJOR ISSUE ASSOCIATED WITH LAUNDERING MONEY BY TRANSFORMING HARD CURRENCY INTO LEGITIMATE REAL PROPERTY.

29
New cards

The creation of opportunities that are directly linked to technological and commercial advances.

LARGELY ATTRIBUTED TO THE EXPONENTIAL GROWTH IN THE INCIDENCE OF IDENTITY THEFT

30
New cards

Social Security Numbers

IDENTITY THEFT IS OFTEN TIED TO THE INCREASED USE OF AS PERSONAL IDENTIFIERS.

31
New cards

Dumpster Diving, Direct theft of mail Change of address forms, Shoulder-surfing

EXAMPLES OF A LOW-TECH FORM OF ID THEFT.

32
New cards

VPN

Virtual Private Network

33
New cards

The Deep Web

ANY WEBSITE, INFORMATION, ETC. THAT IS NOT INDEXED BY SEARCH ENGINES IS CONSIDERED A PART OF THIS

34
New cards

Tor/Onion Browser

YOU CAN ONLY ACCESS THE DARK NET WITH THIS

35
New cards

The US Navy

TOR WAS CREATED BY THIS GOVERNMENT AGENCY.

36
New cards

Nodes

IN TOR, INFORMATION TRAVELS THROUGH THESE

37
New cards

Exit Node

THIS IS THE WEAKEST LINK IN THE TOR CONNECTION

38
New cards

Encryption

TOR OFFERS A HIGH LEVEL OF THIS

39
New cards

HTTPS (Hypertext transfer protocol secure)

TOR USES THIS INSTEAD OF HYPERTEXT TRANSPORT PROTOCOL

40
New cards

Censorship

PEOPLE USE TOR TO CIRCUMVENT THIS

41
New cards

2006

TOR STARTED TO GAIN A GREATER AMOUNT OF MAINSTREAM PROMINENCE IN THIS YEAR

42
New cards

Child Abuse Sites

WHEN RESEARCHED, ALMOST 75% OF TOR TRAFFIC ENDED UP AT THESE

43
New cards

Anonymized Access, Bitcoin Payment with Escrow, Vendor Feed-back

THE THREE KEY CHARACTERISTICS DARK NET MARKETS HAVE

44
New cards

ARPANET

STANFORD AND MIT STUDENTS USED THIS TO PURCHASE CANNABIS IN THE 1970S

45
New cards

Ross Ulbricht, aka "Dread Pirate Roberts"

THE FOUNDER OF THE SILK ROAD

46
New cards

General Purpose Robot

BAXTER CAN BE DEFINED AS A ..... ROBOT

47
New cards

Self Check-Out Cashiers, Barista Robot

GIVE AN EXAMPLE OF A COMMON TYPE OF ROBOT SEEN IN OUR EVERYDAY LIVES.

48
New cards

Cheaper and faster

WE THINK OF TECHNOLOGICAL CHANGE AS THE FANCY, NEW EXPENSIVE STUFF, BUT THE REAL CHANGE COMES FROM LAST DECADE'S STUFF GETTING ..... AND .....

49
New cards

Humans being replaced by mechanical minds in the job market

WHAT IS IN DANGER AS A RESULT OF THE FAST RATE AT WHICH TECHNOLOGY IS ADVANCING

50
New cards

Autos

SELF-DRIVING CARS ARE PLACED UNDER THE TECHNOLOGICAL CATEGORY OF ...?

51
New cards

Because they write bots to replace human jobs. These bots teach themselves how to perform your job. Demand for human mental labor in terms of paperwork, decision making, and writing are on the decline.

WHY ARE AUTOMATION ENGINEERS SO THREATENING TO THE JOB MARKET?

52
New cards

Watson

WHAT IS THE NAME OF THE BOT DESIGNED BY IBM THAT DESTROYED KEN JENNINGS IN JEOPARDY?

53
New cards

Financial (huge profits associated with sale of online pornography)

THE DRIVING FORCE BEHIND MANY OF THESE VICTIMIZATION CRIMES ARE...?

54
New cards

Commercial Gain

PEOPLE ENTICE AND EXPLOIT WOMEN AND CHILDREN FOR SEXUAL TOURISM, PERSONAL GRATIFICATION, AND THIS

55
New cards

Children

THE ESTIMATED NUMBER OF THIS GROUP PROSTITUTED IN THE US IS BETWEEN 100,000 AND 3 MILLION

56
New cards

Professional Dating Service Websites

SINGLE PEOPLE ARE SOMETIMES VICTIMIZED ON THESE TYPES OF WEBSITES

57
New cards

Youth Internet Safety Survey

THIS WAS CONDUCTED IN 2000 AND 2005

58
New cards

Unwanted Exposure

IN THE 2005 YOUTH INTERNET SAFETY SURVEY 1 IN 3 YOUTHS EXPERIENCED THIS

59
New cards

14 or Older

81% OF TARGETED YOUTH WERE THIS AGE OR OLDER

60
New cards

CyberBullying

WHEN THE INTERNET, CELL PHONES OR OTHER DEVICES ARE USED TO SEND OR POST TEXT OR IMAGES INTENDED TO HURT OR EMBARRASS ANOTHER PERSON?

61
New cards

50%

AS MANY AS THIS PERCENT OF YOUTH HAVE EXPERIENCED BULLYING

62
New cards

Cyberstalking

THIS IS THE WILLFUL OR INTENTIONAL COMMISSION OF A SERIES OF ACTS THAT WOULD CAUSE A REASONABLE PERSON TO FEAR DEATH OR SERIOUS BODILY INJURY AND THAT, IN FACT, PLACE THE VICTIM IN FEAR OF DEATH OR SERIOUS BODILY INJURY

63
New cards

California

WHAT WAS THE FIRST STATE TO ADDRESS SPECIFIC LAWS ON CYBERSTALKING?

64
New cards

Maintaining a Relationship

STALKERS ARE PRIMARILY CONCERNED ABOUT THIS

65
New cards

Erotomaniacs

THIS TYPE OF CYBERSTALKER IS RELATIVELY UNCOMMON - THEY MAKE UP LESS THAN 10% OF ALL STALKERS

66
New cards

Community Protection and Freedom of Speech

THE DEBATE OF OBSCENITY IS A DEBATE BETWEEN THIS AND THIS

67
New cards

Cybercriminal

THIS TYPE OF CRIMINAL IS MORE ELUSIVE, LARGELY ANONYMOUS, AND MORE LIKELY TO BE OPERATING OUTSIDE THE US

68
New cards

1. Trafficking child pornography

2. Locating children to molest

3. Engaging in inappropriate sexual communication

with children

4. Communicating with other pedophiles

FOUR PRIMARY PURPOSES FOR PEDOPHILES' USE OF THE INTERNET.