1/43
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Which act is not considered a form of cybercrime?
cyber violence
About ________ of US companies report being hit by computer network attacks each year.
60 percent
_____________ refers to the process by which thieves place an electronic device on a card that steals personal information and customer account information.
ATM skimming
You access a website you think gives you the scores of your favorite team, but a pop-up message from the FBI shows that you have violated some federal law and that your computer will remain locked until you pay a fine. This is an example of (a) ___________.
ransomware
Warez is ________.
a term that describes hacking a game or application that has copyright protection.
Thieves acquire a legitimate receipt from a store, either by buying something or taking one from the trash, and then return to the store and take an identical item to the return department. This is sometimes known as ____________.
shoplisting
Which of the following is not a motive behind cybervandalism?
a desire to earn a profit from their crime
The process of calling 911 and faking an emergency is called _______.
swatting
About _______ LGBT students have been verbally harassed at school.
8 in 10
Which of the following occurs when cyberbullies want to stalk victims?
cat fishing
The costs of cybercrime are estimated to be as high as _______________.
$575 billion
_________ is defined as illegally using the Internet to gather information that is considered private or confidential.
cyberspying
The ________ is the act that criminalizes the use of recording equipment that makes copies of films while in movie theaters.
Artists rights and theft prevention act
The ________ maintains the Electronic Crimes Task Force, which focuses on identifying and locating international cybercriminals connected to cyber intrusions, bank fraud and other computer-related crimes.
Secret Service
At the start of the second Gulf War, US agents sent emails to Iraqi military officers telling them they would not be harmed if they left their tanks and weapons parked on the side of the road and went home. This would be an example of ____________. ___________.
cyber war
n 2014, 500 million Yahoo accounts were hacked and personal information was stolen. This act was an example of ___________________. _________.
cyber espionage
One recent tactic used by terrorist groups is to _________________.
make contributions through fraudulent charitable organizations to distribute funds
You are asked in a press conference about the differences between transnational organized crime and traditional organized crime, or the Mafia. You answer that ____________.
there are only a few differences between the Mafia and networks of individuals working in more than one state or nation to conduct illegal business ventures
Which of the following is not considered a main activity of transnational organized crime?
burglary
Which transnational gang is not based primarily on ethnicity or family structure, but is instead based on economic necessity?
Russian gangs
An estimated ________ percent of cocaine entering the United States comes from Mexico.
90 percents
Industry experts estimate that the worldwide criminality of traditional Italian organized crime equals approximately ________annually.
100 billion
You are a federal prosecutor attempting to use the Racketeering Influenced and Corrupt Organization (RICO) Act against an Asian organized crime group THAT operates a legitimate international clothing manufacturer in Brooklyn, New York. What provision of the RICO statutes are you going to use?
acquiring an interest in or control of any enterprise engaged in interstate of foreign commerce
A large part of the problem relating to eradicating transnational organized crime is that _________.
profits are too great for countries to look the other way
One problem with combating cybercrime is that _____________.
existing laws are sometimes inadequate to address the problem