cyber crimes chap 6

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

ISIS and the operators have utilized technological advances such as social media to do all of the following EXCEPT ______.

denounce themselves

2
New cards

An act that occurs when an actor, knowing that his or her actions will benefit any foreign government, instrumentality, or agent, steals, copies, or receives a trade secret is referred to as ______

economic espionage

3
New cards

The first "software" was the Morse code developed by Samuel F. B. Morse. The Morse code made telegraphing much easier by using ______.

dots and dashes

4
New cards

The Economic Espionage Act of 1996 makes it a ______ to steal or interfere with trade secrets.

federal crime

5
New cards

According to RAND, actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks is referred to as ______.

cyber warfare

6
New cards

Cyberespionage can be classified into which of the following types?

both economic and political

7
New cards

GhostNet was one of the most successful programs with regard to ______ cyberespionage.

political

8
New cards

China is known to prioritize ______ control over cyberdefense strategies.

political information

9
New cards

Which of the following systems led to the creation of the Morse code?

telegraph system

10
New cards

Economic cyberespionage is typically carried out by all of the following EXCEPT

individual actors

11
New cards

Which of the following is not an example of a cyberattack used by the Syrian Electronic Army?

Moonlight Maze

12
New cards

The Syrian Electronic Army has been responsible for attacks against which of the following?

social media sites, major U.S. newspapers,
telecommunications providers
(all of these)

13
New cards

According to the text, the most pervasive cyberthreat may be ______.

theft of intellectual property

14
New cards

According to the text, cyberattacks focus mainly on the destruction of sensitive information.

False

15
New cards

Historically, power has depended on which of the following strengths?

military

16
New cards

In 2015, a cyberattack was launched against Ukraine by the Russians. The ______ attack to shut down the power grid based in Russia was possibly backed by the Russian government.

KillDisk

17
New cards

In 2014, President Obama attributed the Sony hack to the North Korean government and raised the issue of foreign obstruction of ______ Amendment rights in the United States.

first

18
New cards

Political espionage is typically used to gain access to sensitive information and/or to fatally damage a network.

True

19
New cards

Actors route Internet traffic through different countries, making it appear to come from another country.

True

20
New cards

The Syrian Electronic Army was established in 2011 as a result of the protests against the Assad regime.

True