cyber crimes chap 9

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

An individual who doesn't have the skills to hack on his or her own so uses prewritten programs to do so is referred to as a dumpster diver.

false

2
New cards

Which of the following differential association theory points was not proposed by Edwin Sutherland?

Behavior is learned the best in larger social groups.

3
New cards

The ______ is primarily responsible for the protection of civilian computers.

Department of Homeland Security

4
New cards

Which of the following is not considered one of the responsibilities of the Department of Homeland Security?

ensure a fast, safe, and effective transportation system

5
New cards

The leading agency for investigating cyberattacks by criminals, overseas adversaries, and terrorists is known as the ______.

Federal Bureau of Investigation

6
New cards

Public-private partnerships are not necessary for the cybersecurity of our nation.

false

7
New cards

The U.S. government should cooperate not only with national jurisdiction of law enforcement at all levels but the international community and private sector organizations as well.

true

8
New cards

Cybercrimes operate in a virtual environment, with undefined and specific jurisdictions.

false

9
New cards

An ethnic, regional, economic, or social group exhibiting characteristic patterns of behavior sufficient to distinguish it from others within an embracing culture or society is referred to as a ______.

subculture

10
New cards

Systems utilized by many of the nation's critical infrastructures to provide automated control of the functions of the infrastructure are referred to as ______.

supervisory control and data acquisition systems

11
New cards

The role of local-level agencies in cybersecurity is constantly evolving.

true

12
New cards

The first responders to most catastrophic events are usually at the ______ level.

local

13
New cards

Albert K. Cohen's subculture theory propositions are based on ______.

delinquent boys

14
New cards

Maneuvering around, trying to access unprotected WiFi networks, is referred to as ______.

wardriving

15
New cards

According to the text, low socioeconomic status is a predominate marker for engaging in crime in ______.

subculture theory

16
New cards

Examining trends that are necessary for crime to occur is an element of ______.

routine activity theory

17
New cards

According to the differential association theory, criminal behavior is acquired through interactions with other persons via communication.

true

18
New cards

According to the routine activities theory, guardianship plays a major role in the prevalence of crime.

true

19
New cards

According to the routine activities theory, crime is more likely to occur if there is ______.

Absence of appropriate guardians

20
New cards

Entities that have resources to put toward security and may not be subjected to the scrutiny and restrictions are usually in the ______.

private sector