Chapter 2: Cyber Crime CJE4696

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/34

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

35 Terms

1
New cards

What major category of information warfare/cyberterror does "data hiding" fall into?

Technological facilitation

2
New cards

Which of the following is not a wave in the development of warfare as identified by Alvin Toffler?

Answers:

Information wave

Agrarian wave

Renaissance wave

Industrial wave

Renaissance wave

3
New cards

T/F

Despite its contention that modern technological advancements are incompatible with fundamentalist Islam culture, al Qaeda has become a primary foe in the digital terrorism area.

True

4
New cards

Which of the following is one of the four categories that encompasses cyberterrorism and/or information warfare?

Answers:

Stenography

Promotion

Unauthorized intrusions

Cryptography

Promotion

5
New cards

Using a cell phone to encourage a flash mob is a form of:

cyber and technological facilitation.

6
New cards

Which of the following is not true?

Answers:

1.Al Qaeda leaders have claimed to be actively planning a "cyber jihad" against the United States.

2.U.S. officials have found evidence of al Qaeda researching digital switches that run critical infrastructure.

3.Al Qaeda produced the computer virus "Stuxnet."

4.U.S. officials have found evidence of al Qaeda using LOphtCrack.

Al Qaeda produced the computer virus "Stuxnet."

7
New cards

The greatest threat to civil aviation security is:

heavy reliance on other types of infrastructure.

8
New cards

What major category of information warfare/cyberterror does "recruiting" fall into?

Technological facilitation

9
New cards

T/F

The Internet is the best tool for propaganda and recruitment among terrorists.

True

10
New cards

T/F

According to the Russian perspective, cybercrime and cyberterrorism are acceptable techniques of information warfare.

True

11
New cards

T/F

The United States is likely the nation that is most vulnerable to digital terrorism.

True

12
New cards

T/F

It is estimated that 100 million attacks against U.S. businesses and governments take place each day.

True

13
New cards

T/F

An unauthorized intrusion is easy to identify once it has occurred.

False

14
New cards

T/F

A worm is a program that reproduces itself over a computer network by breaking into computers much like a virtual hacker.

True

15
New cards

T/F

Critical infrastructure is not an attractive target to terrorists.

False

16
New cards

T/F

The nation of Japan currently poses a larger threat to the United States in terms of information warfare than that posed by China.

False

17
New cards

Which of the following is least true?

Answers:

1.Cyberterrorism is premeditated.

2.Cyberterrorism is a politically or ideologically motivated attack.

3.Cyberterrorism may include prolonged loss of infrastructure.

4.Cyberterrorism is defined by the group perpetrating it.

Cyberterrorism is defined by the group perpetrating it.

18
New cards

Which of the following is not true?

Answers:

1.The Russians view cyber capabilities as tools of information warfare.

2.The Russians view information warfare from a holistic approach.

3.The Russians carry out cyber operations alongside psychological operations.

4.The Russians view military cyber operations differently than those cyber operations employed for hacktivism, cyber aggression, and cybercrime.

The Russians view military cyber operations differently than those cyber operations employed for hacktivism, cyber aggression, and cybercrime.

19
New cards

Distributed denial-of-service attacks are an example of:

information attacks.

20
New cards

The type of attack the hacker group "Anonymous" carried out against the private intelligence industry provider Stratfor is considered:

unauthorized intrusions.

21
New cards

What major category of information warfare/cyberterror does "cryptography" fall into?

Technological facilitation

22
New cards

Website defacement is a form of:

information attack

23
New cards

Which of the following is least true?

1.Information warfare is considered necessary to the Chinese government to support its objectives and strategy.

2.China views cyberspace as a way of compensating for its deficiency in conventional warfare.

3.Cyber warfare is incorporated in military training in China.

4.The Chinese government restricts the use of cyber warfare to the Chinese military.

the Chinese government restricts the use of cyber warfare to the Chinese military.

24
New cards

T/F

Information attacks are the use of cyber communication to distribute or coordinate plans for a terrorist attack, incite an attack, or otherwise assist in the facilitation of terrorism

False

25
New cards

T/F

A cryptographic key is necessary to read encoded material.

True

26
New cards

Which of the following is not a component of information warfare?Answers:

Psychological operations

Physical destruction

Propaganda

Security measures

Propaganda

27
New cards

Which is not a category of cyberterrorism?

Answers:

Physical attacks

Promotion

Technological facilitation

Information attacks

Physical attacks

28
New cards

Which of the following is not one of the five essential components of infrastructure?

Answers:

Communication networks

People

Information networks

Government

Government

29
New cards

What major category of information warfare/cyberterror does "website defacement" fall into?

30
New cards

What major category of information warfare/cyberterror do "cyber-plagues" fall into?

Information attacks

31
New cards

T/F

A virus is a piece of code that attaches itself to other instructions within a computer.

True

32
New cards

T/F

Infrastructure attacks are those attacks designed to destroy a system that includes critical data.

True

33
New cards

T/F

Data hiding is difficult to accomplish, but relatively easy to discover in Internet files.

False

34
New cards

T/F

Information warfare is always a component of cyberterrorism.

False

35
New cards

Requesting funds for a terrorist organization through a chat room is an example of:

direct solicitation