cyber crime chap 5

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Hackers who are motivated by financial gains and who conduct both bad and ethical hacking are referred to as ______.

gray hats

2
New cards

Using two-factor identification is recommended for protecting private information, such as using a password and a fingerprint or other physical device.

True

3
New cards

Social engineering is any act that influences a person to take an action that may or may not be in his or her best interest.

True

4
New cards

Hackers who are motivated by personal gain or a certain cause are often referred to as ______.

black hats

5
New cards

Insiders are people who are current or former employees of a company, contractors, or friends of employees.

True

6
New cards

Low probability that the criminals will get caught and convicted and public exposure are some of the reasons as to why so few victims report the crimes.

True

7
New cards

People who are "tricked" by others into giving up access information or information about themselves to an external party are known as ______ insiders.

exploited

8
New cards

Which of the following characteristics of hackers is NOT true?

The members meet each other quite often.

9
New cards

Which of the following is NOT considered a main type of insider threat?

feared

10
New cards

The most serious insider cybercrimes include all of the following EXCEPT ______.

harassment

11
New cards

According to the text, cyberthreats originate mainly from all of the following entities EXCEPT ______.

local government

12
New cards

The use of computer networks and technologies as a means for conducting attacks that target critical national infrastructures or governmental assets has a psychological, social, political, or religious motive, causes harm to individuals or groups, or physically damages infrastructures is referred to as ______.

cyber terrorism

13
New cards

National threats originate from individuals inside the United States, aiming to attack local or national governments and infrastructures.

True

14
New cards

All of the following are examples of social engineering EXCEPT ______.

spam

15
New cards

Groups with displeasure of government are often motivated by all of the following EXCEPT ______.

aristocracy

16
New cards

All of the following were identified as vulnerable infrastructures EXCEPT ______.

education

17
New cards

Threats that originate from inside the company or organization are referred to as ______.

local threats

18
New cards

Cyber terrorism attacks often take the form of ______.

denial of service attacks

19
New cards

Which of the following was NOT identified as one of the main forms of international threats?

hacking or spying on city and local governments

20
New cards

A ______ refers to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway.

cyberthreat