1/186
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
David Smith pleaded guilty to state and federal charges and was sentenced to 20 months in prison for his $80 million dollar cyber attack in the form of a ______.
computer worm
Ethan Nadelmann argues that drugs should be legalized because ______.
the use of mood-altering substances is customary in almost all human societies
T/F Opium was first discovered in 1887 by Josef Mendelson as a derivative for the harsh medications used for relaxation at the time.
False
Similar to a salami slice fraud but on a much larger and usually more complex scale, ________________ sometimes is perpetrated as a "one-off kamikaze" fraud.
manipulation of accounts
The creation of false emails or websites that look legitimate but are designed to gain illegal access to a victim's personal information
phishing
T/F One of the primary issues for combating transnational drug crime is that the United States has little influence in some key drug-producing areas, such as Taliban-held Afghanistan and Myanmar.
True
The following illustrates the story of Rebecca Caine who was terrorized by her ex-boyfriend Peter Atkinson who bombarded her with hundreds of texts and calls a day and even posted nude pictures of her online. His actions are characterized as ______.
cyberstalking
The theft and/or destruction of information, resources, or funds via computers, computer networks, or the Internet.
Cybercrime
Which of the following is an Asian transnational group involved in manufacturing and trafficking methamphetamine who originated in Thailand?
Red Wa
Which of the following is false in regard to cyberbullying?
Girls are more likely to post harmful videos or pictures, while boys are more likely to spread rumors.
Which of the following would be an example of a cyber smear scam?
Bill writes a fictional column about Exxon Mobile closing, hence driving down stock prices for his friends to purchase
Which of the following is not true about the "cyber age" according to the text?
Facebook reached 10 million users in 2015.
Malicious attacks aimed at disrupting, defacing, and destroying technology.
Cybervandalism
A term computer hackers and software pirates use to describe a game or application that is made available for use on the Internet in violation of its copyright protection.
Warez
The federal government has actively pursued members of the warez community through new legislation. Which of the following is one of these acts?
Computer Fraud and Abuse Act
Which of the following is a form of computer crime?
ALL OF THE ABOVE ARE COMPUTER CRIMES: Theft of information, Corporate espionage, Manipulation of accounts
atherine is a college professor who was recently appointed to chair of the department. As chair, she illegally removes small sums of money from a large number of accounts associated with the department and uses the money to fund her lavish vacations to the Africa, Asia, and Europe. This is an example of a______.
Salami slice faud
A type of computer crime which includes the unauthorized obtaining of information from a computer (hacking), including software that is copied for profit.
Theft of information
Which of the following is true about ATM skimming crimes?
ALL OF THE ABOVE: Devices are typically undetectable, Devices are usually placed only for a short time, Phony keyboards are sometimes attached
Which of the following is not true in regard to drug distribution and the Internet?
While many illegal sites exist, nearly 90 percent are certified by the National Association of Boards of Pharmacy.
Which of the following is FALSE in regard to denial-of-service (DoS) attacks?
DoS attacks are not about profit or ransom, but instead about inconveniencing the targeted party
Which of the following would be an example of a cyber smear scam?
Bill writes a fictional column about Exxon Mobile closing, hence driving down stock prices for his friends to purchase
Which of the following best depicts a phishing scheme?
Kareem begins sending emails to random users about how to purchase the hot, new, Christmas toy for the season in an attempt to ascertain personal information for his use
Similar to a salami slice fraud but on a much larger and usually more complex scale, ________________ sometimes is perpetrated as a "one-off kamikaze" fraud.
Manipulation of accounts
Becky obtains a legitimate receipt from a store and returns to the store, shops, and picks up the identical item return to the service desk to get a refund. Becky has just committed _______.
Shoplisting
Extorting money from an Internet service user by threatening to prevent the user from having access to the service is known as ______.
Denial of service attack
The creation of false emails or websites that look legitimate but are designed to gain illegal access to a victim's personal information
Phishing
Which of the following is false in regard to cyberbullying?
Girls are more likely to post harmful videos or pictures, while boys are more likely to spread rumors.
The following illustrates the story of Rebecca Caine who was terrorized by her ex-boyfriend Peter Atkinson who bombarded her with hundreds of texts and calls a day and even posted nude pictures of her online. His actions are characterized as ______.
Cyberstalking
Lockhead Martin, the world's largest aerospace company, announced it detected a significant cyber attack against its information systems that was thwarted. According to the text, this is an example of _______.
Cyber espionage
What was the significance of the Counterfeit Access Device and Computer Fraud and Abuse Law?
It protected classified U.S defense and foreign relations information.
Which of the following is TRUE about the Convention on Cybercrime, ratified in 2006?
It was the first international treaty to address the definition and enforcement of cybercrime
The Internet Crime Complaint Center, based in Fairmont, WV, is run by the National White Collar Crime Center and which federal agency?
FBI
Which of the following is FALSE about transnational organized crime?
It usually does not include drug sales but is more inclined to commit business-related crimes.
Passed in 1970, the _______________________ act is federal legislation that enables prosecutors to bring additional criminal and civil charges against people whose multiple criminal acts constitute a conspiracy.
RICO
Which of the following is FALSE in regard to Russian organized crime groups in the United States?
They are primary players in drug trafficking
Latin American and Mexican cartels primary method of income is through ______.
Drug sales and drug smuggling
Which of the following is most true about the group known as the Surenos?
They are an alliance of hundreds of individual Mexican American street gangs who gained popularity by selling drugs within prisons.
Which of the following is true about Asian transnational crime groups?
In Taiwan, the number one organized crime problem is the penetration of mobsters into legitimate business sectors and politics
Which of the following is an Asian transnational group involved in manufacturing and trafficking methamphetamine who originated in Thailand?
Red Wa
Jody is a 21-year-old college student from Wheeling, WV. She attends a local state university with her boyfriend, David, and the two are set to graduate next May with degrees in criminal justice. ANSWER the following questions:
One of Jody's friends on the volleyball team regularly downloads music from the Internet and has gotten Jody to participate in the activity as well. Although Jody knows this is illegal, she is participating in a cybercrime called______.
File sharing
After getting a taste for illegal activity, Jody and David decide to participate in other illegal cybercrimes. They decide to use the university listserv to email all students and faculty at the university notifying them that their account has been hacked and to email their name and password back to the sender. This is an example of ______.
Phishing
Jody and David begin an etailing fraud scam on campus with the rest of Jody's friends on the volleyball team. Which of the following scenarios would most likely be considered etailing fraud?
Jody and his friends purchase stereo equipment online and purchasing cheaper, but similar stereo equipment at a local store. After receiving the original purchase, they ship the cheaper version back to the online store for a full refund
According to the video on academic doping, there is an epidemic of prescription misuse in academic settings. Which concept below, from the article by Mui, Sales and Murphy, was most prevalent in the video?
B and D
T/F The traditional sources means of income for transnational organized crimes groups are derived from providing illicit materials and from using force to enter into and maximize profits in legitimate businesses
True
T/F Terrorist organizations recruit new members and disseminate information via the internet.
True
T?F Although email is the most common form of spam, many are not aware that viruses and spam can be sent in the form of instant messaging, online forums, social media, and even text messaging.
True
Which of the following is a form of cybertheft?
All of these are cyber theft
T/F Cyberthieves are motivated less by profit than cyber vandals.
False
True or False, criminals are more technologically sophistocated, using the internet to carry out their crimes.
True
True or False, Cyberstalking refers to the use of the internet to steal one's identity for profit
False
The first step in motivation to become a political criminal is the feeling that, _____.
its not right
T/F Defacers are typically members of an extensive social network who are eager to demonstrate their reasons for hacking and often leave calling cards, greetings, and taunts on the web pages they corrupt.
True
T/F Because of strict federal laws, identity theft has decreased at surprising rates over the past few years.
False
According to the class lecture (embedded video on Colonial Pipeline attack), what type of power arrangement is best to help prevent an attack on the US energy structure?
A smart grid
Which of the following statements about transnational organized crime is FALSE?
it usually does not include drug sales but is more inclined to commit business-related crimes
T?F Efforts to combat transnational organized crime are typically in the hands of federal agencies.
True
T/F Shoplisting is a form of etailing fraud in which a person purchases a legitimate store receipt, takes an identical item off the store shelf, and "returns" the item for cash of store credit.
True
Cassandra receives an email telling her that a friend suggested her for a work-from-home job. The email contains enough personal information that Cassandra believes the offer is legitimate and opens the attachments, which, unbeknownst to her, allow malware to harvest her personal information. Cassandra was a victim of ______.
Spear phishing
T/F Cyberstalking refers to the use of the internet to steal one's identity for profit.
False
Chinese hackers used a phishing email to breach a contractor for the US office of Personnel Management, which exposed the records of 21 million civil service employees. This is an example of ______.
Cyber espionage
According to class lecture (embedded video on colonial pipeline), the Aurora vulnerability showed what could happen with a simple piece of computer code as it relates to the US energy grind?
Key pumps could be told to misfire until they explode
Which act is not considered a form of cybercrime?
Cyber violence
About ________ of US companies report being hit by computer network attacks each year.
60 percent
_____________ refers to the process by which thieves place an electronic device on a card that steals personal information and customer account information.
ATM Skimming
You access a website you think gives you the scores of your favorite team, but a pop-up message from the FBI shows that you have violated some federal law and that your computer will remain locked until you pay a fine. This is an example of (a) ___________.
Ransomware
Warez is ________.
a term that describes hacking a game or application that has copyright protection.
Thieves acquire a legitimate receipt from a store, either by buying something or taking one from the trash, and then return to the store and take an identical item to the return department. This is sometimes known as ____________.
Shoplisting
The process of calling 911 and faking an emergency is called _______.
Swatting
Which of the following occurs when cyberbullies want to stalk victims?
Cat fishing
The costs of cybercrime are estimated to be as high as _______________.
$500 Billion
_________ is defined as illegally using the Internet to gather information that is considered private or confidential.
Cyber spying
The ________ is the act that criminalizes the use of recording equipment that makes copies of films while in movie theaters.
Artists rights and theft prevention act
The ________ maintains the Electronic Crimes Task Force, which focuses on identifying and locating international cybercriminals connected to cyber intrusions, bank fraud and other computer-related crimes.
Secret Service
At the start of the second Gulf War, US agents sent emails to Iraqi military officers telling them they would not be harmed if they left their tanks and weapons parked on the side of the road and went home. This would be an example of ____________. ___________.
Cyber War
In 2014, 500 million Yahoo accounts were hacked and personal information was stolen. This act was an example of ___________________. _________.
Cyber Espionage
One recent tactic used by terrorist groups is to _________________.
make contributions through fraudulent charitable organizations to distribute funds
You are asked in a press conference about the differences between transnational organized crime and traditional organized crime, or the Mafia. You answer that ____________.
there are only a few differences between the Mafia and networks of individuals working in more than one state or nation to conduct illegal business ventures
Which of the following is not considered a main activity of transnational organized crime?
burglary
Which transnational gang is not based primarily on ethnicity or family structure, but is instead based on economic necessity?
Russian Gangs
An estimated ________ percent of cocaine entering the United States comes from Mexico.
90 percent
Industry experts estimate that the worldwide criminality of traditional Italian organized crime equals approximately ________annually.
100 billion
You are a federal prosecutor attempting to use the Racketeering Influenced and Corrupt Organization (RICO) Act against an Asian organized crime group THAT operates a legitimate international clothing manufacturer in Brooklyn, New York. What provision of the RICO statutes are you going to use?
acquiring an interest in or control of any enterprise engaged in interstate of foreign commerce
A large part of the problem relating to eradicating transnational organized crime is that _________.
profits are too great for countries to look the other way
One problem with combating cybercrime is that _____________.
existing laws are sometimes inadequate to address the problem
Ethan Nadelmann argues that drugs should be legalized because ______.
the use of mood-altering substances is customary in almost all human societies
T/F One of the primary issues for combating transnational drug crime is that the United States has little influence in some key drug-producing areas, such as Taliban-held Afghanistan and Myanmar.
True
an investigation of a person's history to determine whether that person should be allowed a certain privilege such as the ability to possess a firearm
background checks
a network of computers that have been appropriated without the knowledge of their own
botnet
the state of operating in accordance with governmental standards
compliance
physical harm to individuals or the environment that occurs as the result of corporate policies or decision making
corporate violence
an attempt to damage or disrupt computer systems or electronic networks operated by computers
cyber attack
a crime that occurs online, in the virtual community of the internet as opposed to in the physical world
cyber crime
any misrepresentation knowingly made over the internet with the intention of deceiving another and on which a reasonable person would and does rely to his or her detriment
cyber fraud
the crime of stalking, committed in cyberspace through the use of e-mail, text messages, or another form of electronic communication
cyberstalking
an individual who has supported foreign terrorist organizations such as alQaeda that are engaged in hostilities against the military operations of the US
enemy combatant
a person who uses one computer to break into another
hacker
the theft of personal information such as a person's name, driver's license number, or Social Security number
identity theft
property resulting from intellectual, creative processes
intellectual property
an entity that plasy a role in international affairs but does not represent any established state or nation
nonstate actor