Exam 3: Traditional Computer Crime: Early Hackers and Theft of Components
Hackers, irrespective of national origin, display startling similarities.
True
Describe the five general categories of cybercriminals in today's society.
1. Hacktivists: These cybercriminals are motivated by political or social causes and often target government or corporate websites to promote their agenda or protest against certain policies.
2. Cyberterrorists: These individuals or groups use cyber attacks to create fear and chaos for political or ideological reasons. Their goal is to disrupt critical infrastructure or cause harm to individuals or organizations.
3. State-sponsored hackers: These cybercriminals are backed by governments and engage in cyber espionage, sabotage, or warfare to gain a strategic advantage or undermine their adversaries.
4. Organized crime groups: These cybercriminals operate like traditional criminal organizations, using hacking and other cyber activities to steal sensitive information, commit fraud, or extort money from individuals and businesses.
5. Insider threats: These are individuals within an organization who misuse their access to sensitive data or systems for personal gain or to cause harm to their employer. They may be motivated by financial incentives, revenge, or coercion.
According to accomplished phreakers, the theft of telephone access codes requires great technical expertise.
False
________ are designed to strip the source-address information from e-mail messages.
Which of the following hacking-related developments occurred after the year 2000?
Shareware publishers encourage users to give copies of programs to friends and colleagues but ask everyone who uses a program regularly to pay a registration fee to the program's author directly.
What can the exponential increase in online harassment, stock manipulation, and child pornography be attributed to?
Computer thieves have traditionally been able to market their stolen goods as legitimate.
The issue of vicinage has been simplified by the lack of international guidelines for cyberactivity.
________ sites enable visitors to download software illegally in violation of copyright protections.
________ are those individuals who have authorized or legitimate access to a computer system, but who exceed that authorization.
Not all crimes involving computers can be characterized as "computer crime."
________ was the most infamous of all hackers and has been the subject of numerous books and movies.
________ can be defined as the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.
What is the primary reason that the resale of integrated chips is so lucrative?
Which of the following does NOT accurately describe the Secret Service actions that prompted the seminal court case Steve Jackson Games, Inc.v.U.S.Secret Service et al.?
________ were devices which "tricked" switching systems into granting free access to long-distance lines.
Which of the following is NOT a general category of computer crime?
Discuss what can be done to apprehend/prevent computer-related crime.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)