Exam 9: Crimes in the Cyber System

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Interference with an individual's access to their technology because of cyber offending can cause physical and social consequences for the victim.

Free
(True/False)
4.9/5
(30)
Correct Answer:
Verified

True

A survey by the Ponemon Institute found that the cost of cyber offending was highest in which industries?

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

D

What role is the computer playing if it is hacked?

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

A

Compare the motives of hackers versus crackers.

(Essay)
4.9/5
(26)

If an offender remotely accesses the control systems of an infant formula manufacturer and changes the ingredients with a deadly result, what type of crime has been committed?

(Multiple Choice)
4.9/5
(35)

If someone failed to pay for an item "bought" on eBay, what type of crime would they be committing?

(Multiple Choice)
4.9/5
(41)

What issue arises in regards to preventing computer crimes?

(Multiple Choice)
4.8/5
(31)

What is usually stolen during theft as a computer crime?

(Multiple Choice)
4.7/5
(29)

Which of the following cannot be considered a type of software crime?

(Multiple Choice)
4.8/5
(26)

Efforts to punish cybercriminals to prevent them from committing crimes is what type of strategy?

(Multiple Choice)
4.9/5
(30)

Over one-third of companies surveyed in a study on cybercrime attributed some of their cyberattacks to whom?

(Multiple Choice)
4.8/5
(35)

Hospitals are particularly vulnerable to what type of cyberattack?

(Multiple Choice)
4.8/5
(33)

How do victim characteristics inhibit law enforcement response to computer crimes?

(Multiple Choice)
4.8/5
(41)

Describe three characteristics of cybergangs.

(Essay)
4.8/5
(21)

Which of the following is an employee-based strategy employers use to protect their businesses from computer crime in the workplace?

(Multiple Choice)
4.8/5
(40)

The topology of cybercriminals suggests that they may work alone, with a group of associates, or within a network.

(True/False)
4.8/5
(27)

Overpayment fraud is considered theft as a computer crime.

(True/False)
4.8/5
(38)

Opportunity explanations for computer crimes focus on the ease with which offenses are committed.

(True/False)
4.8/5
(49)

Describe internet piracy.

(Essay)
4.9/5
(29)

Which explanation for computer crime focuses on the degree of knowledge offenders typically have about computers?

(Multiple Choice)
4.8/5
(31)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)