Exam 17: Cyber Crime and the Future of Criminal Justice

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Outline the three major reasons why the Internet is conducive to the dissemination of child pornography.

Free
(Essay)
4.8/5
(34)
Correct Answer:
Verified

-Speed - The Internet is the fastest means of sending visual material over long distances. Child pornographers can deliver their material faster and more securely online than through regular mail.
-Security - Any illegal material that is placed in the hands of a mail carrier is inherently in danger of being discovered. This risk is significantly reduced with e-mail. Furthermore, Internet sites that offer child pornography can protect their customers with passwords, which keep random Web surfers (or law enforcement agents) from stumbling on the site of chat rooms.
-Anonymity - Obviously, anonymity is the most important protection offered by the Internet for sellers and buyers of child pornography, as it is for any person engaged in illegal behavior in cyberspace

A __________ is a person who uses one computer to break into another.

Free
(Short Answer)
4.9/5
(37)
Correct Answer:
Verified

hacker

There are _____ state laws that target cyberbulling in the United States.

Free
(Multiple Choice)
5.0/5
(41)
Correct Answer:
Verified

C

A __________ is a network of computers that have been appropriated without the knowledge of their owners and used to spread harmful programs via the Internet.

(Short Answer)
4.9/5
(44)

Many experts believe that Internet-enabled crime is going to increase dramatically in the near future.

(True/False)
4.9/5
(44)

Businesses sometimes fail to report cybercrimes for fear of losing customer confidence.

(True/False)
4.8/5
(30)

When cyber criminals want to take their money-laundering operations one step Further and avoid legitimate banks altogether, they can make use of _______________.

(Multiple Choice)
4.9/5
(49)

Digital currency is the introduction of illegally gained funds into the legal financial system with the goal of covering up the funds' true origin.

(True/False)
4.9/5
(36)

Which of the following is one of the main weaknesses of using encryption to protect material on computers?

(Multiple Choice)
4.7/5
(30)

The condition of not being recognized or having a traceable name or identity on the Internet is known as _________.

(Short Answer)
4.9/5
(31)

Most parents are concerned more about pedophiles online than they are about __________, which is much more prevalent among children.

(Multiple Choice)
4.8/5
(30)

Describe the three following forms of malware: (a) botnets, (b) worms, and (c) viruses.

(Essay)
4.8/5
(37)

Explain two some of the trends for the future of criminal justice.

(Essay)
4.7/5
(43)

In which of the following crimes do consumers order and pay for items that are never delivered?

(Multiple Choice)
4.8/5
(34)

Every day, as many as 60,000 malicious programs circulate on the Internet.

(True/False)
4.8/5
(38)

Cybercrime is a crime that occurs online, in the virtual community of the __________.

(Short Answer)
4.8/5
(35)

Which of the following private efforts is NOT one of the efforts used to combat cyber crime?

(Multiple Choice)
4.7/5
(42)

A person who uses one computer to break into another is called a:

(Multiple Choice)
4.8/5
(34)

The unauthorized copying and use of the intellectual property is called __________.

(Short Answer)
4.8/5
(40)

Which of the following is NOT one of the three roles a computer can take on in a criminal act?

(Multiple Choice)
4.8/5
(28)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)