Deck 15: Technology and Crime

Full screen (f)
exit full mode
Question
DNA profiling is

A) infallible.
B) highly reliable.
C) somewhat reliable.
D) not very reliable.
Use Space or
up arrow
down arrow
to flip the card.
Question
According to the 1994 federal DNA Identification Act, the FBI is authorized to establish DNA indexes for all but which of the following categories?

A) Samples recovered from unidentified human remains
B) Samples recovered from crime scenes
C) Offenders convicted of crimes
D) Offenders charged with crimes
Question
____________involves using official-looking e-mail messages to steal valuable information.

A) Cloning
B) Phishing
C) Phreaking
D) Softlifting
Question
____________are hackers who are fascinated by the evolving technology of telecommunications and explore it without knowing exactly what they will find.

A) Game players
B) Explorers
C) Scamps
D) Pioneers
Question
Illegally obtaining computerized information through the path of direct access is usually taken by

A) malware creators.
B) business competitors.
C) office workers.
D) hackers.
Question
The __________ Act criminalized the willful infringement of copyrighted works.

A) Communications Decency
B) No Electronic Theft
C) National Stolen Property
D) Cyber Security Enhancement
Question
Which of the following best describes the average hacker?

A) A 20-year-old man living in San Francisco
B) A 23-year-old woman living in Chicago
C) A 35-year-old woman living in Paris
D) A 40-year-old man living in New York
Question
Which of the following is not a characteristic shared by white-collar and computer criminals?

A) Their acts generally involve information manipulations that create profits or losses
B) Their crimes can be committed by an individual, several people working in collusion, and/or organizations
C) Their crimes generally are committed through violent means
D) The generally require access to computers or computer storage media
Question
____________is defined as any illegal act for which knowledge of computer technology is involved for its investigation, perpetration, or prosecution.

A) Cybercrime
B) Computer crime
C) Computer-related crime
D) Computer abuse
Question
__________ is any violation of a federal or state computer-crime statute.

A) Computer-facilitated crime
B) Cybercrime
C) Computer abuse
D) Computer-related crime
Question
Hackers who are excited about breaking into geographically distant computer systems fall into which category?

A) Game players
B) Explorers
C) Vandals
D) Scamps
Question
Using a computer to create a database to support drug distribution falls into which category of cybercrime?

A) Internal cybercrime
B) Computer-manipulation crime
C) Support of criminal enterprises
D) Telecommunications crimes
Question
In the case of __________, the U.S. Supreme Court rejected an earlier standard for the admissibility of scientific evidence and said that all relevant evidence is admissible unless otherwise provided by the U.S. Constitution or other relevant legal rules.

A) Frye v. U.S.
B) Daubert v. Merrell Dow Pharmaceuticals, Inc.
C) Buck v. Bell
D) Reno v. ACLU
Question
In the case of __________, the U.S. Supreme Court struck down several provisions of the Communications Decency Act.

A) Frye v. U.S.
B) Daubert v. Merrell Dow Pharmaceuticals, Inc.
C) Buck v. Bell
D) Reno v. ACLU
Question
Malware involves

A) phone phreaking.
B) embezzlement.
C) computer viruses.
D) software piracy.
Question
The primary motivation of the average hacker is to

A) profit financially by hacking.
B) gain access to computer networks.
C) demonstrate network vulnerability.
D) create a computer security system.
Question
Which type of hacker is most likely to use illicit drugs?

A) Scamps
B) Vandals
C) Explorers
D) Addicts
Question
Planting a virus is an example of which category of cybercrime?

A) Internal cybercrime
B) Computer-manipulation crime
C) Support of criminal enterprises
D) Telecommunications crimes
Question
Which is not one of the factors that may be used to determine whether a form of scientific evidence is reliable?

A) It has no known or potential rates of error
B) It has been subjected to peer review
C) It has been subjected to testing
D) It has standards controlling application of the techniques involved
Question
Lawsuits challenging the constitutionality of the Communications Decency Act claimed that provisions of the act contravened __________ Amendment guarantees.

A) First
B) Fourth
C) Fifth
D) Sixth
Question
Explorers focus on computer systems that are geographically distant from the hacker's physical location.
Question
A(n) __________ records the activities of computer operators surrounding each event in a transaction.

A) expert systems analysis.
B) data encryption.
C) threat analysis
D) audit trail
Question
Cybercrime is often committed through the use of violent means.
Question
The Daubert standard deals with the application of the laws requiring convicted offenders to provide DNA samples.
Question
Discovery of cybercrime is often by accident.
Question
Technology and crime have always been closely linked.
Question
The primary motivation of the average hacker is financial profit.
Question
The Supreme Court case of Reno v. ACLU focused on whether the Communications Decency Act abridged First Amendment protections.
Question
The path of direct access to computer information is generally used by office workers violating positions of trust.
Question
DNA evidence may last for many years.
Question
The first national police force to begin routine collection of DNA samples from anyone involved in a serious crime is located in which country?

A) Great Britain
B) France
C) Germany
D) China
Question
Illegal hacking is an example of a computer manipulation crime.
Question
Phishing is usually done via calls and texts made on cell phones
Question
The "Spiderman snare" is a discolike strobe light which quickly disorients human targets.
Question
is a system used to match a suspect's fingerprints against stored records.

A) NCIC
B) AFIS
C) METAPOL
D) VICAP
Question
The _____________ is a citizens' group that focuses on refining notions of privacy and legality as they relate to telecommunications and other communications-based media.

A) The Computer Security Institute
B) The Cybersecurity Center
C) The National Computer Security Association
D) The Electronic Frontier Foundation
Question
What does President Obama consider one of the most serious economic and national security challenges facing the US today?

A) White-collar crime
B) Cybersecurity
C) Violent crime
D) Constitutional protections
Question
____________attempt to duplicate the decision-making processes used by skilled investigators in evidence analysis.

A) Expert systems
B) TEMPEST
C) Audit trails
D) DNA systems
Question
An assessment of the potential disasters facing an organization is known as

A) data encryption.
B) threat analysis.
C) an expert system.
D) an audit trail.
Question
Typical phishing schemes generally reach only about 10,000 e-mail in-boxes
Question
Computer __________ involves remote access to targeted machines.
Question
____________are malicious hackers who deliberately cause damage with no apparent personal gain.
Question
The federal DNA Identification Act authorizes the FBI to establish DNA indexes for samples recovered from crime scenes.
Question
The greatest threat to reliable results in DNA profiling is __________ error.
Question
Most police departments today are prepared to effectively investigate computer crimes
Question
The lifeblood of the cyberworld is ________.
Question
Cybercriminals do not need to come into direct contact with victims.
Question
The Daubert ruling rejected the standards set in the previous case of __________.
Question
Expert systems such as NCAVC may eventually replace human criminal investigators.
Question
____________used special dial-up access codes to avoid long-distance charges.
Question
Computer __________ involves an unlawful incident associated with computer technology in which a victim suffers loss or a perpetrator reaps benefit.
Question
Threat analysis is the process of encoding information so that it is unreadable to all but its intended recipients.
Question
The U.S. Constitution states that electronic documents and communications qualify for protection under the First and Fourth Amendments.
Question
A(n) __________ or sequential record of system activities is a powerful tool that is useful in identifying instances of computer crime when they occur.
Question
Hackers who intend no overt harm but just have a sense of fun are known as __________.
Question
The Electronic Frontier Foundation focuses on protecting the individual rights found in the Constitution and Bill of Rights as new communications technologies emerge.
Question
Illegally copying software programs is known as __________.
Question
__________ systems are systems of computer hardware and software that attempt to duplicate the decision-making processes used by skilled investigators in evidence analysis and pattern recognition.
Question
____________is the process by which information is encoded so that it is unreadable by all but its intended recipients.
Question
________ is the violation of a federal or state computer-crime statue
Question
Do you agree with President Barack Obama that "cybersecurity is one of the most serious economic and national-security challenges facing the United States"?
Question
According to President Barak Obama, _________ is one of the most serious economic and national-security challenges facing the U.S.
Question
Describe the characteristics of hackers and explain the categories of the basic typology that is based on psychological characteristics.
Question
What effects do you think the use of DNA evidence will have on the justice system in the United States in the long run?
Question
Compare and contrast phone phreaking with phishing.
Question
One contemporary is whether e-mail qualifies as speech and is therefore protected under the _______ Amendment.
Question
How might similarities between hacking and playing computer games blur the lines between entertainment and crime?
Question
Why might cybercrime appeal to people who would not commit crimes like burglary or robbery?
Question
How is the use of computer technology by criminals and law enforcement similar too and different from the use of other types of technology to perpetrate crimes and bring perpetrators to justice?
Question
Match between columns
Internet crimes
Databases recording drug distribution
Internet crimes
Viruses
Internet crimes
Software piracy
Internet crimes
Illegal hacking
Internet crimes
Embezzlement
Computer-manipulation crime
Databases recording drug distribution
Computer-manipulation crime
Viruses
Computer-manipulation crime
Software piracy
Computer-manipulation crime
Illegal hacking
Computer-manipulation crime
Embezzlement
Hardware, software, and information theft
Databases recording drug distribution
Hardware, software, and information theft
Viruses
Hardware, software, and information theft
Software piracy
Hardware, software, and information theft
Illegal hacking
Hardware, software, and information theft
Embezzlement
Support of criminal enterprises
Databases recording drug distribution
Support of criminal enterprises
Viruses
Support of criminal enterprises
Software piracy
Support of criminal enterprises
Illegal hacking
Support of criminal enterprises
Embezzlement
Internal cybercrimes
Databases recording drug distribution
Internal cybercrimes
Viruses
Internal cybercrimes
Software piracy
Internal cybercrimes
Illegal hacking
Internal cybercrimes
Embezzlement
Question
Match between columns
Communications Decency Act (CDA)
Passed in 1996 to protect minors from harmful material on the Internet
Communications Decency Act (CDA)
Passed in 2002 to create new sentencing guidelines for cybercriminals
Communications Decency Act (CDA)
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
Communications Decency Act (CDA)
Passed in 1997 to criminalize willful infringement of copyrighted works, including via electronic means
No Electronic Theft Act (NETA)
Passed in 1996 to protect minors from harmful material on the Internet
No Electronic Theft Act (NETA)
Passed in 2002 to create new sentencing guidelines for cybercriminals
No Electronic Theft Act (NETA)
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
No Electronic Theft Act (NETA)
Passed in 1997 to criminalize willful infringement of copyrighted works, including via electronic means
Cyber Security Enhancement Act (CSEA)
Passed in 1996 to protect minors from harmful material on the Internet
Cyber Security Enhancement Act (CSEA)
Passed in 2002 to create new sentencing guidelines for cybercriminals
Cyber Security Enhancement Act (CSEA)
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
Cyber Security Enhancement Act (CSEA)
Passed in 1997 to criminalize willful infringement of copyrighted works, including via electronic means
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 1996 to protect minors from harmful material on the Internet
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 2002 to create new sentencing guidelines for cybercriminals
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 1997 to criminalize willful infringement of copyrighted works, including via electronic means
Question
Match between columns
Addicts
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Addicts
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Addicts
Individuals who focus on defeating copy protection either to play games or as a game
Addicts
Individuals who make unplanned forays into evolving technology for the sake of discovery
Addicts
Individuals who hack for fun and without intending harm
Addicts
Malicious individuals who cause damage to computer systems without seeking gain
Explorers
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Explorers
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Explorers
Individuals who focus on defeating copy protection either to play games or as a game
Explorers
Individuals who make unplanned forays into evolving technology for the sake of discovery
Explorers
Individuals who hack for fun and without intending harm
Explorers
Malicious individuals who cause damage to computer systems without seeking gain
Vandals
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Vandals
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Vandals
Individuals who focus on defeating copy protection either to play games or as a game
Vandals
Individuals who make unplanned forays into evolving technology for the sake of discovery
Vandals
Individuals who hack for fun and without intending harm
Vandals
Malicious individuals who cause damage to computer systems without seeking gain
Pioneers
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Pioneers
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Pioneers
Individuals who focus on defeating copy protection either to play games or as a game
Pioneers
Individuals who make unplanned forays into evolving technology for the sake of discovery
Pioneers
Individuals who hack for fun and without intending harm
Pioneers
Malicious individuals who cause damage to computer systems without seeking gain
Scamps
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Scamps
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Scamps
Individuals who focus on defeating copy protection either to play games or as a game
Scamps
Individuals who make unplanned forays into evolving technology for the sake of discovery
Scamps
Individuals who hack for fun and without intending harm
Scamps
Malicious individuals who cause damage to computer systems without seeking gain
Game Players
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Game Players
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Game Players
Individuals who focus on defeating copy protection either to play games or as a game
Game Players
Individuals who make unplanned forays into evolving technology for the sake of discovery
Game Players
Individuals who hack for fun and without intending harm
Game Players
Malicious individuals who cause damage to computer systems without seeking gain
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/72
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Technology and Crime
1
DNA profiling is

A) infallible.
B) highly reliable.
C) somewhat reliable.
D) not very reliable.
B
2
According to the 1994 federal DNA Identification Act, the FBI is authorized to establish DNA indexes for all but which of the following categories?

A) Samples recovered from unidentified human remains
B) Samples recovered from crime scenes
C) Offenders convicted of crimes
D) Offenders charged with crimes
D
3
____________involves using official-looking e-mail messages to steal valuable information.

A) Cloning
B) Phishing
C) Phreaking
D) Softlifting
Phishing
4
____________are hackers who are fascinated by the evolving technology of telecommunications and explore it without knowing exactly what they will find.

A) Game players
B) Explorers
C) Scamps
D) Pioneers
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
5
Illegally obtaining computerized information through the path of direct access is usually taken by

A) malware creators.
B) business competitors.
C) office workers.
D) hackers.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
6
The __________ Act criminalized the willful infringement of copyrighted works.

A) Communications Decency
B) No Electronic Theft
C) National Stolen Property
D) Cyber Security Enhancement
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following best describes the average hacker?

A) A 20-year-old man living in San Francisco
B) A 23-year-old woman living in Chicago
C) A 35-year-old woman living in Paris
D) A 40-year-old man living in New York
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is not a characteristic shared by white-collar and computer criminals?

A) Their acts generally involve information manipulations that create profits or losses
B) Their crimes can be committed by an individual, several people working in collusion, and/or organizations
C) Their crimes generally are committed through violent means
D) The generally require access to computers or computer storage media
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
9
____________is defined as any illegal act for which knowledge of computer technology is involved for its investigation, perpetration, or prosecution.

A) Cybercrime
B) Computer crime
C) Computer-related crime
D) Computer abuse
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
10
__________ is any violation of a federal or state computer-crime statute.

A) Computer-facilitated crime
B) Cybercrime
C) Computer abuse
D) Computer-related crime
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
11
Hackers who are excited about breaking into geographically distant computer systems fall into which category?

A) Game players
B) Explorers
C) Vandals
D) Scamps
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
12
Using a computer to create a database to support drug distribution falls into which category of cybercrime?

A) Internal cybercrime
B) Computer-manipulation crime
C) Support of criminal enterprises
D) Telecommunications crimes
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
13
In the case of __________, the U.S. Supreme Court rejected an earlier standard for the admissibility of scientific evidence and said that all relevant evidence is admissible unless otherwise provided by the U.S. Constitution or other relevant legal rules.

A) Frye v. U.S.
B) Daubert v. Merrell Dow Pharmaceuticals, Inc.
C) Buck v. Bell
D) Reno v. ACLU
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
14
In the case of __________, the U.S. Supreme Court struck down several provisions of the Communications Decency Act.

A) Frye v. U.S.
B) Daubert v. Merrell Dow Pharmaceuticals, Inc.
C) Buck v. Bell
D) Reno v. ACLU
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
15
Malware involves

A) phone phreaking.
B) embezzlement.
C) computer viruses.
D) software piracy.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
16
The primary motivation of the average hacker is to

A) profit financially by hacking.
B) gain access to computer networks.
C) demonstrate network vulnerability.
D) create a computer security system.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
17
Which type of hacker is most likely to use illicit drugs?

A) Scamps
B) Vandals
C) Explorers
D) Addicts
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
18
Planting a virus is an example of which category of cybercrime?

A) Internal cybercrime
B) Computer-manipulation crime
C) Support of criminal enterprises
D) Telecommunications crimes
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
19
Which is not one of the factors that may be used to determine whether a form of scientific evidence is reliable?

A) It has no known or potential rates of error
B) It has been subjected to peer review
C) It has been subjected to testing
D) It has standards controlling application of the techniques involved
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
20
Lawsuits challenging the constitutionality of the Communications Decency Act claimed that provisions of the act contravened __________ Amendment guarantees.

A) First
B) Fourth
C) Fifth
D) Sixth
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
21
Explorers focus on computer systems that are geographically distant from the hacker's physical location.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) __________ records the activities of computer operators surrounding each event in a transaction.

A) expert systems analysis.
B) data encryption.
C) threat analysis
D) audit trail
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
23
Cybercrime is often committed through the use of violent means.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
24
The Daubert standard deals with the application of the laws requiring convicted offenders to provide DNA samples.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
25
Discovery of cybercrime is often by accident.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
26
Technology and crime have always been closely linked.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
27
The primary motivation of the average hacker is financial profit.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
28
The Supreme Court case of Reno v. ACLU focused on whether the Communications Decency Act abridged First Amendment protections.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
29
The path of direct access to computer information is generally used by office workers violating positions of trust.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
30
DNA evidence may last for many years.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
31
The first national police force to begin routine collection of DNA samples from anyone involved in a serious crime is located in which country?

A) Great Britain
B) France
C) Germany
D) China
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
32
Illegal hacking is an example of a computer manipulation crime.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
33
Phishing is usually done via calls and texts made on cell phones
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
34
The "Spiderman snare" is a discolike strobe light which quickly disorients human targets.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
35
is a system used to match a suspect's fingerprints against stored records.

A) NCIC
B) AFIS
C) METAPOL
D) VICAP
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
36
The _____________ is a citizens' group that focuses on refining notions of privacy and legality as they relate to telecommunications and other communications-based media.

A) The Computer Security Institute
B) The Cybersecurity Center
C) The National Computer Security Association
D) The Electronic Frontier Foundation
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
37
What does President Obama consider one of the most serious economic and national security challenges facing the US today?

A) White-collar crime
B) Cybersecurity
C) Violent crime
D) Constitutional protections
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
38
____________attempt to duplicate the decision-making processes used by skilled investigators in evidence analysis.

A) Expert systems
B) TEMPEST
C) Audit trails
D) DNA systems
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
39
An assessment of the potential disasters facing an organization is known as

A) data encryption.
B) threat analysis.
C) an expert system.
D) an audit trail.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
40
Typical phishing schemes generally reach only about 10,000 e-mail in-boxes
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
41
Computer __________ involves remote access to targeted machines.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
42
____________are malicious hackers who deliberately cause damage with no apparent personal gain.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
43
The federal DNA Identification Act authorizes the FBI to establish DNA indexes for samples recovered from crime scenes.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
44
The greatest threat to reliable results in DNA profiling is __________ error.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
45
Most police departments today are prepared to effectively investigate computer crimes
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
46
The lifeblood of the cyberworld is ________.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
47
Cybercriminals do not need to come into direct contact with victims.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
48
The Daubert ruling rejected the standards set in the previous case of __________.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
49
Expert systems such as NCAVC may eventually replace human criminal investigators.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
50
____________used special dial-up access codes to avoid long-distance charges.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
51
Computer __________ involves an unlawful incident associated with computer technology in which a victim suffers loss or a perpetrator reaps benefit.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
52
Threat analysis is the process of encoding information so that it is unreadable to all but its intended recipients.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
53
The U.S. Constitution states that electronic documents and communications qualify for protection under the First and Fourth Amendments.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
54
A(n) __________ or sequential record of system activities is a powerful tool that is useful in identifying instances of computer crime when they occur.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
55
Hackers who intend no overt harm but just have a sense of fun are known as __________.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
56
The Electronic Frontier Foundation focuses on protecting the individual rights found in the Constitution and Bill of Rights as new communications technologies emerge.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
57
Illegally copying software programs is known as __________.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
58
__________ systems are systems of computer hardware and software that attempt to duplicate the decision-making processes used by skilled investigators in evidence analysis and pattern recognition.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
59
____________is the process by which information is encoded so that it is unreadable by all but its intended recipients.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
60
________ is the violation of a federal or state computer-crime statue
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
61
Do you agree with President Barack Obama that "cybersecurity is one of the most serious economic and national-security challenges facing the United States"?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
62
According to President Barak Obama, _________ is one of the most serious economic and national-security challenges facing the U.S.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
63
Describe the characteristics of hackers and explain the categories of the basic typology that is based on psychological characteristics.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
64
What effects do you think the use of DNA evidence will have on the justice system in the United States in the long run?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
65
Compare and contrast phone phreaking with phishing.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
66
One contemporary is whether e-mail qualifies as speech and is therefore protected under the _______ Amendment.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
67
How might similarities between hacking and playing computer games blur the lines between entertainment and crime?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
68
Why might cybercrime appeal to people who would not commit crimes like burglary or robbery?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
69
How is the use of computer technology by criminals and law enforcement similar too and different from the use of other types of technology to perpetrate crimes and bring perpetrators to justice?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
70
Match between columns
Internet crimes
Databases recording drug distribution
Internet crimes
Viruses
Internet crimes
Software piracy
Internet crimes
Illegal hacking
Internet crimes
Embezzlement
Computer-manipulation crime
Databases recording drug distribution
Computer-manipulation crime
Viruses
Computer-manipulation crime
Software piracy
Computer-manipulation crime
Illegal hacking
Computer-manipulation crime
Embezzlement
Hardware, software, and information theft
Databases recording drug distribution
Hardware, software, and information theft
Viruses
Hardware, software, and information theft
Software piracy
Hardware, software, and information theft
Illegal hacking
Hardware, software, and information theft
Embezzlement
Support of criminal enterprises
Databases recording drug distribution
Support of criminal enterprises
Viruses
Support of criminal enterprises
Software piracy
Support of criminal enterprises
Illegal hacking
Support of criminal enterprises
Embezzlement
Internal cybercrimes
Databases recording drug distribution
Internal cybercrimes
Viruses
Internal cybercrimes
Software piracy
Internal cybercrimes
Illegal hacking
Internal cybercrimes
Embezzlement
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
71
Match between columns
Communications Decency Act (CDA)
Passed in 1996 to protect minors from harmful material on the Internet
Communications Decency Act (CDA)
Passed in 2002 to create new sentencing guidelines for cybercriminals
Communications Decency Act (CDA)
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
Communications Decency Act (CDA)
Passed in 1997 to criminalize willful infringement of copyrighted works, including via electronic means
No Electronic Theft Act (NETA)
Passed in 1996 to protect minors from harmful material on the Internet
No Electronic Theft Act (NETA)
Passed in 2002 to create new sentencing guidelines for cybercriminals
No Electronic Theft Act (NETA)
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
No Electronic Theft Act (NETA)
Passed in 1997 to criminalize willful infringement of copyrighted works, including via electronic means
Cyber Security Enhancement Act (CSEA)
Passed in 1996 to protect minors from harmful material on the Internet
Cyber Security Enhancement Act (CSEA)
Passed in 2002 to create new sentencing guidelines for cybercriminals
Cyber Security Enhancement Act (CSEA)
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
Cyber Security Enhancement Act (CSEA)
Passed in 1997 to criminalize willful infringement of copyrighted works, including via electronic means
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 1996 to protect minors from harmful material on the Internet
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 2002 to create new sentencing guidelines for cybercriminals
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 1997 to criminalize willful infringement of copyrighted works, including via electronic means
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
72
Match between columns
Addicts
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Addicts
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Addicts
Individuals who focus on defeating copy protection either to play games or as a game
Addicts
Individuals who make unplanned forays into evolving technology for the sake of discovery
Addicts
Individuals who hack for fun and without intending harm
Addicts
Malicious individuals who cause damage to computer systems without seeking gain
Explorers
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Explorers
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Explorers
Individuals who focus on defeating copy protection either to play games or as a game
Explorers
Individuals who make unplanned forays into evolving technology for the sake of discovery
Explorers
Individuals who hack for fun and without intending harm
Explorers
Malicious individuals who cause damage to computer systems without seeking gain
Vandals
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Vandals
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Vandals
Individuals who focus on defeating copy protection either to play games or as a game
Vandals
Individuals who make unplanned forays into evolving technology for the sake of discovery
Vandals
Individuals who hack for fun and without intending harm
Vandals
Malicious individuals who cause damage to computer systems without seeking gain
Pioneers
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Pioneers
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Pioneers
Individuals who focus on defeating copy protection either to play games or as a game
Pioneers
Individuals who make unplanned forays into evolving technology for the sake of discovery
Pioneers
Individuals who hack for fun and without intending harm
Pioneers
Malicious individuals who cause damage to computer systems without seeking gain
Scamps
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Scamps
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Scamps
Individuals who focus on defeating copy protection either to play games or as a game
Scamps
Individuals who make unplanned forays into evolving technology for the sake of discovery
Scamps
Individuals who hack for fun and without intending harm
Scamps
Malicious individuals who cause damage to computer systems without seeking gain
Game Players
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Game Players
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Game Players
Individuals who focus on defeating copy protection either to play games or as a game
Game Players
Individuals who make unplanned forays into evolving technology for the sake of discovery
Game Players
Individuals who hack for fun and without intending harm
Game Players
Malicious individuals who cause damage to computer systems without seeking gain
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 72 flashcards in this deck.