Deck 15: Crimes of the New Millennium

Full screen (f)
exit full mode
Question
__________________ refers to the use of the Internet,e-mail,or other electronic communication devices to pursue,harass,or threaten another person.
Use Space or
up arrow
down arrow
to flip the card.
Question
________________ encompasses offenses that can be singular or ongoing but typically involves the theft and/or destruction of information,resources,or funds utilizing computers,computer networks,and the Internet.
Question
Cybercrime is defined as:

A)a type of white-collar crime
B)a type of organized crime
C)a type of enterprise crime
D)a type of Internet crime
Question
__________________ can be viewed as an effort by covert forces to undermine the social,economic,and political systems of an enemy nation by destroying its electronic infrastructure and disrupting its economy.
Question
Illegally using the Internet to gather information considered private and confidential,whether by an estranged spouse or a foreign business competitor,is termed __________.
Question
________________________________takes place in more than one state or country and involves ongoing criminal enterprise groups whose ultimate purpose is personal economic gain through illegitimate means.
Question
There are three major types of Internet securities fraud: market manipulation,fraudulent offerings of securities,and _________________.
Question
Information technology (IT)is the key to the _______ system and is responsible for creating the globalization phenomenon.

A)business
B)Internet
C)economic
D)social
Question
Some cyber criminals are less motivated by profit than they are by the urge to commit ______________.Such criminals aim their malicious attacks at disrupting,defacing,and destroying technology that they find offensive.
Question
Which is viewed by the offender as a criminal benefit of cyber theft?

A)It offers the luxury of anonymity.
B)It offers far less competition from other thieves.
C)It offers the assurance of a light sentence if arrested and convicted.
D)It offers the assurance of non-arrest.
Question
_______ refers to cyber offenders who illegally obtain software and then "rip" or "crack" its copyright protection before posting it on the Internet for members of the group to use.
Question
______________ are malicious aggressors who seek implicit or explicit pleasure or profit through the mistreatment of other individuals.Instead of using their physical power,the power differential of these offenders may simply stem from their net proficiency.
Question
_________________ occurs when a person uses the Internet to steal someone's identity and/or impersonate the victim to open a new credit card account or conduct some other financial transaction.
Question
___________________ is induced by force,fraud,or coercion and facilitated by social problems and disorder,such as disruptions in the global economy,war and social unrest.
Question
Which of the following statements best reflects cybercrime?

A)As information technology evolves cyber criminals are increasingly replacing non-cyber offenders.
B)Innovation brings change and with it new opportunities to commit crime.
C)Despite the rapid evolution of cyber crime the justice system has managed to keep pace.
D)Cyber criminals have likely reached the height of innovation in terms of discovering new methods to commit crime via information technology.
Question
_____________ involves the creation of false e-mails and/or websites that look legitimate but are designed to gain illegal access to a victim's personal information.
Question
Computer viruses and worms are types of __________.
Question
The ___________________________is the first international treaty that addresses the definition and enforcement of cyber crime and focuses on improving investigative techniques and increasing cooperation among nations.
Question
Cybercrime presents a compelling challenge for the justice system and law enforcement community.What statement is false with regard to such challenges?

A)Cybercrimeis rapidly evolving with new schemes being created daily.
B)Cybercrime is difficult to detect through traditional law enforcement channels.
C)Cybercrime's control demands that agents of the justice system develop technical skills that match those of the perpetrators.
D)Cybercrime necessitates a lighter sentence due to limited state and federal laws.
Question
__________________ is aimed at undermining the social,economic,and political system of an enemy nation by destroying its electronic infrastructure and disrupting its economy.
Question
Not all instances of computer theft and fraud fall under common-law statues because the property stolen:

A)may be difficult to recover
B)may be intangible
C)may be difficult to identify
D)may be shipped overseas
Question
A _______________ is a program that is secretly attached to a computer system,monitors the network's work output,and waits for a particular signal such as a date to appear and then deletes or corrupts data.

A)virus
B)Trojan horse
C)logic bomb
D)worm
Question
What is the difference between a Trojan horse and a virus?

A)Trojan horses are benign applications.
B)Trojan horses do not replicate themselves.
C)Trojan horses are not as destructive.
D)Trojan horses can penetrate firewalls.
Question
What is not a common phishing scam?

A)Account verification scams where the victim is directed to a bogus website by clicking the legitimate-looking address.
B)The Nigerian 419 scam where an alleged representative of a foreign government asking the victim to help move money from one account to another.
C)Free credit report through Experian,TransUnion and Equifax.
D)An e-mail is received about a free gift or prize that requires the victim to send their credit card info to take care of shipping and handling.
Question
Cybervandals have developed a new form of "entertainment" called _____________ in which they call 911 and fake an emergency that draws a response from law enforcement in the form of special tactical teams.

A)e-hooking
B)e-tailing
C)vishing
D)swatting
Question
Identify theft is a type of cyber crime that has grown at surprising rates over the past few years.What statement is not true?

A)Identity theft can destroy a person's life by manipulating credit records or stealing from their bank accounts.
B)Opening new lines of credit is the most common goals of credit card thieves.
C)Some identity theft schemes are extremely elaborate.
D)Much is known about the extent of identity theft.
Question
Those who illegally obtain software and then "crack" or "rip" its copyright protections,before posting it on the Internet for other members of the group to use are engaging in:

A)mousetrapping
B)spamming
C)e-tailing
D)warez
Question
What "industry" has been particularly vulnerable to denial of service attacks?

A)financial institutions
B)nuclear power plants
C)online gambling casinos
D)defense industry manufacturers
Question
According to the U.S.Criminal Code,what is the penalty for a first-time offender who allows Internet users to download music and other copyrighted material without paying the artists and record producers their rightful royalties?

A)A fine of $25,000
B)A year in prison and a $10,000 fine
C)Five year prison term and a $250,000 fine
D)Five year incarceration term or a $500,000 fine
Question
What cyber crime involves failure to deliver on promised purchases or the substitution of cheaper or used material for higher quality purchases?

A)phishing
B)e-tailing
C)spamming
D)mousetrapping
Question
Attempts to extort money from legitimate users of an Internet service by threatening to prevent the users from having access to the service is called:

A)denial-of-service
B)web defacement
C)cyber terrorism
D)cyber vandalism
Question
When an identity thief creates false e-mails and/or websites that look legitimate but are designed to gain illegal access to a victim's personal information,it is called:

A)spamming
B)phishing
C)mousetrapping
D)warez
Question
It is difficult to prosecute and control Internet pornography because:

A)federal legislation has been successfully challenged in the courts under the First Amendment
B)as soon as one website is shutdown another emerges to fill the gap
C)nearly all Internet porn sites are based in foreign countries
D)federal legislation has lagged behind the Internet porn industry
Question
What is the most common form of spam?

A)e-mail
B)instant messaging
C)mobile phone messaging
D)Usenet newsgroups
Question
Computer worms are similar to viruses except that they use computer networks or the Internet to do what?

A)remain dormant for longer periods of time
B)"rip" or "crack" security codes
C)crash websites
D)self-replicate
Question
This crime occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions:

A)illegal touting
B)fraudulent offerings
C)market manipulation
D)deceptive priming
Question
Cyber vandals are generally more motivated by what?

A)thrill
B)need
C)greed
D)malice
Question
Theft through the illegal reproduction and distribution of movies,software,games,and music,is estimated to cost U.S.industries __________ worldwide each year.

A)$20 billion
B)$5 billion
C)$519 million
D)$500 million
Question
When pornography websites send consumers to other sites involuntarily it is known in the industry as:

A)tripping
B)mousetrapping
C)slagging
D)ping-ponging
Question
Website damage or defacement is a type of:

A)cyber vandalism
B)cyber terrorism
C)cyber espionage
D)cyber theft
Question
The premeditated,politically motivated attack against information,computer systems,computer programs,and data that result in violence against noncombatant targets by subnational groups or clandestine agents is termed:

A)cyber espionage
B)cyber spying
C)cyber terrorism
D)cyber botnetting
Question
Cyber bullying is the willful and repeated harm inflicted through the medium of electronic text.While traditional bullying involves a physical power differential between the victim and offender,cyber bullying involves:

A)an online power differential
B)a cyber spying power differential
C)a social power differential
D)Cyber bullying involves all these differentials.
Question
When referring to the Racketeer Influenced and Corrupt Organization Act,which is accurate?

A)RICO contains only federally defined crimes.
B)RICO contains only state defined crimes.
C)RICO provides sanctions of 20 years in prison and a $25,000 fine.
D)RICO created new categories of crimes with sanctions of life imprisonment.
Question
What cyber crime has been committed when a person illegally uses the Internet to gather information that is considered private and confidential?

A)cyber terrorism
B)cyber spying
C)cyber stalking
D)cyber theft
Question
Which of the following is inaccurate with regard to the decline of Mafia power?

A)Reigning family heads are quite old.
B)The code of silence in now regularly broken by younger members.
C)Emerging ethnic gangs want to muscle in on traditional syndicate activities.
D)Younger members are not as educated as earlier generations.
Question
Under what circumstance can spam become a crime?

A)when it causes emotional distress to a victim
B)when it involves pornography
C)when it causes serious harm to a computer or network
D)when it involves an organized group of spammers
Question
Cybercrime is a new breed of offenses that involves the theft and/or destruction of information,resources,or funds utilizing computers,computer networks,or the Internet.
Question
What type of threat is represented by Titan Rain?

A)a cyber fraud threat
B)a cyber terrorism threat
C)a cyber espionage threat
D)Titan Rain does not represent a threat,it is security software
Question
Congress has treated computer-related crime as a distinct federal offense since the passage of the Counterfeit Access Device and Computer Fraud and Abuse Law in what year?

A)1974
B)1984
C)1996
D)1998
Question
Cybervandalism is motivated more by profit than a cyber criminals urge to seek revenge.
Question
Cyber terrorism may be a handy battlefield for terrorists because it can strike directly at what target that bombs will not effect?

A)the economy of an enemy
B)the defense infrastructure of an enemy
C)the hearts and minds of the citizens of an enemy
D)the energy infrastructure of an enemy
Question
Because cyber crime is essentially global,international cooperation is required for its control.Which of the following reflects this fact?

A)the International Information Infrastructure Protection Act
B)the Family Entertainment and Copyright Act
C)the Convention on Cybercrime
D)the Digital Millennium Copyright Act
Question
Internet securities fraud involves using the Internet to intentionally manipulate the securities marketplace for profit.
Question
It is believed that most organized crime income comes from narcotics distribution,internet pornography,and:

A)charitable funds
B)terrorism
C)human trafficking
D)labor unions
Question
Tricking others into harassing or threatening a victim by impersonating the victim on Internet bulletin boards and/or chat rooms is a type of:

A)federal offense
B)cyber terrorism
C)cyber stalking
D)e-tailing
Question
The widespread use of computers and the Internet has ushered in the age of IT in most industrialized societies.
Question
Indications are that the traditional organized crime syndicates are:

A)thriving and gaining "membership"
B)eroding and in decline
C)maintaining stability but only in large city "territories"
D)virtually nonexistent having been replaced by newer ethnic gangs
Question
The Convention on Cybercrime is the first international treaty that addresses the definition and enforcement of cyber crime.Which of the following is not inclusive of the treaty?

A)It focuses on improving investigative techniques and increasing cooperation among nations.
B)It includes a list of crimes that each signatory state must incorporate into their own law.
C)It limits law enforcement agencies' power by protecting Internet service providers from having to monitor people's online viewing habits.
D)It requires signatory states to cooperate whenever possible in the investigations and prosecution of cyber criminals.
Question
What is not a characteristic of transnational organize crime?

A)It is usually structured along hierarchical lines
B)Transnational organized crime has economic gain as its primary goal
C)Transnational criminal syndicates employ predatory tactics
D)Syndicates only provide illegal materials and do not engage in laundering money.
Question
File sharing is a type of illegal copyright infringement that allows users to download music and other copyrighted materials without paying royalties to the copyright holder.
Question
E-tailing is Internet jargon for the crime of cyber stalking.
Question
Define cyber crime.Explain why it is such an important concern in today's global economy.
Question
The younger generation of mob leaders stepping in to take control of the families seem to lack the skill and leadership of the older bosses.
Question
A turning point in the development of organized gangs occurred on when the Eighteenth Amendment to the U.S.Constitution was ratified prohibiting the sale manufacture,and transportation of intoxicating liquor.
Question
Commercial cyberspies target upcoming bids,customer lists,product designs,software source code,voice mail messages,and confidential e-mail messages.
Question
Cyber terrorism has been called "an effort by covert forces to disrupt the intersection where the virtual electronic reality of computers meets the physical world." Explain what this means and we should be concerned about cyber terrorism.
Question
The three main categories of cybercrime are cybertheft,cybervandalism,and cyberterrorism.Examine these categories of cyber crimes.
Question
The most typical use of cyberspace for destructive intent comes in the sending or implanting of disruptive programs.Compare and contrast each type of malware.
Question
Compare the relationship between identity theft and phishing ?
Question
The Convention on Cybercrime is an international treaty that addresses the definition and enforcement of transnational crime groups.
Question
A logic bomb,also called slag code,is a type of delayed-action virus that may be set off when a program user makes certain input that sets the slag code in motion.
Question
Provide some historical perspective on the evolution of organized crime and reasons for its decline in recent history.
Question
Define cyber-spying and discuss the motivations by those who engage in this behavior.
Question
Discuss transnational organized crime.What is its primary goal is and how it is achieved?
Question
Discuss the at least three legal and/or enforcement efforts implemented to control cybercrime.
Question
While cybercrime has been pervasive and rapidly evolving,law enforcement agencies at the federal,state,and local levels have managed to keep a step ahead of cyber offenders.
Question
Define illegal copyright infringement.Evaluate copyright infringement in its several forms.
Question
As a source of income for transnational organized crime,human traffickers import up to 50,000 women and children every year into the United States.
Question
Terrorist organizations are beginning to understand the power that cyber crime can inflict on their enemies even though,ironically,they may come from a region where the Internet is not widely used.
Question
Phishing is also known as spoofing and is defined as creating false e-mails or websites that look legitimate but are designed to gain illegal access to a victim's personal information.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Crimes of the New Millennium
1
__________________ refers to the use of the Internet,e-mail,or other electronic communication devices to pursue,harass,or threaten another person.
Cyberstalking
2
________________ encompasses offenses that can be singular or ongoing but typically involves the theft and/or destruction of information,resources,or funds utilizing computers,computer networks,and the Internet.
Cybercrime
3
Cybercrime is defined as:

A)a type of white-collar crime
B)a type of organized crime
C)a type of enterprise crime
D)a type of Internet crime
C
4
__________________ can be viewed as an effort by covert forces to undermine the social,economic,and political systems of an enemy nation by destroying its electronic infrastructure and disrupting its economy.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
Illegally using the Internet to gather information considered private and confidential,whether by an estranged spouse or a foreign business competitor,is termed __________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
________________________________takes place in more than one state or country and involves ongoing criminal enterprise groups whose ultimate purpose is personal economic gain through illegitimate means.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
There are three major types of Internet securities fraud: market manipulation,fraudulent offerings of securities,and _________________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
Information technology (IT)is the key to the _______ system and is responsible for creating the globalization phenomenon.

A)business
B)Internet
C)economic
D)social
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
Some cyber criminals are less motivated by profit than they are by the urge to commit ______________.Such criminals aim their malicious attacks at disrupting,defacing,and destroying technology that they find offensive.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
Which is viewed by the offender as a criminal benefit of cyber theft?

A)It offers the luxury of anonymity.
B)It offers far less competition from other thieves.
C)It offers the assurance of a light sentence if arrested and convicted.
D)It offers the assurance of non-arrest.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
_______ refers to cyber offenders who illegally obtain software and then "rip" or "crack" its copyright protection before posting it on the Internet for members of the group to use.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
______________ are malicious aggressors who seek implicit or explicit pleasure or profit through the mistreatment of other individuals.Instead of using their physical power,the power differential of these offenders may simply stem from their net proficiency.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
_________________ occurs when a person uses the Internet to steal someone's identity and/or impersonate the victim to open a new credit card account or conduct some other financial transaction.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
___________________ is induced by force,fraud,or coercion and facilitated by social problems and disorder,such as disruptions in the global economy,war and social unrest.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following statements best reflects cybercrime?

A)As information technology evolves cyber criminals are increasingly replacing non-cyber offenders.
B)Innovation brings change and with it new opportunities to commit crime.
C)Despite the rapid evolution of cyber crime the justice system has managed to keep pace.
D)Cyber criminals have likely reached the height of innovation in terms of discovering new methods to commit crime via information technology.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
_____________ involves the creation of false e-mails and/or websites that look legitimate but are designed to gain illegal access to a victim's personal information.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
Computer viruses and worms are types of __________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
The ___________________________is the first international treaty that addresses the definition and enforcement of cyber crime and focuses on improving investigative techniques and increasing cooperation among nations.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
Cybercrime presents a compelling challenge for the justice system and law enforcement community.What statement is false with regard to such challenges?

A)Cybercrimeis rapidly evolving with new schemes being created daily.
B)Cybercrime is difficult to detect through traditional law enforcement channels.
C)Cybercrime's control demands that agents of the justice system develop technical skills that match those of the perpetrators.
D)Cybercrime necessitates a lighter sentence due to limited state and federal laws.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
__________________ is aimed at undermining the social,economic,and political system of an enemy nation by destroying its electronic infrastructure and disrupting its economy.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
Not all instances of computer theft and fraud fall under common-law statues because the property stolen:

A)may be difficult to recover
B)may be intangible
C)may be difficult to identify
D)may be shipped overseas
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
A _______________ is a program that is secretly attached to a computer system,monitors the network's work output,and waits for a particular signal such as a date to appear and then deletes or corrupts data.

A)virus
B)Trojan horse
C)logic bomb
D)worm
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
What is the difference between a Trojan horse and a virus?

A)Trojan horses are benign applications.
B)Trojan horses do not replicate themselves.
C)Trojan horses are not as destructive.
D)Trojan horses can penetrate firewalls.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
What is not a common phishing scam?

A)Account verification scams where the victim is directed to a bogus website by clicking the legitimate-looking address.
B)The Nigerian 419 scam where an alleged representative of a foreign government asking the victim to help move money from one account to another.
C)Free credit report through Experian,TransUnion and Equifax.
D)An e-mail is received about a free gift or prize that requires the victim to send their credit card info to take care of shipping and handling.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
Cybervandals have developed a new form of "entertainment" called _____________ in which they call 911 and fake an emergency that draws a response from law enforcement in the form of special tactical teams.

A)e-hooking
B)e-tailing
C)vishing
D)swatting
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
Identify theft is a type of cyber crime that has grown at surprising rates over the past few years.What statement is not true?

A)Identity theft can destroy a person's life by manipulating credit records or stealing from their bank accounts.
B)Opening new lines of credit is the most common goals of credit card thieves.
C)Some identity theft schemes are extremely elaborate.
D)Much is known about the extent of identity theft.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
Those who illegally obtain software and then "crack" or "rip" its copyright protections,before posting it on the Internet for other members of the group to use are engaging in:

A)mousetrapping
B)spamming
C)e-tailing
D)warez
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
What "industry" has been particularly vulnerable to denial of service attacks?

A)financial institutions
B)nuclear power plants
C)online gambling casinos
D)defense industry manufacturers
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
According to the U.S.Criminal Code,what is the penalty for a first-time offender who allows Internet users to download music and other copyrighted material without paying the artists and record producers their rightful royalties?

A)A fine of $25,000
B)A year in prison and a $10,000 fine
C)Five year prison term and a $250,000 fine
D)Five year incarceration term or a $500,000 fine
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
What cyber crime involves failure to deliver on promised purchases or the substitution of cheaper or used material for higher quality purchases?

A)phishing
B)e-tailing
C)spamming
D)mousetrapping
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
Attempts to extort money from legitimate users of an Internet service by threatening to prevent the users from having access to the service is called:

A)denial-of-service
B)web defacement
C)cyber terrorism
D)cyber vandalism
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
When an identity thief creates false e-mails and/or websites that look legitimate but are designed to gain illegal access to a victim's personal information,it is called:

A)spamming
B)phishing
C)mousetrapping
D)warez
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
It is difficult to prosecute and control Internet pornography because:

A)federal legislation has been successfully challenged in the courts under the First Amendment
B)as soon as one website is shutdown another emerges to fill the gap
C)nearly all Internet porn sites are based in foreign countries
D)federal legislation has lagged behind the Internet porn industry
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
What is the most common form of spam?

A)e-mail
B)instant messaging
C)mobile phone messaging
D)Usenet newsgroups
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
Computer worms are similar to viruses except that they use computer networks or the Internet to do what?

A)remain dormant for longer periods of time
B)"rip" or "crack" security codes
C)crash websites
D)self-replicate
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
This crime occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions:

A)illegal touting
B)fraudulent offerings
C)market manipulation
D)deceptive priming
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
Cyber vandals are generally more motivated by what?

A)thrill
B)need
C)greed
D)malice
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
Theft through the illegal reproduction and distribution of movies,software,games,and music,is estimated to cost U.S.industries __________ worldwide each year.

A)$20 billion
B)$5 billion
C)$519 million
D)$500 million
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
When pornography websites send consumers to other sites involuntarily it is known in the industry as:

A)tripping
B)mousetrapping
C)slagging
D)ping-ponging
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
Website damage or defacement is a type of:

A)cyber vandalism
B)cyber terrorism
C)cyber espionage
D)cyber theft
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
The premeditated,politically motivated attack against information,computer systems,computer programs,and data that result in violence against noncombatant targets by subnational groups or clandestine agents is termed:

A)cyber espionage
B)cyber spying
C)cyber terrorism
D)cyber botnetting
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
Cyber bullying is the willful and repeated harm inflicted through the medium of electronic text.While traditional bullying involves a physical power differential between the victim and offender,cyber bullying involves:

A)an online power differential
B)a cyber spying power differential
C)a social power differential
D)Cyber bullying involves all these differentials.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
When referring to the Racketeer Influenced and Corrupt Organization Act,which is accurate?

A)RICO contains only federally defined crimes.
B)RICO contains only state defined crimes.
C)RICO provides sanctions of 20 years in prison and a $25,000 fine.
D)RICO created new categories of crimes with sanctions of life imprisonment.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
What cyber crime has been committed when a person illegally uses the Internet to gather information that is considered private and confidential?

A)cyber terrorism
B)cyber spying
C)cyber stalking
D)cyber theft
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following is inaccurate with regard to the decline of Mafia power?

A)Reigning family heads are quite old.
B)The code of silence in now regularly broken by younger members.
C)Emerging ethnic gangs want to muscle in on traditional syndicate activities.
D)Younger members are not as educated as earlier generations.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
Under what circumstance can spam become a crime?

A)when it causes emotional distress to a victim
B)when it involves pornography
C)when it causes serious harm to a computer or network
D)when it involves an organized group of spammers
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
Cybercrime is a new breed of offenses that involves the theft and/or destruction of information,resources,or funds utilizing computers,computer networks,or the Internet.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
What type of threat is represented by Titan Rain?

A)a cyber fraud threat
B)a cyber terrorism threat
C)a cyber espionage threat
D)Titan Rain does not represent a threat,it is security software
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
Congress has treated computer-related crime as a distinct federal offense since the passage of the Counterfeit Access Device and Computer Fraud and Abuse Law in what year?

A)1974
B)1984
C)1996
D)1998
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
Cybervandalism is motivated more by profit than a cyber criminals urge to seek revenge.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
Cyber terrorism may be a handy battlefield for terrorists because it can strike directly at what target that bombs will not effect?

A)the economy of an enemy
B)the defense infrastructure of an enemy
C)the hearts and minds of the citizens of an enemy
D)the energy infrastructure of an enemy
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
Because cyber crime is essentially global,international cooperation is required for its control.Which of the following reflects this fact?

A)the International Information Infrastructure Protection Act
B)the Family Entertainment and Copyright Act
C)the Convention on Cybercrime
D)the Digital Millennium Copyright Act
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
Internet securities fraud involves using the Internet to intentionally manipulate the securities marketplace for profit.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
It is believed that most organized crime income comes from narcotics distribution,internet pornography,and:

A)charitable funds
B)terrorism
C)human trafficking
D)labor unions
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
Tricking others into harassing or threatening a victim by impersonating the victim on Internet bulletin boards and/or chat rooms is a type of:

A)federal offense
B)cyber terrorism
C)cyber stalking
D)e-tailing
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
The widespread use of computers and the Internet has ushered in the age of IT in most industrialized societies.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
Indications are that the traditional organized crime syndicates are:

A)thriving and gaining "membership"
B)eroding and in decline
C)maintaining stability but only in large city "territories"
D)virtually nonexistent having been replaced by newer ethnic gangs
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
The Convention on Cybercrime is the first international treaty that addresses the definition and enforcement of cyber crime.Which of the following is not inclusive of the treaty?

A)It focuses on improving investigative techniques and increasing cooperation among nations.
B)It includes a list of crimes that each signatory state must incorporate into their own law.
C)It limits law enforcement agencies' power by protecting Internet service providers from having to monitor people's online viewing habits.
D)It requires signatory states to cooperate whenever possible in the investigations and prosecution of cyber criminals.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
What is not a characteristic of transnational organize crime?

A)It is usually structured along hierarchical lines
B)Transnational organized crime has economic gain as its primary goal
C)Transnational criminal syndicates employ predatory tactics
D)Syndicates only provide illegal materials and do not engage in laundering money.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
File sharing is a type of illegal copyright infringement that allows users to download music and other copyrighted materials without paying royalties to the copyright holder.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
E-tailing is Internet jargon for the crime of cyber stalking.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
Define cyber crime.Explain why it is such an important concern in today's global economy.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
The younger generation of mob leaders stepping in to take control of the families seem to lack the skill and leadership of the older bosses.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
A turning point in the development of organized gangs occurred on when the Eighteenth Amendment to the U.S.Constitution was ratified prohibiting the sale manufacture,and transportation of intoxicating liquor.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
Commercial cyberspies target upcoming bids,customer lists,product designs,software source code,voice mail messages,and confidential e-mail messages.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
Cyber terrorism has been called "an effort by covert forces to disrupt the intersection where the virtual electronic reality of computers meets the physical world." Explain what this means and we should be concerned about cyber terrorism.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
The three main categories of cybercrime are cybertheft,cybervandalism,and cyberterrorism.Examine these categories of cyber crimes.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
The most typical use of cyberspace for destructive intent comes in the sending or implanting of disruptive programs.Compare and contrast each type of malware.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
Compare the relationship between identity theft and phishing ?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
The Convention on Cybercrime is an international treaty that addresses the definition and enforcement of transnational crime groups.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
A logic bomb,also called slag code,is a type of delayed-action virus that may be set off when a program user makes certain input that sets the slag code in motion.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
Provide some historical perspective on the evolution of organized crime and reasons for its decline in recent history.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
Define cyber-spying and discuss the motivations by those who engage in this behavior.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
Discuss transnational organized crime.What is its primary goal is and how it is achieved?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
Discuss the at least three legal and/or enforcement efforts implemented to control cybercrime.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
While cybercrime has been pervasive and rapidly evolving,law enforcement agencies at the federal,state,and local levels have managed to keep a step ahead of cyber offenders.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
Define illegal copyright infringement.Evaluate copyright infringement in its several forms.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
As a source of income for transnational organized crime,human traffickers import up to 50,000 women and children every year into the United States.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
Terrorist organizations are beginning to understand the power that cyber crime can inflict on their enemies even though,ironically,they may come from a region where the Internet is not widely used.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
Phishing is also known as spoofing and is defined as creating false e-mails or websites that look legitimate but are designed to gain illegal access to a victim's personal information.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 80 flashcards in this deck.