Deck 3: Traditional Computer Crime: Early Hackers and Theft of Components

Full screen (f)
exit full mode
Question
Originally, members of the Legion of Doom (LoD) were ________.

A) phreakers
B) crackers
C) cyberpunks
D) hacktivists
Use Space or
up arrow
down arrow
to flip the card.
Question
What was the Illuminati?

A) a board owned and operated by Steve Jackson Games
B) a destructive program that crippled over 6,000 computers in 1988
C) a military database containing sensitive information
D) an organization pointing out security flaws in institutional systems
Question
________ was the most infamous of all hackers and has been the subject of numerous books and movies.

A) Kevin Mitnick
B) Kevin Poulsen
C) Prophet
D) Urvile
Question
What motivates pure hackers to steal information?

A) political need
B) intellectual challenge
C) sexual gratification
D) economic desire
Question
Which of the following is the least destructive category of hackers?

A) technological thrill seekers
B) insiders
C) informational voyeurs
D) hacktivists
Question
What can the exponential increase in online harassment, stock manipulation, and child pornography be attributed to?

A) the introduction of cloud computing
B) the increase in international guidelines for cyberactivity
C) the increase in academic knowledge
D) the increase in anonymous e-mail accounts and remailers
Question
Which was the first event to signal the potential of computer crime?

A) the crash of AT&T
B) the destruction caused by the Morris worm
C) the hacking of the MILNET system
D) the victimization of Michigan Bell
Question
The theft and resale of which computer component has proven to be the most lucrative?

A) CPUs
B) motherboards
C) integrated chips
D) serial ports
Question
Which of the following qualifies as social engineering?

A) the illegal copying and distribution of a newly released theatrical film
B) a brute force search for an employee's password
C) befriending a company's cleaning crew to gain access to rooms and buildings
D) using an anonymizer to conduct hard-to-track Internet searches
Question
Which of the following is true of the infamous hacking board Plovernet?

A) It went online in March 1980.
B) It was a breeding ground for hacking groups like LoD.
C) It was responsible for the hacking of the Los Alamos military computers in 1982.
D) It was originally formed in Bonn, Germany.
Question
________ are designed to strip the source-address information from e-mail messages.

A) Copper boxes
B) Anonymizers
C) Ethercards
D) Integrated chips
Question
________ hat hackers are individuals who identify and exploit system vulnerabilities for nefarious purposes.

A) White
B) Blue
C) Gray
D) Black
Question
Which of the following is a factor that leads many individual users of the Internet to assume that their identities are safely protected?

A) the dearth of interjurisdictional communication
B) the difficulty in using modern communication technology
C) the lack of opportunity to engage in computer crime
D) the global acceptance of First Amendment rights
Question
Which of the following hacking-related developments occurred after the year 2000?

A) the release of the Morris worm
B) Kevin Poulsen's exploitation of the telecom system to "win" a Porsche
C) the introduction of commercially available security products
D) the emergence of identity theft as an issue for consumers
Question
________ are the least sophisticated of all cybercriminals.

A) Script kiddies
B) Cyberpunks
C) Cybercriminal organizations
D) Crackers
Question
Who was directly responsible for the downfall of LoD?

A) Control-C
B) Fry Guy
C) Robert Morris
D) Silver Spy
Question
Which of the following is NOT one of the primary motivations for computer intrusion in contemporary society?

A) revenge
B) political motives
C) to benefit others
D) boredom
Question
Which of the following hacking-related developments occurred during the 1990s?

A) Robert Morris releases his worm on the Internet, and is indicted under newly passed legislation.
B) Commercially available security products are introduced.
C) Phreakers emerge, costing AT&T a fortune in uncollected long-distance charges.
D) A dramatic increase in hacktivism occurs.
Question
Which of the following is NOT a general category of computer crime?

A) targets
B) means
C) vicinage
D) incidentals
Question
Which of the following does NOT accurately describe the Secret Service actions that prompted the seminal court case Steve Jackson Games, Inc.v.U.S.Secret Service et al.?

A) The Secret Service used a DDoS attack to infiltrate and sabotage the company's operations.
B) Agents executed an unsigned search warrant.
C) Agents used Gestapo-like tactics by seizing virtually everything, including business records, private electronic mail, and the drafts of forthcoming games.
D) The Secret Service promoted the unfounded view that the bulletin board was a medium for the exchange of hacking information.
Question
The increase in anonymous e-mail accounts and remailers has intensified incidences of online harassment, stock manipulation, and child pornography.
Question
The term "hacking" was introduced at MIT in the 1980s.
Question
Computer thieves have traditionally been able to market their stolen goods as legitimate.
Question
Which of the following groups does NOT figure in the multilateral film privacy strategy of the Chinese Triads?

A) privacy pressers
B) hacktivists
C) piracy burners
D) runners
Question
Like traditional communication carriers, Internet service providers are required to maintain transmission records.
Question
________ acknowledge(s) the futility of trying to stop people from copying software and instead relies on people's honesty.

A) Shareware
B) WareZ sites
C) Parallel imports
D) Broadcast piracy
Question
The issue of vicinage has been simplified by the lack of international guidelines for cyberactivity.
Question
The term cybercriminal organizations does not include traditional organized crime syndicates.
Question
________ can be defined as the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.

A) Signal theft
B) Theatrical print theft
C) Data piracy
D) Parallel imports
Question
Insiders pose the most overrated danger to informational security.
Question
Which of the following is NOT a method of film piracy?

A) broadcast piracy
B) public performances
C) parallel imports
D) software development
Question
What is the primary reason that the resale of integrated chips is so lucrative?

A) increase of legitimate global marketplaces
B) ease in manipulation
C) magnitude of computer transactions
D) the basic law of supply and demand
Question
Activities like the theft of computer hardware and the infringement of software copyrights have become unpopular as computer components become smaller and more valuable.
Question
Blue boxes were extremely popular among college dorms and were widely considered harmless by users.
Question
Traditional hacker culture was characterized by an antiestablishment rhetoric.
Question
Hackers, irrespective of national origin, display startling similarities.
Question
Shareware publishers encourage users to give copies of programs to friends and colleagues but ask everyone who uses a program regularly to pay a registration fee to the program's author directly.
Question
Not all crimes involving computers can be characterized as "computer crime."
Question
Fry Guy and the Atlanta Three were directly responsible for the downfall of the Legion of Doom (LoD).
Question
According to accomplished phreakers, the theft of telephone access codes requires great technical expertise.
Question
Describe the five general categories of cybercriminals in today's society.
Question
________ are the most organized groups trafficking in stolen computer components.
Question
________ activities may range from snooping around neighbors' computers to searching the recesses of top-secret government databases.
Question
The ________ program exploited security holes in the Unix operating system, infecting 10 percent of all computers connected to the Internet.
Question
Law enforcement agencies should look to ________ and federal legislation to prosecute computer crimes in the absence of technology-specific legislation.
Question
________ is the term use by law enforcement authorities to categorize those involved in vandalism, destructive programs, and general mischief for no economic gain.
Question
The promise of anonymity coupled with the dearth of ________ encourages deviant activity.
Question
In hacking activities, one computer provides the ________ for the criminal activity, while another serves as the target.
Question
List and describe the primary motivations for computer intrusion or theft of information in contemporary society.
The answer should include the following points:
National origin, ideology, or demographics aside, there appear to be six primary motivations for computer intrusion or theft of information in contemporary society:
-Boredom
-Intellectual challenge (mining for knowledge-pure hackers)
-Revenge (insiders, disgruntled employees, etc.)
-Sexual gratification (stalking, harassment, etc.)
-Economic (criminals)
-Political (hacktivists, terrorists, spies, etc.)
Question
Many members of the ________ were not malicious or criminal minded and proclaimed themselves as public servants, pointing out security flaws in institutional systems so that repairs would be made.
Question
________ are those individuals who have authorized or legitimate access to a computer system, but who exceed that authorization.
Question
Operations known as ________ involve prepaid calls being sold on the street using stolen access or PBX codes during operations.
Question
Traditionally, criminal statutes were predicated on the ________ of the criminal act.
Question
________ refers to the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.
Question
Briefly discuss the three incidents of the 1980s that exposed the vulnerability of data systems and outlined potential repercussions for national security.
Question
________ were devices which "tricked" switching systems into granting free access to long-distance lines.
Question
________ involves the manipulation of telecommunications carriers to gain knowledge of telecommunications, and/or theft of applicable services.
Question
________ sites enable visitors to download software illegally in violation of copyright protections.
Question
Differentiate between traditional crime and computer crime.
Question
Discuss what can be done to apprehend/prevent computer-related crime.
Question
Match between columns
Script kiddies
are the lowest life form of cybercriminal
Script kiddies
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Script kiddies
target data which is valuable on its face
Script kiddies
routinely held conferences to discuss their exploits and successes
Script kiddies
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Cybercriminal organizations
are the lowest life form of cybercriminal
Cybercriminal organizations
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Cybercriminal organizations
target data which is valuable on its face
Cybercriminal organizations
routinely held conferences to discuss their exploits and successes
Cybercriminal organizations
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Phreakers
are the lowest life form of cybercriminal
Phreakers
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Phreakers
target data which is valuable on its face
Phreakers
routinely held conferences to discuss their exploits and successes
Phreakers
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Cyberpunks
are the lowest life form of cybercriminal
Cyberpunks
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Cyberpunks
target data which is valuable on its face
Cyberpunks
routinely held conferences to discuss their exploits and successes
Cyberpunks
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Crackers
are the lowest life form of cybercriminal
Crackers
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Crackers
target data which is valuable on its face
Crackers
routinely held conferences to discuss their exploits and successes
Crackers
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Question
Match between columns
The epitome of sophisticated international hacking, originally formed in Gemmany
Legion of Doom
The epitome of sophisticated international hacking, originally formed in Gemmany
8BBS
The epitome of sophisticated international hacking, originally formed in Gemmany
Plovernet
The epitome of sophisticated international hacking, originally formed in Gemmany
ALTOS
The epitome of sophisticated international hacking, originally formed in Gemmany
414 Private
East Coast hacking board that became a breeding ground for hacking groups
Legion of Doom
East Coast hacking board that became a breeding ground for hacking groups
8BBS
East Coast hacking board that became a breeding ground for hacking groups
Plovernet
East Coast hacking board that became a breeding ground for hacking groups
ALTOS
East Coast hacking board that became a breeding ground for hacking groups
414 Private
One of the first hacking boards, popular on the West Coast
Legion of Doom
One of the first hacking boards, popular on the West Coast
8BBS
One of the first hacking boards, popular on the West Coast
Plovernet
One of the first hacking boards, popular on the West Coast
ALTOS
One of the first hacking boards, popular on the West Coast
414 Private
The most notable early hacking group
Legion of Doom
The most notable early hacking group
8BBS
The most notable early hacking group
Plovernet
The most notable early hacking group
ALTOS
The most notable early hacking group
414 Private
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
Legion of Doom
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
8BBS
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
Plovernet
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
ALTOS
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
414 Private
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/62
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Traditional Computer Crime: Early Hackers and Theft of Components
1
Originally, members of the Legion of Doom (LoD) were ________.

A) phreakers
B) crackers
C) cyberpunks
D) hacktivists
A
2
What was the Illuminati?

A) a board owned and operated by Steve Jackson Games
B) a destructive program that crippled over 6,000 computers in 1988
C) a military database containing sensitive information
D) an organization pointing out security flaws in institutional systems
A
3
________ was the most infamous of all hackers and has been the subject of numerous books and movies.

A) Kevin Mitnick
B) Kevin Poulsen
C) Prophet
D) Urvile
A
4
What motivates pure hackers to steal information?

A) political need
B) intellectual challenge
C) sexual gratification
D) economic desire
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is the least destructive category of hackers?

A) technological thrill seekers
B) insiders
C) informational voyeurs
D) hacktivists
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
6
What can the exponential increase in online harassment, stock manipulation, and child pornography be attributed to?

A) the introduction of cloud computing
B) the increase in international guidelines for cyberactivity
C) the increase in academic knowledge
D) the increase in anonymous e-mail accounts and remailers
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
7
Which was the first event to signal the potential of computer crime?

A) the crash of AT&T
B) the destruction caused by the Morris worm
C) the hacking of the MILNET system
D) the victimization of Michigan Bell
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
8
The theft and resale of which computer component has proven to be the most lucrative?

A) CPUs
B) motherboards
C) integrated chips
D) serial ports
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following qualifies as social engineering?

A) the illegal copying and distribution of a newly released theatrical film
B) a brute force search for an employee's password
C) befriending a company's cleaning crew to gain access to rooms and buildings
D) using an anonymizer to conduct hard-to-track Internet searches
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is true of the infamous hacking board Plovernet?

A) It went online in March 1980.
B) It was a breeding ground for hacking groups like LoD.
C) It was responsible for the hacking of the Los Alamos military computers in 1982.
D) It was originally formed in Bonn, Germany.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
11
________ are designed to strip the source-address information from e-mail messages.

A) Copper boxes
B) Anonymizers
C) Ethercards
D) Integrated chips
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
12
________ hat hackers are individuals who identify and exploit system vulnerabilities for nefarious purposes.

A) White
B) Blue
C) Gray
D) Black
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is a factor that leads many individual users of the Internet to assume that their identities are safely protected?

A) the dearth of interjurisdictional communication
B) the difficulty in using modern communication technology
C) the lack of opportunity to engage in computer crime
D) the global acceptance of First Amendment rights
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following hacking-related developments occurred after the year 2000?

A) the release of the Morris worm
B) Kevin Poulsen's exploitation of the telecom system to "win" a Porsche
C) the introduction of commercially available security products
D) the emergence of identity theft as an issue for consumers
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
15
________ are the least sophisticated of all cybercriminals.

A) Script kiddies
B) Cyberpunks
C) Cybercriminal organizations
D) Crackers
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
16
Who was directly responsible for the downfall of LoD?

A) Control-C
B) Fry Guy
C) Robert Morris
D) Silver Spy
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is NOT one of the primary motivations for computer intrusion in contemporary society?

A) revenge
B) political motives
C) to benefit others
D) boredom
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following hacking-related developments occurred during the 1990s?

A) Robert Morris releases his worm on the Internet, and is indicted under newly passed legislation.
B) Commercially available security products are introduced.
C) Phreakers emerge, costing AT&T a fortune in uncollected long-distance charges.
D) A dramatic increase in hacktivism occurs.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is NOT a general category of computer crime?

A) targets
B) means
C) vicinage
D) incidentals
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following does NOT accurately describe the Secret Service actions that prompted the seminal court case Steve Jackson Games, Inc.v.U.S.Secret Service et al.?

A) The Secret Service used a DDoS attack to infiltrate and sabotage the company's operations.
B) Agents executed an unsigned search warrant.
C) Agents used Gestapo-like tactics by seizing virtually everything, including business records, private electronic mail, and the drafts of forthcoming games.
D) The Secret Service promoted the unfounded view that the bulletin board was a medium for the exchange of hacking information.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
21
The increase in anonymous e-mail accounts and remailers has intensified incidences of online harassment, stock manipulation, and child pornography.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
22
The term "hacking" was introduced at MIT in the 1980s.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
23
Computer thieves have traditionally been able to market their stolen goods as legitimate.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following groups does NOT figure in the multilateral film privacy strategy of the Chinese Triads?

A) privacy pressers
B) hacktivists
C) piracy burners
D) runners
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
25
Like traditional communication carriers, Internet service providers are required to maintain transmission records.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
26
________ acknowledge(s) the futility of trying to stop people from copying software and instead relies on people's honesty.

A) Shareware
B) WareZ sites
C) Parallel imports
D) Broadcast piracy
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
27
The issue of vicinage has been simplified by the lack of international guidelines for cyberactivity.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
28
The term cybercriminal organizations does not include traditional organized crime syndicates.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
29
________ can be defined as the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.

A) Signal theft
B) Theatrical print theft
C) Data piracy
D) Parallel imports
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
30
Insiders pose the most overrated danger to informational security.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is NOT a method of film piracy?

A) broadcast piracy
B) public performances
C) parallel imports
D) software development
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
32
What is the primary reason that the resale of integrated chips is so lucrative?

A) increase of legitimate global marketplaces
B) ease in manipulation
C) magnitude of computer transactions
D) the basic law of supply and demand
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
33
Activities like the theft of computer hardware and the infringement of software copyrights have become unpopular as computer components become smaller and more valuable.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
34
Blue boxes were extremely popular among college dorms and were widely considered harmless by users.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
35
Traditional hacker culture was characterized by an antiestablishment rhetoric.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
36
Hackers, irrespective of national origin, display startling similarities.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
37
Shareware publishers encourage users to give copies of programs to friends and colleagues but ask everyone who uses a program regularly to pay a registration fee to the program's author directly.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
38
Not all crimes involving computers can be characterized as "computer crime."
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
39
Fry Guy and the Atlanta Three were directly responsible for the downfall of the Legion of Doom (LoD).
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
40
According to accomplished phreakers, the theft of telephone access codes requires great technical expertise.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
41
Describe the five general categories of cybercriminals in today's society.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
42
________ are the most organized groups trafficking in stolen computer components.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
43
________ activities may range from snooping around neighbors' computers to searching the recesses of top-secret government databases.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
44
The ________ program exploited security holes in the Unix operating system, infecting 10 percent of all computers connected to the Internet.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
45
Law enforcement agencies should look to ________ and federal legislation to prosecute computer crimes in the absence of technology-specific legislation.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
46
________ is the term use by law enforcement authorities to categorize those involved in vandalism, destructive programs, and general mischief for no economic gain.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
47
The promise of anonymity coupled with the dearth of ________ encourages deviant activity.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
48
In hacking activities, one computer provides the ________ for the criminal activity, while another serves as the target.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
49
List and describe the primary motivations for computer intrusion or theft of information in contemporary society.
The answer should include the following points:
National origin, ideology, or demographics aside, there appear to be six primary motivations for computer intrusion or theft of information in contemporary society:
-Boredom
-Intellectual challenge (mining for knowledge-pure hackers)
-Revenge (insiders, disgruntled employees, etc.)
-Sexual gratification (stalking, harassment, etc.)
-Economic (criminals)
-Political (hacktivists, terrorists, spies, etc.)
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
50
Many members of the ________ were not malicious or criminal minded and proclaimed themselves as public servants, pointing out security flaws in institutional systems so that repairs would be made.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
51
________ are those individuals who have authorized or legitimate access to a computer system, but who exceed that authorization.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
52
Operations known as ________ involve prepaid calls being sold on the street using stolen access or PBX codes during operations.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
53
Traditionally, criminal statutes were predicated on the ________ of the criminal act.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
54
________ refers to the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
55
Briefly discuss the three incidents of the 1980s that exposed the vulnerability of data systems and outlined potential repercussions for national security.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
56
________ were devices which "tricked" switching systems into granting free access to long-distance lines.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
57
________ involves the manipulation of telecommunications carriers to gain knowledge of telecommunications, and/or theft of applicable services.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
58
________ sites enable visitors to download software illegally in violation of copyright protections.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
59
Differentiate between traditional crime and computer crime.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
60
Discuss what can be done to apprehend/prevent computer-related crime.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
61
Match between columns
Script kiddies
are the lowest life form of cybercriminal
Script kiddies
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Script kiddies
target data which is valuable on its face
Script kiddies
routinely held conferences to discuss their exploits and successes
Script kiddies
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Cybercriminal organizations
are the lowest life form of cybercriminal
Cybercriminal organizations
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Cybercriminal organizations
target data which is valuable on its face
Cybercriminal organizations
routinely held conferences to discuss their exploits and successes
Cybercriminal organizations
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Phreakers
are the lowest life form of cybercriminal
Phreakers
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Phreakers
target data which is valuable on its face
Phreakers
routinely held conferences to discuss their exploits and successes
Phreakers
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Cyberpunks
are the lowest life form of cybercriminal
Cyberpunks
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Cyberpunks
target data which is valuable on its face
Cyberpunks
routinely held conferences to discuss their exploits and successes
Cyberpunks
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Crackers
are the lowest life form of cybercriminal
Crackers
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Crackers
target data which is valuable on its face
Crackers
routinely held conferences to discuss their exploits and successes
Crackers
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
62
Match between columns
The epitome of sophisticated international hacking, originally formed in Gemmany
Legion of Doom
The epitome of sophisticated international hacking, originally formed in Gemmany
8BBS
The epitome of sophisticated international hacking, originally formed in Gemmany
Plovernet
The epitome of sophisticated international hacking, originally formed in Gemmany
ALTOS
The epitome of sophisticated international hacking, originally formed in Gemmany
414 Private
East Coast hacking board that became a breeding ground for hacking groups
Legion of Doom
East Coast hacking board that became a breeding ground for hacking groups
8BBS
East Coast hacking board that became a breeding ground for hacking groups
Plovernet
East Coast hacking board that became a breeding ground for hacking groups
ALTOS
East Coast hacking board that became a breeding ground for hacking groups
414 Private
One of the first hacking boards, popular on the West Coast
Legion of Doom
One of the first hacking boards, popular on the West Coast
8BBS
One of the first hacking boards, popular on the West Coast
Plovernet
One of the first hacking boards, popular on the West Coast
ALTOS
One of the first hacking boards, popular on the West Coast
414 Private
The most notable early hacking group
Legion of Doom
The most notable early hacking group
8BBS
The most notable early hacking group
Plovernet
The most notable early hacking group
ALTOS
The most notable early hacking group
414 Private
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
Legion of Doom
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
8BBS
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
Plovernet
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
ALTOS
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
414 Private
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 62 flashcards in this deck.