Deck 15: Crimes of the New Millenium Cybercrime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/95
Play
Full screen (f)
Deck 15: Crimes of the New Millenium Cybercrime
1
_________ are software programs that have been illegally posted on the Internet for use by members of a group after the copyright protection has been "ripped" or "cracked."
"Warez"
2
There are three major types of Internet securities fraud: market manipulation, fraudulent offerings of securities, and __________________.
illegal touting
3
Attempts to flood a computer network, thereby preventing legitimate network traffic, is an example of cybercrime known as a ______________________.
denial-of-service-attack
4
__________________is a new breed of offenses typically involving the theft and/or destruction of information, resources, or funds utilizing computers, computer networks, or the Internet.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
5
A malicious software program is known as ______________.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
6
__________________is responsible for the globalization phenomenon or the process of creating transnational markets, politics, and legal systems-in other words, creating a global economy.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
7
Using cyberspace for acts of violence, including spying and disrupting an enemy's computer network is known as ___________________.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
8
_________ crimes are challenging for criminologists to explain because they defy long-held assumptions about the cause of crime.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
9
Trade secrets stolen by a company's competitors, which can be either domestic or foreign, is a form of computer crime known as _____________________.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
10
Malicious attacks aimed at disrupting, defacing, and destroying technology is known as ________________.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
11
_________________ is the illegal buying and/or selling of merchandise on the Internet.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
12
Using the Internet to steal someone's identity and/or impersonate the victim in order to conduct illicit transactions such as committing fraud using the victim's name is known as ______________.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
13
Using an electronic device or camera on an ATM that copies information from a bank card's magnetic strip whenever a customer uses the machine is an example of _________________.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
14
Sometimes called "c arding" or "brand spoofing," ____________ is a scam in which the perpetrator sends out e-mails that appear to come from legitimate Web ent erprises to gain personal information.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
15
Internet attacks against an enemy nation's technological infrastructure is known as __________________.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
16
To meet the increasing threat of phishing and identity theft, Congress passed the ___________ Act of 1998 (Identity Theft Act) to make it a federal crime.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
17
__________________ schemes range from illegally copying material under copyright protection to using technology to commit traditional theft-based offenses such as larceny and fraud.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
18
There are two principal forms of market manipulation, the ________________ and the "cybersmear."
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
19
The _________ phenomenon is the process of creating transnational markets, politics, and legal systems.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
20
Someone who collects and transfers money or goods acquired illegally and then transfers them to a third party is known as a _____________________.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
21
Using the Internet to gather information that is considered private and confidential, whether by an estranged spouse or a foreign business competitor, is termed __________________.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
22
A ________ is designed to harass or extort money from legitimate users of an Internet service by threatening to prevent the user from having access to the service.
A) Theft of service
B) Hijack-of-service attack
C) Denial-of-service attack
D) Cheating attack
A) Theft of service
B) Hijack-of-service attack
C) Denial-of-service attack
D) Cheating attack
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
23
Congress has treated computer-related crime as a distinct federal offense since the passage of what legislation?
A) the National Information Infrastructure Protection Act in 1996
B) the Counterfeit Access Device and Computer Fraud and Abuse Law in 1984
C) the Frank Abagnale Technology Act in 1998
D) the Identity Theft and Assumption Deterrence Act in 1998
A) the National Information Infrastructure Protection Act in 1996
B) the Counterfeit Access Device and Computer Fraud and Abuse Law in 1984
C) the Frank Abagnale Technology Act in 1998
D) the Identity Theft and Assumption Deterrence Act in 1998
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
24
This crime occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions:
A) illegal touting.
B) fraudulent offerings.
C) market manipulation.
D) deceptive priming.
A) illegal touting.
B) fraudulent offerings.
C) market manipulation.
D) deceptive priming.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
25
It is difficult to prosecute and control Internet pornography because:
A) Federal legislation has been successfully challenged in the courts under the First Amendment.
B) As soon as one Web site is shutdown, another emerges to fill the gap.
C) Nearly all Internet porn sites are based in foreign countries.
D) Federal legislation has lagged behind the Internet porn industry.
A) Federal legislation has been successfully challenged in the courts under the First Amendment.
B) As soon as one Web site is shutdown, another emerges to fill the gap.
C) Nearly all Internet porn sites are based in foreign countries.
D) Federal legislation has lagged behind the Internet porn industry.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following statements best reflects cybercrime?
A) As information technology evolves, cybercriminals are rapidly replacing non-cyber offenders.
B) Innovation brings change and, with it, new opportunities to commit crime.
C) Despite the rapid evolution of cybercrime, the justice system has managed to keep pace.
D) Cybercriminals have likely reached the height of innovation in terms of discovering new methods to commit crime via information technology.
A) As information technology evolves, cybercriminals are rapidly replacing non-cyber offenders.
B) Innovation brings change and, with it, new opportunities to commit crime.
C) Despite the rapid evolution of cybercrime, the justice system has managed to keep pace.
D) Cybercriminals have likely reached the height of innovation in terms of discovering new methods to commit crime via information technology.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
27
Which type of cybercrime consists of acts aimed at undermining the social, economic, and political system of an enemy nation?
A) cyberattack
B) cyberwar
C) cyberhack
D) cyberoffense
A) cyberattack
B) cyberwar
C) cyberhack
D) cyberoffense
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
28
Why do cybercrimes present a significant challenge for criminologists?
A) Because cybercrimes predominantly occur only in industrialized countries.
B) Because, unlike non-cyber crimes, cybercrimes defy accurate measurement.
C) Because cybercrimes defy long-held assumptions about the cause of crime.
D) Because cybercrimes are a function of the social environment.
A) Because cybercrimes predominantly occur only in industrialized countries.
B) Because, unlike non-cyber crimes, cybercrimes defy accurate measurement.
C) Because cybercrimes defy long-held assumptions about the cause of crime.
D) Because cybercrimes are a function of the social environment.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
29
Which type of offenses involves the perpetrator carefully skimming small sums from the balances of a large number of accounts in order to bypass internal controls and escape detection?
A) financial fraud
B) theft of information
C) salami fraud
D) software fraud
A) financial fraud
B) theft of information
C) salami fraud
D) software fraud
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
30
__________________________ is defined as willful and repeated harm inflicted through the medium of electronic text.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
31
Why do cybercrimes present a compelling challenge for the justice system and law enforcement community?
A) Cybercrime is rapidly evolving.
B) Cybercrime is difficult to detect through traditional law enforcement channels.
C) Cybercrime demands that agents of the justice system develop technical skills that match those of the perpetrators.
D) Cybercrime presents a compelling challenge for all these reasons.
A) Cybercrime is rapidly evolving.
B) Cybercrime is difficult to detect through traditional law enforcement channels.
C) Cybercrime demands that agents of the justice system develop technical skills that match those of the perpetrators.
D) Cybercrime presents a compelling challenge for all these reasons.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
32
Sharing files with friends who did not pay for them is an example of:
A) cyber copying.
B) cloning.
C) deceptive copying.
D) copyright infringement.
A) cyber copying.
B) cloning.
C) deceptive copying.
D) copyright infringement.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
33
Martha and Bo have been having a sexual affair at work, unknown to their respected spouses, and after gaining what she wanted from the relationship, Martha ended her affair. Bo, still seeking the attention of his lover, begins to track Martha's every move via Facebook, Twitter, and other social media accounts, as well as tracking her location through the GPS-monitoring systems of these media outlets. This would be an example of _____________________.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
34
Not all instances of computer theft and computer fraud fall under existing statues because the property stolen may be:
A) difficult to recover.
B) intangible.
C) difficult to identify.
D) shipped overseas.
A) difficult to recover.
B) intangible.
C) difficult to identify.
D) shipped overseas.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
35
Theft through the illegal reproduction and distribution of movies, software, games, and music, is estimated to cost U.S. industries _____ worldwide each year.
A) $ 20 billion
B) $35 billion
C) $ 93 billion
D) more than $100 billion
A) $ 20 billion
B) $35 billion
C) $ 93 billion
D) more than $100 billion
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
36
As the threat of terrorism and cybercrime grows, so too may tolerance for invasions of privacy to combat these threats. What belief may sway public opinion and justify the use of IT by law enforcement?
A) the belief that there is not much to fear from law enforcement's use of IT
B) the belief that IT increases safety and that intrusions into personal space are warranted if lives are saved
C) the belief that IT is not invading homes but gathering information from public spaces
D) all of the above
A) the belief that there is not much to fear from law enforcement's use of IT
B) the belief that IT increases safety and that intrusions into personal space are warranted if lives are saved
C) the belief that IT is not invading homes but gathering information from public spaces
D) all of the above
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
37
Some experts question the existence of __________________ and claim that hackers are regularly mistaken for terrorists.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
38
What are "cyber smears" and "pump and dumps?"
A) forms of illegal file sharing
B) forms of cyber stalking
C) forms of market manipulation
D) forms of denial-of-service attack
A) forms of illegal file sharing
B) forms of cyber stalking
C) forms of market manipulation
D) forms of denial-of-service attack
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
39
Information technology (IT) is the key to the _____ system and is responsible for creating the globalization phenomenon.
A) political
B) Internet
C) economic
D) social
A) political
B) Internet
C) economic
D) social
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
40
Computer ___________ are programs that attack computer networks (or the Internet) by self-replicating and sending themselves to other users, generally via e-mail, without the aid of the operator.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
41
Former Notre Dame linebacker Manti Te'o was a victim of what type of cyber act?
A) catfishing
B) hogging
C) noodling
D) trolling
A) catfishing
B) hogging
C) noodling
D) trolling
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
42
Cyberterrorism is more efficient and less dangerous than more traditional forms of terrorist activity because:
A) less industrialized countries have less sophisticated IT.
B) there is no need to infiltrate enemy territory.
C) cyberterrorism strikes more fear in the minds and hearts of citizens.
D) it involves little financial outlay to develop a plan of attack.
A) less industrialized countries have less sophisticated IT.
B) there is no need to infiltrate enemy territory.
C) cyberterrorism strikes more fear in the minds and hearts of citizens.
D) it involves little financial outlay to develop a plan of attack.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is most true about cyberbullying?
A) Girls are just as likely as boys to be victims.
B) Traditional bullying is still more common than cyberbullying.
C) Cyberbullying has been linked to low self-esteem and suicidal tendencies.
D) All of the above.
A) Girls are just as likely as boys to be victims.
B) Traditional bullying is still more common than cyberbullying.
C) Cyberbullying has been linked to low self-esteem and suicidal tendencies.
D) All of the above.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
44
The new phenomenon or form of cyber "entertainment" called ______ involves the use of spoofing technology to call 9-1-1 in order to fake a critical emergency, such as hostage situation, that draws a real-life response from law enforcement.
A) swatting
B) pigging
C) cuffing
D) copping
A) swatting
B) pigging
C) cuffing
D) copping
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
45
Edward Snowden's effort to warn the public about the _____________ is discussed within the context of espionage but could be included as governmental cyberspying.
A) NSA spying program
B) Obamacare programs's microchip implant requirement
C) Department of Homeland Securities Internet fraud program
D) Russia's spy network
A) NSA spying program
B) Obamacare programs's microchip implant requirement
C) Department of Homeland Securities Internet fraud program
D) Russia's spy network
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
46
Cybercriminals who aim their malicious attacks at disrupting, defacing, and destroying technology that they find offensive are known as____________________.
A) cyberterrorists
B) cybervandals
C) cyberstalkers
D) cyberthieves
A) cyberterrorists
B) cybervandals
C) cyberstalkers
D) cyberthieves
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
47
What is the most common form of spam?
A) e-mail
B) instant messaging
C) mobile phone messaging
D) Usenet newsgroups
A) e-mail
B) instant messaging
C) mobile phone messaging
D) Usenet newsgroups
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
48
What type of cyberthreat is represented by Titan Rain?
A) a cyberfraud threat
B) a cyberterrorism threat
C) a cyberespionage threat
D) Titan Rain does not represent a threat; it is security software.
A) a cyberfraud threat
B) a cyberterrorism threat
C) a cyberespionage threat
D) Titan Rain does not represent a threat; it is security software.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
49
The premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents is termed:
A) cyberespionage.
B) cyberspying.
C) cyberterrorism.
D) cyberstalking.
A) cyberespionage.
B) cyberspying.
C) cyberterrorism.
D) cyberstalking.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
50
What is the difference between a Trojan horse and a virus?
A) Trojan horses are benign applications.
B) Trojan horses do not replicate themselves.
C) Trojan horses are not as destructive.
D) Trojan horses can penetrate firewalls.
A) Trojan horses are benign applications.
B) Trojan horses do not replicate themselves.
C) Trojan horses are not as destructive.
D) Trojan horses can penetrate firewalls.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
51
Cyberterrorism is a handy battlefield for terrorists because it can strike directly at what target that bombs will not affect?
A) the economy of an enemy
B) the defense infrastructure of an enemy
C) the hearts and minds of the citizens of an enemy
D) the energy infrastructure of an enemy
A) the economy of an enemy
B) the defense infrastructure of an enemy
C) the hearts and minds of the citizens of an enemy
D) the energy infrastructure of an enemy
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
52
Shoplisting is a type of ___ fraud that involves purchasing or finding legitimate retail receipts, stealing the products listed on the receipts, returning the items to the retailer for store credit or a gift card, and then selling the gift card on the Internet at a discount for quick cash.
A) phishing
B) e-tailing
C) spamming
D) vishing
A) phishing
B) e-tailing
C) spamming
D) vishing
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
53
Some spam can simply be an unwanted advertisement. Under what circumstance can spam become a crime?
A) when it causes emotional distress to a victim
B) when it involves pornography
C) when it causes serious harm to a computer or network
D) when it involves an organized group of spammers
A) when it causes emotional distress to a victim
B) when it involves pornography
C) when it causes serious harm to a computer or network
D) when it involves an organized group of spammers
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
54
The Digital Millennium Copyright Act made it a crime to:
A) plant slag code into a computer system.
B) steal or attempt to steal someone's identity via the Internet.
C) access computer systems without authorization.
D) circumvent antipiracy measures in most commercial software.
A) plant slag code into a computer system.
B) steal or attempt to steal someone's identity via the Internet.
C) access computer systems without authorization.
D) circumvent antipiracy measures in most commercial software.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
55
Loverspy is known as:
A) one of the most damaging cyberspying programs ever.
B) the high-profile Internet child pornographer.
C) the inventor of catfishing.
D) a Trojan horse virus.
A) one of the most damaging cyberspying programs ever.
B) the high-profile Internet child pornographer.
C) the inventor of catfishing.
D) a Trojan horse virus.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
56
The two main mediums for cyberbullying include:
A) cell phones and Internet.
B) Internet and graffiti.
C) word of mouth and cell phones.
D) graffiti and word of mouth.
A) cell phones and Internet.
B) Internet and graffiti.
C) word of mouth and cell phones.
D) graffiti and word of mouth.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
57
When an identity thief creates false e-mails and/or Web sites that look legitimate but are designed to gain illegal access to a victim's personal information, it is called:
A) spamming.
B) phishing.
C) mousetrapping.
D) warez.
A) spamming.
B) phishing.
C) mousetrapping.
D) warez.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
58
While many wonder how people can be so easily duped, the government's Internet fraud center receives 200,000 complaints yearly, and Internet scams result in over ____ in losses each year.
A) $10 billion
B) $10 million
C) $240 billion
D) $240 million
A) $10 billion
B) $10 million
C) $240 billion
D) $240 million
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
59
Computer worms are similar to viruses except that they use computer networks or the Internet to do what?
A) "swat" or "shoplist" merchandise
B) "rip" or "crack" security codes
C) crash websites
D) self-replicate
A) "swat" or "shoplist" merchandise
B) "rip" or "crack" security codes
C) crash websites
D) self-replicate
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
60
Because cybercrime is essentially global, international cooperation is required for its control. Which of the following reflects this fact?
A) the International Information Infrastructure Protection Act
B) the Family Entertainment and Copyright Act
C) the Convention on Cybercrime
D) the Digital Millennium Copyright Act
A) the International Information Infrastructure Protection Act
B) the Family Entertainment and Copyright Act
C) the Convention on Cybercrime
D) the Digital Millennium Copyright Act
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
61
Operation Phish Phry was a successful FBI cybercrime sting operation.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
62
It may be that hackers are regularly mistaken for terrorists. According to some experts, how many cases of cyberterrorism have been recorded?
A) none
B) two hundred
C) two thousand
D) two hundred thousand
A) none
B) two hundred
C) two thousand
D) two hundred thousand
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
63
In 2004, the Identity Theft Penalty Enhancement Act was signed into law; the act increases existing penalties for the crime of identity theft.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
64
Because of a new portion of the D.A.R.E. program, cyberbullying has decreased by nearly 27% in recent years.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
65
A variation of a phishing scheme is spear-phishing.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
66
Cyberstalking was made famous in the 2007 case of O.J. Simpson and his then girlfriend Megan Huff.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
67
The widespread use of computers and the Internet has ushered in the age of information technology in most industrialized societies.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
68
In the case of MGM Studios, Inc. v. Grokster, the Court held that software distributors could not be sued for inducing copyright infringement for marketing file-sharing software.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
69
Commercial cyberspies target upcoming bids, customer lists, product designs, software source code, voice mail messages, and confidential e-mail messages.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
70
Cybervandalism is motivated more by a profit than a cybercriminal's urge to seek revenge.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
71
Voice over Internet Protocol (VoIP) is a technology that allows people to make voice calls using a broadband Internet connection instead of a regular phone line.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
72
Terrorists groups have used the Internet to fund their operations. How is such funding accomplished?
A) through fraudulent charitable organizations
B) through bogus or "shell" companies
C) through intellectual property crime
D) all of the above
A) through fraudulent charitable organizations
B) through bogus or "shell" companies
C) through intellectual property crime
D) all of the above
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
73
The Black Shirt Mafia was one of the largest online identity-theft organizations, with roots in Pennsylvania, whose illegally obtained money was used to fund terrorist activities.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
74
File sharing is a type of copyright infringement that allows users to download music and other copyrighted materials without paying royalties to the copyright holder.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
75
Cybercrime is a new breed of offenses that involves the theft and/or destruction of information, resources, or funds utilizing computers, computer networks, and the Internet.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
76
The number of Web sites that advertise or sell prescription drugs is booming. The majority of these sites require that a patient provide a prescription from his or her doctor.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
77
Online gambling casinos have been particularly vulnerable to denial-of-service attacks.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
78
Congress has treated computer-related crime as a distinct federal offense since the passage of the Counterfeit Access Device and Computer Fraud and Abuse Law in 1984.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
79
A logic bomb, also called slag code, is a type of delayed-action virus that may be set off when a program user makes certain input that sets the slag code in motion.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck
80
E-tailing is Internet jargon for the crime of cyberstalking.
Unlock Deck
Unlock for access to all 95 flashcards in this deck.
Unlock Deck
k this deck