Deck 13: Cyberdeviance
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 13: Cyberdeviance
1
Why is it challenging to enforce state and federal legislation against computer crimes?
A) Enforcement is financially prohibitive.
B) Corporations do not like admitting their systems were vulnerable.
C) Those who wrote the laws are not current with the latest technology.
D) Cybercriminals are innovative when committing computer crimes.
A) Enforcement is financially prohibitive.
B) Corporations do not like admitting their systems were vulnerable.
C) Those who wrote the laws are not current with the latest technology.
D) Cybercriminals are innovative when committing computer crimes.
B
2
What is a primary issue when drafting legislation against computer crime?
A) Laws must allow for technological innovation.
B) Laws must not be too broad.
C) Laws must not infringe on constitutionally protected rights.
D) Laws must cover a wide variety of possible crimes.
A) Laws must allow for technological innovation.
B) Laws must not be too broad.
C) Laws must not infringe on constitutionally protected rights.
D) Laws must cover a wide variety of possible crimes.
C
3
Why are corporations unwilling to admit they were the victim of cybercrime?
A) Consumer confidence may erode.
B) They will be targeted for additional crimes.
C) They will be charged in connection with any crime that affects consumers.
D) Corporations commit most computer crimes.
A) Consumer confidence may erode.
B) They will be targeted for additional crimes.
C) They will be charged in connection with any crime that affects consumers.
D) Corporations commit most computer crimes.
A
4
Which of the following statements about the cost of cybercrime is true?
A) The cost of cybercrime is decreasing.
B) The cost of cybercrime is increasing.
C) The cost of cybercrime is impossible to estimate.
D) Statistics on the costs of cybercrime vary wildly from year to year.
A) The cost of cybercrime is decreasing.
B) The cost of cybercrime is increasing.
C) The cost of cybercrime is impossible to estimate.
D) Statistics on the costs of cybercrime vary wildly from year to year.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Grace walks into the offices of a major movie studio, downloads thousands of confidential files, and uses this information to blackmail several people. What kind of cybercrime is this?
A) computer as incidental to other crime
B) computers as instruments of crime
C) computer as a target
D) crime associated with the prevalence of computers
A) computer as incidental to other crime
B) computers as instruments of crime
C) computer as a target
D) crime associated with the prevalence of computers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
What category of cybercrime is using a computer to store client lists for illegal gambling operations?
A) computer as incidental to other crime
B) computers as instruments of crime
C) computer as a target
D) crime associated with the prevalence of computers
A) computer as incidental to other crime
B) computers as instruments of crime
C) computer as a target
D) crime associated with the prevalence of computers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Phillipe sells counterfeit copies of popular computer programs, such as Adobe Acrobat. What kind of cybercrime is this?
A) computer as incidental to other crime
B) computers as instruments of crime
C) computer as a target
D) crime associated with the prevalence of computers
A) computer as incidental to other crime
B) computers as instruments of crime
C) computer as a target
D) crime associated with the prevalence of computers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Graciela is debugging a program for her company using installed computer software that allows her to make changes without going through complicated access procedures. What is this kind of software called?
A) workaround
B) logic bomb
C) Trojan horse
D) trap door
A) workaround
B) logic bomb
C) Trojan horse
D) trap door
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
What are salami attacks used for?
A) It clones cell phone numbers.
B) It erases someone's identity.
C) theft
D) spying
A) It clones cell phone numbers.
B) It erases someone's identity.
C) theft
D) spying
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
How can a virus infect a computer?
A) The victim downloads a file.
B) The victim buys an item from an unsecured website.
C) The victim leaves the log-in data on a public computer.
D) The victim sends personal information in an e-mail.
A) The victim downloads a file.
B) The victim buys an item from an unsecured website.
C) The victim leaves the log-in data on a public computer.
D) The victim sends personal information in an e-mail.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
A cyberdeviant named ScareBear systematically violates the security programs guarding a country's nuclear power plants. He intends to gain political concessions by threatening to initiate a nuclear meltdown. What category of cyberdeviant is ScareBear?
A) malicious hacker
B) career criminal
C) malcontent/addict
D) extreme advocate
A) malicious hacker
B) career criminal
C) malcontent/addict
D) extreme advocate
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
MotherofFlagons is driven to explore what computers can do. She is curious and will spend days at a time testing government security systems and designing work-arounds for accessing systems she is not supposed to access. She intends no harm, she just loves the challenge. What category of cyberdeviant is MotherofFlagons?
A) cracker
B) hacker
C) cyberpunk
D) coder
A) cracker
B) hacker
C) cyberpunk
D) coder
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
What is the primary difference between hackers and crackers?
A) Hackers break the law; crackers do not.
B) Crackers are driven by the quest for information; hackers want money.
C) Hackers do not intend harm; crackers do.
D) Hackers are Generation X; crackers are millennial.
A) Hackers break the law; crackers do not.
B) Crackers are driven by the quest for information; hackers want money.
C) Hackers do not intend harm; crackers do.
D) Hackers are Generation X; crackers are millennial.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Why do elite hackers value disembodied anonymity?
A) It makes the subculture more egalitarian.
B) It makes it easier to violate the law.
C) It ensures they are protected from criminal hackers.
D) It disconnects them from a society that does not appreciate them.
A) It makes the subculture more egalitarian.
B) It makes it easier to violate the law.
C) It ensures they are protected from criminal hackers.
D) It disconnects them from a society that does not appreciate them.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Jackalope4U is able to interact with message boards without revealing any clues of their social status, race, class, age, or gender. As an elite hacker, they value this ______, because it means they are judged on their accomplishments alone.
A) disembodied anonymity
B) ethical fluidity
C) antipathy gap
D) dialectical materialism
A) disembodied anonymity
B) ethical fluidity
C) antipathy gap
D) dialectical materialism
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
What makes cyberdeviant subculture possible?
A) the proliferation of smartphones
B) lack of government oversight
C) inadequate international laws
D) disembodied anonymity
A) the proliferation of smartphones
B) lack of government oversight
C) inadequate international laws
D) disembodied anonymity
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following statements about elite hackers is true?
A) Elite hackers are strong individualists.
B) Elite hackers view themselves as part of an inner circle.
C) Elite hackers enforce a code of behavior for lesser hackers.
D) Elite hackers see themselves as elite spies.
A) Elite hackers are strong individualists.
B) Elite hackers view themselves as part of an inner circle.
C) Elite hackers enforce a code of behavior for lesser hackers.
D) Elite hackers see themselves as elite spies.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
What is a major ethical position of elite cyberdeviants?
A) sharing government secrets in public forums
B) collecting the private information of others
C) protecting the property of others against destruction
D) networking with other elite hackers
A) sharing government secrets in public forums
B) collecting the private information of others
C) protecting the property of others against destruction
D) networking with other elite hackers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is an ethical standard of elite cyberdeviants?
A) leave no trace of security breaches
B) do not irreparably damage a legitimate user's information
C) report security vulnerabilities
D) leave a unique calling card to mark your successful breach of a target
A) leave no trace of security breaches
B) do not irreparably damage a legitimate user's information
C) report security vulnerabilities
D) leave a unique calling card to mark your successful breach of a target
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
According to Donn Parker, how do cyberdeviants justify what they do?
A) They argue the harm they do is limited to computers.
B) They argue the government is too restrictive.
C) They argue that they provide an important security service.
D) They argue that their targets commit more cybercrime than they do.
A) They argue the harm they do is limited to computers.
B) They argue the government is too restrictive.
C) They argue that they provide an important security service.
D) They argue that their targets commit more cybercrime than they do.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
What is the primary motivation of most cyberdeviants?
A) destroying corporations
B) creating disorder
C) a sense of accomplishment
D) anarchy
A) destroying corporations
B) creating disorder
C) a sense of accomplishment
D) anarchy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
What is the "Robin Hood" syndrome?
A) a justification that cybercriminals use for stealing from large corporations
B) the idea that repressive governments actually create cybercriminals
C) the idea that cybercriminals are psychologically immature
D) a rationalization that cybercriminals are actually helping identify vulnerabilities in security systems
A) a justification that cybercriminals use for stealing from large corporations
B) the idea that repressive governments actually create cybercriminals
C) the idea that cybercriminals are psychologically immature
D) a rationalization that cybercriminals are actually helping identify vulnerabilities in security systems
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Which theory of cyberdeviance would focus on the way that cyberdeviants can reject both the conventional goals and the conventional means of attaining those goals, replacing them with new, cyber-centric, means and goals?
A) social control
B) rational choice
C) differential association
D) anomie
A) social control
B) rational choice
C) differential association
D) anomie
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
A cracker with the handle DeathFromAbove rationalizes her cyberdeviance by explaining that she only steals from corporate bank accounts in order to donate money to public libraries. What technique of neutralization is she using?
A) denial of victim
B) appeal to higher loyalties
C) denial of injury
D) denial of responsibility
A) denial of victim
B) appeal to higher loyalties
C) denial of injury
D) denial of responsibility
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A cracker with the handle MaxZoom rationalizes his cyberdeviance by explaining that he uploads pirated media files because it doesn't hurt people, just faceless corporations. What technique of neutralization is he using?
A) condemnation of the condemners
B) denial of injury
C) denial of victim
D) appeal to higher loyalties
A) condemnation of the condemners
B) denial of injury
C) denial of victim
D) appeal to higher loyalties
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
It is easy to draft cybercrime legislation that is both constitutionally defensible and legally enforceable.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
There is no legislation against cybercrime at the federal level.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
China is the most frequent point of origin for cybercrime offenses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The demographic category with the highest rate of loss to cybercrime is those aged 50-59.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Trap doors have no purpose beyond allowing cybercriminal access to otherwise secure data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
A Trojan horse is one kind of virus delivery system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Mae would be classified a hacker, because she has no intention of committing cybercrime, though she likes to test her skills by attempting to breach financial institutions' computer network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Crackers are a kind of cybercriminals.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
The cyberdeviant subculture is based on real-world commonalities.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Cyberdeviant subculture is organized into a hierarchy along strict race and gender lines.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
The majority of members within the cyberdeviant subculture believe that information should be free.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
The majority of members within the cyberdeviant subculture believe that computers make life worse.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
A hacker's status, power, and prestige depend upon recognition from others within the hacker subculture.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Most cyberdeviants are motivated by financial gain.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
According to rational choice theory, cyberdeviants commit their crimes impulsively.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
How is a worm different from a virus?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Distinguish between a hacker and a cracker.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Describe three primary forms of unauthorized computer use.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Distinguish between technovandalism and technotrespass.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Apply the rational choice theory to cybercrime.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Distinguish between the four categories of computer crime.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Compare and contrast the four types of computer hackers described by Marc Rogers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Apply techniques of neutralization that offenders may use to justify cyberdeviance.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Summarize methods of cyberdeviance.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Distinguish between the seven types of cybercriminals identified by Donn Parker.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck