Deck 7: Information Technology Crime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/49
Play
Full screen (f)
Deck 7: Information Technology Crime
1
What is the definition of the following word:
-Malware.
-Malware.
Software intended to damage or exploit computers and networks.
2
What is the definition of the following word:
-Phishing.
-Phishing.
Posing as an established enterprise in an e-mail in order to trick the recipient into revealing information that may be used for identity theft.
3
What is the definition of the following word:
-Worm
-Worm
Much like a virus in that it replicates itself, but unlike a virus, worms do not require a host file or human action to propagate.
4
What is the definition of the following word:
-Trojan
-Trojan
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
5
What is the definition of the following word:
-Denial-of-service attack.
-Denial-of-service attack.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
6
This term defines hackers that break security to test their own systems, to test other systems and to gain knowledge about computer security for ethical and educational reasons.
A) White-hat hacker
B) Black-hat hacker
C) Gray-hat hacker
D) All of the above
A) White-hat hacker
B) Black-hat hacker
C) Gray-hat hacker
D) All of the above
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
7
These hackers break into networks with malicious intent to perpetrate IT crime.
A) White-hat hackers
B) Black-hat hacker
C) Gray-hat hacker
D) All of the above
A) White-hat hackers
B) Black-hat hacker
C) Gray-hat hacker
D) All of the above
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
8
These hackers break into computer networks not necessarily to do damage, but to seek out exploits.
A) White-hat hackers
B) Black-hat hackers
C) Gray-hat hackers
D) All of the above
A) White-hat hackers
B) Black-hat hackers
C) Gray-hat hackers
D) All of the above
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
9
Which activities are considered IT crime?
A) Unauthorized access
B) Computer-mediated espionage
C) Illicit tampering with files or data
D) All of the above
A) Unauthorized access
B) Computer-mediated espionage
C) Illicit tampering with files or data
D) All of the above
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
10
Symantec estimated that the global direct cost of IT crime per victim at what dollar amount?
A) 100
B) 138
C) 298
D) 456
A) 100
B) 138
C) 298
D) 456
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
11
This term is a derogatory term for a person who uses pre-written software to break into networks.
A) Black-hat hackers
B) White-hat hackers
C) Gray-hat hackers
D) Script kiddie
A) Black-hat hackers
B) White-hat hackers
C) Gray-hat hackers
D) Script kiddie
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
12
This is a program that inserts copies of itself into other computer programs, data files, or sectors of the hard drive.
A) Viruses
B) Worms
C) Trojans
D) Denial-of service attacks
A) Viruses
B) Worms
C) Trojans
D) Denial-of service attacks
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
13
This is much like a virus in that it replicates itself but does not require a host file or human action.
A) Viruses
B) Worms
C) Trojans
D) Denial-of service attacks
A) Viruses
B) Worms
C) Trojans
D) Denial-of service attacks
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
14
This is a dangerous piece of malware that appears to be useful software.
A) Viruses
B) Trojans
C) Worms
D) Denial-of service attacks
A) Viruses
B) Trojans
C) Worms
D) Denial-of service attacks
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
15
In this attack a perpetrator attempts to prevent users from accessing a server's information or services such as e-mails.
A) Viruses
B) Worms
C) Trojans
D) Denial-of service
A) Viruses
B) Worms
C) Trojans
D) Denial-of service
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
16
This is an attempt to acquire personal information such as usernames and passwords.
A) Viruses
B) Worms
C) Phishing
D) Trojan
A) Viruses
B) Worms
C) Phishing
D) Trojan
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
17
These attacks are becoming more common in parts of the world such as Asia using applications.
A) Mobile device attacks
B) Worms
C) Viruses
D) Phishing
A) Mobile device attacks
B) Worms
C) Viruses
D) Phishing
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following resources do developing countries lack to build against IT crime?
A) Human resources
B) Technical resources
C) Financial resources
D) All of the above
A) Human resources
B) Technical resources
C) Financial resources
D) All of the above
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
19
What factor affects the availability of security products written for that market?
A) Financial resources
B) Market size
C) Technical resources
D) Human resources
A) Financial resources
B) Market size
C) Technical resources
D) Human resources
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
20
Which are examples of the concentration of IT crime in specific sectors?
A) Online gaming industry in China
B) Theft of banking passwords in Brazil
C) Employees of IT firms in India
D) All of the above
A) Online gaming industry in China
B) Theft of banking passwords in Brazil
C) Employees of IT firms in India
D) All of the above
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
21
Due to the tradition of high skill in mathematics, physics, and computing, many IT attacks originate from what area of the world?
A) China
B) India
C) Eastern Europe and Russia
D) United States
A) China
B) India
C) Eastern Europe and Russia
D) United States
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
22
Perpetrators with these motives target information that may be used or sold in order to enrich themselves.
A) Economic motives
B) Political motives
C) Personal motives
D) All of the above
A) Economic motives
B) Political motives
C) Personal motives
D) All of the above
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
23
Perpetrators with these motives target a country's resources for reasons that have to do with differing political viewpoints or philosophies, or to neutralize a country's perceived threat.
A) Economic motives
B) Political motives
C) Personal motives
D) All of the above
A) Economic motives
B) Political motives
C) Personal motives
D) All of the above
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
24
Perpetrators with these motives are often important only to an individual or a small group of people.
A) Economic motives
B) Political motives
C) Personal motives
D) All of the above
A) Economic motives
B) Political motives
C) Personal motives
D) All of the above
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
25
Black-hat hackers may be contracted or employed to test security on a system.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
26
Black-hat hackers seek to make systems unusable or to steal data or other resources.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
27
Gray-hat hackers may alert the owner of a network and offer to correct the vulnerability for a fee.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
28
IT crime are criminal offenses that are committed with devices that communicate information to one another via networks.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
29
Mobile devices cannot be used for IT crime.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
30
IT crime costs the global economy an estimated $388 million in 2012.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
31
Industrialized countries, which depend heavily on information technology, are the most likely to have IT crime legislation.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
32
Lightly industrialized countries are more likely to have IT crime legislation.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
33
IT crime victims often do not realize they have been attacked.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
34
The most common devices used for IT crimes are computers and mobile phones.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
35
Mobile device attacks are typically imported through applications.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
36
The weak rule of law in developing countries makes the commission of IT crimes more difficult.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
37
Perpetrators in developing countries are more confident than those in developed countries.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
38
Many new Internet users in developing economies understand how the Internet works or how to secure their computers against attacks.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
39
If a security technology company cannot make a profit in a developing market, then it will not produce software for that market.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
40
Many IT attacks originate from Eastern Europe and Russia.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
41
In regions where IT jobs are plentiful, people skilled in math and science turn to IT crime.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
42
Political IT crime consists of criminal offenses that are committed on a computer-based network for political reasons.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
43
Trespassing on information networks without doing any damage or leaving any trace of the visit is the least serious IT crime.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
44
The Pirate Bay was a file-hosting site that operated from 2005 to 2012. The Pirate Bay had servers throughout the world, including 525 servers in the state of Virginia, United States, and 630 in the Netherlands.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
45
Megaupload was established in Sweeden in 2001, and is a website that provides BitTorrent files and links for peer-to-peer file sharing.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
46
What does a worm do to a computer?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
47
How can a Trojan be disguised?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
48
Explain the difference between phishing and a Trojan.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
49
What was decided upon in the Budapest Convention?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck