Deck 12: The Future of Cybercrime, Terror, and Policy

Full screen (f)
exit full mode
Question
What is the name of the downloadable program individuals can use to anonymize their online activity from others that has been a focus of law enforcement investigations over the last few years?

A) Pingbox
B) Slingbox
C) GCHQ
D) Tor
Use Space or
up arrow
down arrow
to flip the card.
Question
What is the name for services that allow individuals to remotely access files stored on web servers via the Internet?

A) mobile phones
B) cloud storage
C) wearable devices
D) none of the above
Question
Home security systems, thermostats, and appliances that can be controlled via the web are examples of the _______

A) cybercrime devices
B) serious technology platform
C) Internet of Things
D) new Internet
Question
Which of the following anonymization tools have been targeted by law enforcement to better identify cybercriminals?

A) Tor
B) Proxify
C) Spotify
D) Hushmail
Question
What is the name of the US bill that failed to pass in 2012 in order to combat rates of piracy and counterfeiting?

A) Child Online Protection Act
B) The Megan Meier Act
C) Stop Online Piracy Act
D) none of the above
Question
What is the term used to refer to the process where individuals accept a radical ideology without directly engaging others as part of that movement?

A) self-radicalization
B) scary practices
C) revolutionary acceptance
D) none of the above
Question
The term ________ references direct relationships between police and the general public to identify certain forms of crime that are viewed as a challenge and finding ways to work together to combat the issue.

A) centralized response
B) community policing
C) problem oriented policing
D) none of the above
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/7
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: The Future of Cybercrime, Terror, and Policy
1
What is the name of the downloadable program individuals can use to anonymize their online activity from others that has been a focus of law enforcement investigations over the last few years?

A) Pingbox
B) Slingbox
C) GCHQ
D) Tor
D
2
What is the name for services that allow individuals to remotely access files stored on web servers via the Internet?

A) mobile phones
B) cloud storage
C) wearable devices
D) none of the above
B
3
Home security systems, thermostats, and appliances that can be controlled via the web are examples of the _______

A) cybercrime devices
B) serious technology platform
C) Internet of Things
D) new Internet
C
4
Which of the following anonymization tools have been targeted by law enforcement to better identify cybercriminals?

A) Tor
B) Proxify
C) Spotify
D) Hushmail
Unlock Deck
Unlock for access to all 7 flashcards in this deck.
Unlock Deck
k this deck
5
What is the name of the US bill that failed to pass in 2012 in order to combat rates of piracy and counterfeiting?

A) Child Online Protection Act
B) The Megan Meier Act
C) Stop Online Piracy Act
D) none of the above
Unlock Deck
Unlock for access to all 7 flashcards in this deck.
Unlock Deck
k this deck
6
What is the term used to refer to the process where individuals accept a radical ideology without directly engaging others as part of that movement?

A) self-radicalization
B) scary practices
C) revolutionary acceptance
D) none of the above
Unlock Deck
Unlock for access to all 7 flashcards in this deck.
Unlock Deck
k this deck
7
The term ________ references direct relationships between police and the general public to identify certain forms of crime that are viewed as a challenge and finding ways to work together to combat the issue.

A) centralized response
B) community policing
C) problem oriented policing
D) none of the above
Unlock Deck
Unlock for access to all 7 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 7 flashcards in this deck.