Deck 13: Technology and Crime

Full screen (f)
exit full mode
Question
What is the main difference in the two broad categories of identity theft?

A)the amount of the costs to the victim
B)whether the thief is apprehended or not
C)the length of time before the victim realizes the theft
D)whether the fraud is with existing or new accounts
Use Space or
up arrow
down arrow
to flip the card.
Question
Because of technology,we can be sure that

A)almost all criminals will be successfully prosecuted.
B)tomorrow's crimes will differ from those of today.
C)crime scene investigation will become more exciting.
D)criminals will take over the world.
Question
Identity theft is considered a type of

A)robbery.
B)larceny.
C)theft.
D)burglary.
Question
Provisions of the Communications Decency Act (CDA)have been struck down by the Supreme Court because

A)they were inherently inconsistent.
B)they abridged protected freedoms of speech.
C)they protected adults at the expense of children.
D)they did not address good faith efforts to restrict content.
Question
New technology specifically for use in apprehending criminals includes all of the following except which?

A)radar-detector detectors
B)the Spiderman snare
C)transponder-based automated vehicle location (AVL)systems
D)a disorienting strobe light
Question
Technology and crime ________ closely linked.

A)are about to become
B)have recently become
C)are sometimes
D)have always been
Question
Perpetrators of identity theft

A)most often target acquaintances.
B)are rarely known to their victims.
C)usually have extensive criminal backgrounds.
D)are more likely now than previously to be individuals.
Question
Cybercrime and white-collar crime have all of the following in common except which?

A)They often result in no personal financial gains.
B)They often use nonviolent means.
C)They often rely on access to computers or storage media.
D)They often involve information manipulation.
Question
What is TEMPEST?

A)an international computer security consortium
B)an anti-theft software program
C)a security standard developed by the U.S.military
D)a protocol for handling data securely
Question
In which of these areas are cyberthreats least likely?

A)United States
B)Canada
C)Central America
D)Peru
Question
Which of these methods of illegitimate access to a computer is known as "computer trespass"?

A)Direct access by a corporate spy.
B)Remote access via a computer modem.
C)Reading the electromagnetic radiation.
D)Detecting and interpreting keystroke activity from a distance.
Question
What is cyberbanging?

A)use of the Internet for sexual solicitation
B)use of the Internet to attack politicians
C)use of the Internet to out sexual predators
D)use of the Internet by street gangs
Question
What is a "cookie"?

A)a small program sent to users' machines by servers on the Web
B)a virus program concealed in an attractive pop-up
C)the name for a rogue code secreted in a text document
D)an accidentally released computer virus
Question
Trap doors and logic bombs are examples of which category of cybercrime?

A)computer-manipulation crimes
B)hardware,software,and information theft
C)support of criminal enterprises
D)internal cybercrimes (malware)
Question
The contrast between cyberspace and the physical and social reality of the real world is summed up in the term

A)user interface.
B)hypermedia.
C)virtual reality.
D)hackers.
Question
Polymorphic viruses differ from other viruses in their ability to

A)infect handheld devices,such as PDAs and mobile phones.
B)alter themselves after they have infected a computer.
C)be quickly caught by signature-based antivirus-scanning technologies.
D)interfere with a computer's ability to send and receive e-mail
Question
Social disorganization has been shown to

A)lead to a reversal in the advances of technology.
B)foment a renewed drive for technological advances.
C)result in illegal attempts to acquire dangerous technology.
D)encourage the spread of technology among law enforcement agencies.
Question
The valuable information that high-technology crime targets is best described as

A)financial information.
B)personal,identifying information.
C)a wide range of highly valuable data.
D)patentable inventions.
Question
Identity theft would be less likely if

A)Social Security numbers were used less in the public sector.
B)Social Security numbers became the sole form of identification.
C)Social Security numbers were done away with.
D)Social Security numbers were always used with an additional ID.
Question
The trial judge has to decide is an expert's testimony is

A)reliable and relevant.
B)accurate and accessible.
C)cogent and comprehensive.
D)clear and correct.
Question
Cybercrime statues were proactively developed by states and the federal government when law enforcement officers realized that they would help prevent jury confusion.
Question
The world's largest computer network is

A)cyberspace.
B)the Web.
C)the Internet.
D)hyperspace.
Question
The citizens' group that has taken on the task of helping refine notions of privacy and legality as they relate to telecommunications and other computer-based media is the

A)Computer Security Institute (CSI).
B)Anti-Phishing Working Group.
C)American Cryptography Association.
D)Electronic Frontier Foundation (EFF).
Question
A computer virus is a program designed to invade a computer system and modify its operation or alter the information it stores.
Question
Cybercrime simply refers to any crime that violates any federal or state cybercrime legislation.
Question
Technology is used by both crime fighters and law breakers.
Question
The distinctions between different types of computer malware are primarily based on how much damage they cause.
Question
Most viruses hide inside executable computer software in the "boot sectors" of storage media.
Question
America's first cohesive national cyber security system for identifying,analyzing,and prioritizing emerging vulnerabilities and threats is called the

A)United States Computer Emergency Readiness Team (US -CERT).
B)Comprehensive National Cybersecurity Initiative (CNCI).
C)National Cyber Alert System.
D)National Infrastructure Protection Center (NIPC).
Question
ISPs are mainly involved in doing which of the following?

A)hosting websites
B)building the Internet
C)providing Internet access
D)helping users find information
Question
The situation in which prosecution was impeded by the inability of many state and local police departments to skillfully investigate cybercrimes has been changing because of

A)the efforts of the FBI and the Department of Justice.
B)federal grants to fund local cybercrime units.
C)the opening of a new training facility for local officers.
D)cybercrime becoming a greater priority at the local level.
Question
Because it guarantees freedom of speech and the question of what constitutes speech has been raised,the _______ to the Constitution may need reinterpretation.

A)First Amendment
B)Second Amendment
C)Third Amendment
D)Fourth Amendment
Question
The yearly cost of cybercrime is over half a billion dollars.
Question
The first person to be indicted for writing something on the Internet was charged by the FBI after posting threats and released after 29 days in prison based on his writings being protected under the free speech clause.
Question
The amount of illegal software in use worldwide is only about a fifth of all software.
Question
Which of these questions speaks to the issue of security in our "persons,houses,papers,and effects,against unreasonable searches and seizures"?

A)Does e-mail qualify as speech?
B)What are papers?
C)Does social networking qualify as peaceable assembling?
D)Are forum postings a form of speech?
Question
Cybercrime could potentially lead to personal injury.
Question
AFIS allows investigators to

A)take a 360-degreee image of a bullet.
B)match a suspect's fingerprints more quickly.
C)create a simulated,computerized crime scene.
D)safely disable a motor vehicle's electrical system.
Question
The crimes of the Information Age require review of the Constitution because

A)basic definitions must be reassessed.
B)criminal penalties must be raised.
C)new amendments must be considered.
D)the concept of crime must be updated.
Question
Cybercriminals can work internationally through the Internet without passports,plane tickets,or associates,while law enforcement officials

A)require partnerships for international investigations.
B)accrue extensive travel costs chasing them.
C)are unable to trace the convoluted paths across the Internet.
D)are thwarted by their limited jurisdictions.
Question
Someone who uses computers for exploration or exploitation is known as a(n)________.
Question
The standard of scientific acceptability applicable to the gathering of evidence in criminal cases is known as the ________.
Question
When criminals misuse another individuals' personal information to commit fraud,they are guilty of ________.
Question
Gang members are using ________ to circumvent court injunctions that forbid members from meeting face-to-face.
Question
Identity theft became a federal crime in 2008.
Question
The development of telecommunication technology has raised new questions about individual's rights and protections.
Question
Identify theft has indirect costs,such as costs related to prevention and mitigation.
Question
Computer viruses,worms,and spyware are examples of ________.
Question
Identity theft affects people's decisions about shopping online.
Question
"Warez" are the results of the unauthorized and illegal copying of software programs,or ________.
Question
Money today is really only information.
Question
Computer-related crime and cybercrime are two names for the same thing.
Question
Computer hacking began with the rise of mass-market personal computers in the late 1970s.
Question
An expert in cybercrimes believes that specialized sanctions,such as confiscating and limiting access to computer equipment,is necessary to deter cybercrimes.
Question
Hacker Kevin Mitnick developed a method of getting a trusted insider to perform an action that enables a hacking attack and referred to it as ________.
Question
Most hackers are young adolescent males.
Question
When investigators use biological residue found at a crime scene for genetic comparison to aid in identifying criminal suspects,they are using ________.
Question
Someone who sends an official-looking e-mail message to try to steal valuable personal information is engaging in ________.
Question
The meeting place of computer technology and human psychology that exists only within electronic networks is called ________.
Question
Web sites are immune to use for criminal activity.
Question
Also known as risk analysis,________ involves a thorough assessment of perils facing an organization.
Question
The combination of computer hardware and software that attempts to duplicate a skilled investigator's decision-making processes when analyzing evidence and recognizing patterns is known as a(n)________.
Question
How might similarities between hacking and playing computer games blur the lines between entertainment and crime?
Question
Explain how developments in communications have brought into question definitions of long-standing.Which terms need to be redefined and why?
Question
Why might cybercrime appeal to people who would not commit crimes like burglary or robbery?
Question
Describe the range of cybercriminals known as hackers.
Question
How is the use of computer technology by criminals and law enforcement similar too and different from the use of other types of technology to perpetrate crimes and bring perpetrators to justice?
Question
Do you agree with President Barack Obama that "the cyberthreat is one of the most serious economic and national security challenges we face as a nation"?
Question
One method of protecting electronic communications is ________,a method for encoding information to make it unreadable to all but the intended recipient.
Question
The network diagnostic tool developed by the FBI to intercept suspect personal communications delivered via wireless services is called ________.
Question
Compare and contrast phone phreaking with phishing.
Question
The sequential record of system activities surrounding an event,a(n)_______,enables investigators to reconstruct,review,and examine what happened during a computer crime after the fact.
Question
What effects do you think the use of DNA evidence will have on the justice system in the United States in the long run?
Question
Match between columns
Explorers
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Explorers
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Explorers
Individuals who focus on defeating copy protection either to play games or as a game
Explorers
Individuals who make unplanned forays into evolving technology for the sake of discovery
Explorers
Individuals who hack for fun and without intending harm
Explorers
Malicious individuals who cause damage to computer systems without seeking gain
Game Players
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Game Players
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Game Players
Individuals who focus on defeating copy protection either to play games or as a game
Game Players
Individuals who make unplanned forays into evolving technology for the sake of discovery
Game Players
Individuals who hack for fun and without intending harm
Game Players
Malicious individuals who cause damage to computer systems without seeking gain
Pioneers
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Pioneers
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Pioneers
Individuals who focus on defeating copy protection either to play games or as a game
Pioneers
Individuals who make unplanned forays into evolving technology for the sake of discovery
Pioneers
Individuals who hack for fun and without intending harm
Pioneers
Malicious individuals who cause damage to computer systems without seeking gain
Vandals
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Vandals
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Vandals
Individuals who focus on defeating copy protection either to play games or as a game
Vandals
Individuals who make unplanned forays into evolving technology for the sake of discovery
Vandals
Individuals who hack for fun and without intending harm
Vandals
Malicious individuals who cause damage to computer systems without seeking gain
Addicts
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Addicts
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Addicts
Individuals who focus on defeating copy protection either to play games or as a game
Addicts
Individuals who make unplanned forays into evolving technology for the sake of discovery
Addicts
Individuals who hack for fun and without intending harm
Addicts
Malicious individuals who cause damage to computer systems without seeking gain
Scamps
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Scamps
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Scamps
Individuals who focus on defeating copy protection either to play games or as a game
Scamps
Individuals who make unplanned forays into evolving technology for the sake of discovery
Scamps
Individuals who hack for fun and without intending harm
Scamps
Malicious individuals who cause damage to computer systems without seeking gain
Question
Match between columns
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 1996 to protect minors from harmful material on the Internet
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 2002 to create new sentencing guidelines for cybercriminals
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 1997 to criminalize willful infringement of copyrighted works (including via electronic means) even when no financial benefit is reaped
Communications Decency Act (CDA)
Passed in 1996 to protect minors from harmful material on the Internet
Communications Decency Act (CDA)
Passed in 2002 to create new sentencing guidelines for cybercriminals
Communications Decency Act (CDA)
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
Communications Decency Act (CDA)
Passed in 1997 to criminalize willful infringement of copyrighted works (including via electronic means) even when no financial benefit is reaped
No Electronic Theft Act (NETA)
Passed in 1996 to protect minors from harmful material on the Internet
No Electronic Theft Act (NETA)
Passed in 2002 to create new sentencing guidelines for cybercriminals
No Electronic Theft Act (NETA)
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
No Electronic Theft Act (NETA)
Passed in 1997 to criminalize willful infringement of copyrighted works (including via electronic means) even when no financial benefit is reaped
Cyber Security Enhancement Act (CSEA)
Passed in 1996 to protect minors from harmful material on the Internet
Cyber Security Enhancement Act (CSEA)
Passed in 2002 to create new sentencing guidelines for cybercriminals
Cyber Security Enhancement Act (CSEA)
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
Cyber Security Enhancement Act (CSEA)
Passed in 1997 to criminalize willful infringement of copyrighted works (including via electronic means) even when no financial benefit is reaped
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 13: Technology and Crime
1
What is the main difference in the two broad categories of identity theft?

A)the amount of the costs to the victim
B)whether the thief is apprehended or not
C)the length of time before the victim realizes the theft
D)whether the fraud is with existing or new accounts
D
2
Because of technology,we can be sure that

A)almost all criminals will be successfully prosecuted.
B)tomorrow's crimes will differ from those of today.
C)crime scene investigation will become more exciting.
D)criminals will take over the world.
B
3
Identity theft is considered a type of

A)robbery.
B)larceny.
C)theft.
D)burglary.
B
4
Provisions of the Communications Decency Act (CDA)have been struck down by the Supreme Court because

A)they were inherently inconsistent.
B)they abridged protected freedoms of speech.
C)they protected adults at the expense of children.
D)they did not address good faith efforts to restrict content.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
5
New technology specifically for use in apprehending criminals includes all of the following except which?

A)radar-detector detectors
B)the Spiderman snare
C)transponder-based automated vehicle location (AVL)systems
D)a disorienting strobe light
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
6
Technology and crime ________ closely linked.

A)are about to become
B)have recently become
C)are sometimes
D)have always been
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
7
Perpetrators of identity theft

A)most often target acquaintances.
B)are rarely known to their victims.
C)usually have extensive criminal backgrounds.
D)are more likely now than previously to be individuals.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
8
Cybercrime and white-collar crime have all of the following in common except which?

A)They often result in no personal financial gains.
B)They often use nonviolent means.
C)They often rely on access to computers or storage media.
D)They often involve information manipulation.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
9
What is TEMPEST?

A)an international computer security consortium
B)an anti-theft software program
C)a security standard developed by the U.S.military
D)a protocol for handling data securely
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
10
In which of these areas are cyberthreats least likely?

A)United States
B)Canada
C)Central America
D)Peru
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
11
Which of these methods of illegitimate access to a computer is known as "computer trespass"?

A)Direct access by a corporate spy.
B)Remote access via a computer modem.
C)Reading the electromagnetic radiation.
D)Detecting and interpreting keystroke activity from a distance.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
12
What is cyberbanging?

A)use of the Internet for sexual solicitation
B)use of the Internet to attack politicians
C)use of the Internet to out sexual predators
D)use of the Internet by street gangs
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
13
What is a "cookie"?

A)a small program sent to users' machines by servers on the Web
B)a virus program concealed in an attractive pop-up
C)the name for a rogue code secreted in a text document
D)an accidentally released computer virus
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
14
Trap doors and logic bombs are examples of which category of cybercrime?

A)computer-manipulation crimes
B)hardware,software,and information theft
C)support of criminal enterprises
D)internal cybercrimes (malware)
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
15
The contrast between cyberspace and the physical and social reality of the real world is summed up in the term

A)user interface.
B)hypermedia.
C)virtual reality.
D)hackers.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
16
Polymorphic viruses differ from other viruses in their ability to

A)infect handheld devices,such as PDAs and mobile phones.
B)alter themselves after they have infected a computer.
C)be quickly caught by signature-based antivirus-scanning technologies.
D)interfere with a computer's ability to send and receive e-mail
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
17
Social disorganization has been shown to

A)lead to a reversal in the advances of technology.
B)foment a renewed drive for technological advances.
C)result in illegal attempts to acquire dangerous technology.
D)encourage the spread of technology among law enforcement agencies.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
18
The valuable information that high-technology crime targets is best described as

A)financial information.
B)personal,identifying information.
C)a wide range of highly valuable data.
D)patentable inventions.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
19
Identity theft would be less likely if

A)Social Security numbers were used less in the public sector.
B)Social Security numbers became the sole form of identification.
C)Social Security numbers were done away with.
D)Social Security numbers were always used with an additional ID.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
20
The trial judge has to decide is an expert's testimony is

A)reliable and relevant.
B)accurate and accessible.
C)cogent and comprehensive.
D)clear and correct.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
21
Cybercrime statues were proactively developed by states and the federal government when law enforcement officers realized that they would help prevent jury confusion.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
22
The world's largest computer network is

A)cyberspace.
B)the Web.
C)the Internet.
D)hyperspace.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
23
The citizens' group that has taken on the task of helping refine notions of privacy and legality as they relate to telecommunications and other computer-based media is the

A)Computer Security Institute (CSI).
B)Anti-Phishing Working Group.
C)American Cryptography Association.
D)Electronic Frontier Foundation (EFF).
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
24
A computer virus is a program designed to invade a computer system and modify its operation or alter the information it stores.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
25
Cybercrime simply refers to any crime that violates any federal or state cybercrime legislation.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
26
Technology is used by both crime fighters and law breakers.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
27
The distinctions between different types of computer malware are primarily based on how much damage they cause.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
28
Most viruses hide inside executable computer software in the "boot sectors" of storage media.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
29
America's first cohesive national cyber security system for identifying,analyzing,and prioritizing emerging vulnerabilities and threats is called the

A)United States Computer Emergency Readiness Team (US -CERT).
B)Comprehensive National Cybersecurity Initiative (CNCI).
C)National Cyber Alert System.
D)National Infrastructure Protection Center (NIPC).
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
30
ISPs are mainly involved in doing which of the following?

A)hosting websites
B)building the Internet
C)providing Internet access
D)helping users find information
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
31
The situation in which prosecution was impeded by the inability of many state and local police departments to skillfully investigate cybercrimes has been changing because of

A)the efforts of the FBI and the Department of Justice.
B)federal grants to fund local cybercrime units.
C)the opening of a new training facility for local officers.
D)cybercrime becoming a greater priority at the local level.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
32
Because it guarantees freedom of speech and the question of what constitutes speech has been raised,the _______ to the Constitution may need reinterpretation.

A)First Amendment
B)Second Amendment
C)Third Amendment
D)Fourth Amendment
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
33
The yearly cost of cybercrime is over half a billion dollars.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
34
The first person to be indicted for writing something on the Internet was charged by the FBI after posting threats and released after 29 days in prison based on his writings being protected under the free speech clause.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
35
The amount of illegal software in use worldwide is only about a fifth of all software.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
36
Which of these questions speaks to the issue of security in our "persons,houses,papers,and effects,against unreasonable searches and seizures"?

A)Does e-mail qualify as speech?
B)What are papers?
C)Does social networking qualify as peaceable assembling?
D)Are forum postings a form of speech?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
37
Cybercrime could potentially lead to personal injury.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
38
AFIS allows investigators to

A)take a 360-degreee image of a bullet.
B)match a suspect's fingerprints more quickly.
C)create a simulated,computerized crime scene.
D)safely disable a motor vehicle's electrical system.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
39
The crimes of the Information Age require review of the Constitution because

A)basic definitions must be reassessed.
B)criminal penalties must be raised.
C)new amendments must be considered.
D)the concept of crime must be updated.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
40
Cybercriminals can work internationally through the Internet without passports,plane tickets,or associates,while law enforcement officials

A)require partnerships for international investigations.
B)accrue extensive travel costs chasing them.
C)are unable to trace the convoluted paths across the Internet.
D)are thwarted by their limited jurisdictions.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
41
Someone who uses computers for exploration or exploitation is known as a(n)________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
42
The standard of scientific acceptability applicable to the gathering of evidence in criminal cases is known as the ________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
43
When criminals misuse another individuals' personal information to commit fraud,they are guilty of ________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
44
Gang members are using ________ to circumvent court injunctions that forbid members from meeting face-to-face.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
45
Identity theft became a federal crime in 2008.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
46
The development of telecommunication technology has raised new questions about individual's rights and protections.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
47
Identify theft has indirect costs,such as costs related to prevention and mitigation.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
48
Computer viruses,worms,and spyware are examples of ________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
49
Identity theft affects people's decisions about shopping online.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
50
"Warez" are the results of the unauthorized and illegal copying of software programs,or ________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
51
Money today is really only information.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
52
Computer-related crime and cybercrime are two names for the same thing.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
53
Computer hacking began with the rise of mass-market personal computers in the late 1970s.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
54
An expert in cybercrimes believes that specialized sanctions,such as confiscating and limiting access to computer equipment,is necessary to deter cybercrimes.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
55
Hacker Kevin Mitnick developed a method of getting a trusted insider to perform an action that enables a hacking attack and referred to it as ________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
56
Most hackers are young adolescent males.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
57
When investigators use biological residue found at a crime scene for genetic comparison to aid in identifying criminal suspects,they are using ________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
58
Someone who sends an official-looking e-mail message to try to steal valuable personal information is engaging in ________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
59
The meeting place of computer technology and human psychology that exists only within electronic networks is called ________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
60
Web sites are immune to use for criminal activity.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
61
Also known as risk analysis,________ involves a thorough assessment of perils facing an organization.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
62
The combination of computer hardware and software that attempts to duplicate a skilled investigator's decision-making processes when analyzing evidence and recognizing patterns is known as a(n)________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
63
How might similarities between hacking and playing computer games blur the lines between entertainment and crime?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
64
Explain how developments in communications have brought into question definitions of long-standing.Which terms need to be redefined and why?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
65
Why might cybercrime appeal to people who would not commit crimes like burglary or robbery?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
66
Describe the range of cybercriminals known as hackers.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
67
How is the use of computer technology by criminals and law enforcement similar too and different from the use of other types of technology to perpetrate crimes and bring perpetrators to justice?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
68
Do you agree with President Barack Obama that "the cyberthreat is one of the most serious economic and national security challenges we face as a nation"?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
69
One method of protecting electronic communications is ________,a method for encoding information to make it unreadable to all but the intended recipient.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
70
The network diagnostic tool developed by the FBI to intercept suspect personal communications delivered via wireless services is called ________.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
71
Compare and contrast phone phreaking with phishing.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
72
The sequential record of system activities surrounding an event,a(n)_______,enables investigators to reconstruct,review,and examine what happened during a computer crime after the fact.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
73
What effects do you think the use of DNA evidence will have on the justice system in the United States in the long run?
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
74
Match between columns
Explorers
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Explorers
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Explorers
Individuals who focus on defeating copy protection either to play games or as a game
Explorers
Individuals who make unplanned forays into evolving technology for the sake of discovery
Explorers
Individuals who hack for fun and without intending harm
Explorers
Malicious individuals who cause damage to computer systems without seeking gain
Game Players
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Game Players
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Game Players
Individuals who focus on defeating copy protection either to play games or as a game
Game Players
Individuals who make unplanned forays into evolving technology for the sake of discovery
Game Players
Individuals who hack for fun and without intending harm
Game Players
Malicious individuals who cause damage to computer systems without seeking gain
Pioneers
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Pioneers
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Pioneers
Individuals who focus on defeating copy protection either to play games or as a game
Pioneers
Individuals who make unplanned forays into evolving technology for the sake of discovery
Pioneers
Individuals who hack for fun and without intending harm
Pioneers
Malicious individuals who cause damage to computer systems without seeking gain
Vandals
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Vandals
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Vandals
Individuals who focus on defeating copy protection either to play games or as a game
Vandals
Individuals who make unplanned forays into evolving technology for the sake of discovery
Vandals
Individuals who hack for fun and without intending harm
Vandals
Malicious individuals who cause damage to computer systems without seeking gain
Addicts
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Addicts
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Addicts
Individuals who focus on defeating copy protection either to play games or as a game
Addicts
Individuals who make unplanned forays into evolving technology for the sake of discovery
Addicts
Individuals who hack for fun and without intending harm
Addicts
Malicious individuals who cause damage to computer systems without seeking gain
Scamps
Individuals who are addicted to hacking and computer technology, and possibly to illegal drugs as well
Scamps
Adventurous individuals who delight in the challenge of breaking into computer systems that are remote or particularly secure
Scamps
Individuals who focus on defeating copy protection either to play games or as a game
Scamps
Individuals who make unplanned forays into evolving technology for the sake of discovery
Scamps
Individuals who hack for fun and without intending harm
Scamps
Malicious individuals who cause damage to computer systems without seeking gain
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
75
Match between columns
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 1996 to protect minors from harmful material on the Internet
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 2002 to create new sentencing guidelines for cybercriminals
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
Digital Theft Deterrence and Copyright Damages Improvement Act
Passed in 1997 to criminalize willful infringement of copyrighted works (including via electronic means) even when no financial benefit is reaped
Communications Decency Act (CDA)
Passed in 1996 to protect minors from harmful material on the Internet
Communications Decency Act (CDA)
Passed in 2002 to create new sentencing guidelines for cybercriminals
Communications Decency Act (CDA)
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
Communications Decency Act (CDA)
Passed in 1997 to criminalize willful infringement of copyrighted works (including via electronic means) even when no financial benefit is reaped
No Electronic Theft Act (NETA)
Passed in 1996 to protect minors from harmful material on the Internet
No Electronic Theft Act (NETA)
Passed in 2002 to create new sentencing guidelines for cybercriminals
No Electronic Theft Act (NETA)
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
No Electronic Theft Act (NETA)
Passed in 1997 to criminalize willful infringement of copyrighted works (including via electronic means) even when no financial benefit is reaped
Cyber Security Enhancement Act (CSEA)
Passed in 1996 to protect minors from harmful material on the Internet
Cyber Security Enhancement Act (CSEA)
Passed in 2002 to create new sentencing guidelines for cybercriminals
Cyber Security Enhancement Act (CSEA)
Passed in 1999 to amend the Copyright Act and increase the damages that could be awarded for copyright infringement
Cyber Security Enhancement Act (CSEA)
Passed in 1997 to criminalize willful infringement of copyrighted works (including via electronic means) even when no financial benefit is reaped
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 75 flashcards in this deck.