Deck 12: Computer Crime

Full screen (f)
exit full mode
Question
Hacking can include all of the following except:

A)a bank employee checking credit history of bank customers.
B)using the telephone book to target doctors and searching their credit records.
C)checking TRW records for credit ratings.
D)tapping into local credit bureau records.
Use Space or
up arrow
down arrow
to flip the card.
Question
WAREZ sites encourage which of the following activities?

A)Violent acts
B)Contact with terrorist cells
C)Copying of copyrighted programs
D)Buying cheap foreign computers
Question
The acronym EFT stands for:

A)east fun target.
B)ending fund target.
C)earned from trust.
D)electronic funds transfer.
Question
Which of the following is unlikely to be classed as a computer crime?

A)Phony tax returns
B)Public intoxication
C)Blowing up toilets
D)Pedophilia
Question
Hackers first targeted:

A)the stock exchange.
B)the government.
C)schools.
D)banks.
Question
Toll fraud is:

A)avoiding a fee to use a road.
B)avoiding phone charges.
C)avoiding cable television fees.
D)avoiding internet services fees.
Question
According to Cressey, embezzlers go through a process that includes all of the following except:

A)opportunity.
B)secret financial problem.
C)remorse.
D)rationalizing.
Question
The Masters of Destruction (MOD) corrupted the databases of all of the following companies except:

A)ITT.
B)Sprint.
C)Pacific Bell.
D)Nynex.
Question
In 1996 the General Accounting Office said that hackers had targeted the Pentagon __________ times and gained entry 2 of every 3 times.

A)250,000
B)100,000
C)half a million
D)a million
Question
Showoffs have which of the following qualities?

A)Goal is to do the most damage
B)Goal is fun, not profit
C)Coasting along looking for doors to open
D)Goal is breaking in
Question
According to the text, the broad but somewhat more specific definition of computer crime can be described as:

A)destruction, theft, unauthorized or illegal use, modification or copying of information, programs, services, equipment, or communication networks.
B)a crime that could not be committed without a computer.
C)crimes using a computer to accomplish their ends.
D)a computer or its periphery used as a weapon.
Question
The term "hacker" can include all of the following except a(n):

A)norm-violating individual.
B)accidental tourist.
C)curious individual.
D)computer virtuoso.
Question
According to the text, all of the following have been invaded to get credit and debit card information except:

A)Western Union.
B)Yahoo.com.
C)America Online.
D)Egghead.com.
Question
Malicious hacking, affecting national security, has affected all of the following except:

A)White House computers.
B)Pacific Fleet computers.
C)Congressional committee files.
D)Boeing Corporation.
Question
The average bank robbery nets approximately:

A)$1,200.
B)$3,200.
C)$5,400.
D)$2,100.
Question
Crackers break which of the following?

A)Government security codes
B)Copy protection codes
C)Password codes
D)Access codes
Question
In the 1970s a Los Angeles-based insurance company programmed its computers to do all of the following except:

A)fail to pay legitimate claims.
B)sell fake policies to other companies.
C)issue policies on people who did not exist.
D)use reinsurance to disguise indebtedness.
Question
Computer crimes may have begun with the use of the blue box. The blue box involved which instrument?

A)Phones
B)Radios
C)Televisions
D)Stereos
Question
Which one of the following crimes could not be classified as a computer crime?

A)Espionage
B)Scams
C)Assault
D)Sabotage
Question
An authorized program planted on a computer is known as a(n):

A)Trojan Horse.
B)Achilles Heel.
C)Sword of Damocles.
D)Cyclops Eye.
Question
Computer crime has become increasingly globalized.
Question
Mafiaboy activities affected all of the following except:

A)eBay.
B)Buy.com.
C)Yahoo.com.
D)Amazon.com.
Question
Mafiaboy turned out to be a(n) ____________ Canadian.

A)25-year-old
B)12-year-old
C)15-year-old
D)18-year-old
Question
The Nigerian scam involved:

A)contributions to overthrow Communist Nigerian government.
B)a fake charity for Nigerian refugees.
C)a smuggling operation to get dissenters out of Nigeria.
D)a ploy using deceptive emails and stories of sequestered funds
Question
International cooperation in regards to stealing software has faltered because of minimal economic impact.
Question
Stealth programs:

A)hide from virus protection programs.
B)are triggered at some point in the future.
C)infect the host computer.
D)multiply.
Question
Playpen-mentality hackers have the goal of breaking in.
Question
Back door programs:

A)allow entry at will.
B)insert advertisements.
C)attack specific programs.
D)look for passwords.
Question
The most effective computer crimes are those perpetrated by experts.
Question
The broad but somewhat more specific definition of computer crime can be described as destruction, theft, unauthorized or illegal use, modification or copying of information, programs, services, equipment, or communication networks.
Question
Computers can be used to commit all of the following kinds of espionage except:

A)social.
B)international.
C)political.
D)industrial.
Question
The average computer crime nets $500,000.
Question
Trap doors or sleepers allow a technique known as salami slicing to loot accounts. This is taking small amounts from a lot of people.
Question
Viruses:

A)infect the host computer.
B)multiply.
C)are triggered at some point in the future.
D)hide from virus protection programs.
Question
Reasons for the Nigerian scam include all of the following except:

A)it has a well-educated populace.
B)it is an oil-rich country with a healthy economy.
C)it uses English as a first language.
D)it is a well-populated country.
Question
So-called first generation phone "phreaks" used their talents to steal from checking accounts.
Question
If you send out 30,000 e-mails and get only one response, but you get $40.00 per response and you send out a half a million e-mails, how much money can you make?

A)$750,000
B)$100,00
C)$1 million
D)$250,000
Question
The magnitude of Mafiaboy damage was estimated to exceed at least:

A)$1 billion.
B)$100 million.
C)$10 million.
D)$500 million.
Question
Coasting along looking for doors to open is a quality of cookbook hackers.
Question
A less formal definition of computer crime would be those crimes using a computer to accomplish its ends.
Question
Michael Bloomberg was the subject of a computer crime. He was asked to pay a sum of money in return for being advised as to the perpetrator's methods that were used to invade his system. In street crime terms this would be extortion.
Question
Shoulder surfers ________________ access codes at airports.
Question
Identify and describe the four phases of computer viruses. Practically speaking, how do these stages work and what are the implications in the context of computer crime?
Question
Explain what the "dark figure" of computer crime means.
Question
The dark figure of crime is crime that is ________________.
Question
The easiest way into a computer is through the ________________ door.
Question
A simple but effective form of electronic bank robbery used ________________ slips.
Question
Discuss why early computer hackers exhibited few characteristics of secondary deviance as defined by Lemert.
Question
The virus that overwrites the system, and whose data files download a password-thieving program, destroys files, and is sent to everyone on the contact list was called ________________ Letter.
Question
Describe the three state process defined by Cressey that characterized typical embezzlers.
Question
A denial of service ________________ shuts down a Web site.
Question
A reason for the Nigerian scam is that it has a well-educated populace.
Question
Logic bombs hide from virus protection programs.
Question
Worms infect the ________________ computer.
Question
The fastest-spreading virus is a variation of the________________ virus.
Question
Only the ________________ computer criminals are caught.
Question
Mafiaboy got caught because he was traced through emails.
Question
The motivation for the Masters of Destruction was money.
Question
Sniffer programs look for ________________.
Question
Examine both domestic and international computer espionage and give examples of each. Why do you think it is more difficult to determine the extent of international espionage?
Question
Evaluate and explain why you think it has become so much easier to commit identity theft.
Question
Distinguish between the following: Trojan Horse, sniffer, spyware, trap door, logic bomb, stealth virus, and phishing.
Question
Match between columns
Toll fraud
Avoid phone charges
Toll fraud
Steal access codes at airports
Toll fraud
Unreported crime
Toll fraud
Look for programs
Toll fraud
Allow reentry at will
Toll fraud
Multiplies
Toll fraud
Infect the host computer
Toll fraud
Hide from virus protection programs
Shoulder surfers
Avoid phone charges
Shoulder surfers
Steal access codes at airports
Shoulder surfers
Unreported crime
Shoulder surfers
Look for programs
Shoulder surfers
Allow reentry at will
Shoulder surfers
Multiplies
Shoulder surfers
Infect the host computer
Shoulder surfers
Hide from virus protection programs
Sniffer programs
Avoid phone charges
Sniffer programs
Steal access codes at airports
Sniffer programs
Unreported crime
Sniffer programs
Look for programs
Sniffer programs
Allow reentry at will
Sniffer programs
Multiplies
Sniffer programs
Infect the host computer
Sniffer programs
Hide from virus protection programs
Stealth programs
Avoid phone charges
Stealth programs
Steal access codes at airports
Stealth programs
Unreported crime
Stealth programs
Look for programs
Stealth programs
Allow reentry at will
Stealth programs
Multiplies
Stealth programs
Infect the host computer
Stealth programs
Hide from virus protection programs
Back-door programs
Avoid phone charges
Back-door programs
Steal access codes at airports
Back-door programs
Unreported crime
Back-door programs
Look for programs
Back-door programs
Allow reentry at will
Back-door programs
Multiplies
Back-door programs
Infect the host computer
Back-door programs
Hide from virus protection programs
Dark figure of crime
Avoid phone charges
Dark figure of crime
Steal access codes at airports
Dark figure of crime
Unreported crime
Dark figure of crime
Look for programs
Dark figure of crime
Allow reentry at will
Dark figure of crime
Multiplies
Dark figure of crime
Infect the host computer
Dark figure of crime
Hide from virus protection programs
Worm
Avoid phone charges
Worm
Steal access codes at airports
Worm
Unreported crime
Worm
Look for programs
Worm
Allow reentry at will
Worm
Multiplies
Worm
Infect the host computer
Worm
Hide from virus protection programs
Virus
Avoid phone charges
Virus
Steal access codes at airports
Virus
Unreported crime
Virus
Look for programs
Virus
Allow reentry at will
Virus
Multiplies
Virus
Infect the host computer
Virus
Hide from virus protection programs
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/63
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Computer Crime
1
Hacking can include all of the following except:

A)a bank employee checking credit history of bank customers.
B)using the telephone book to target doctors and searching their credit records.
C)checking TRW records for credit ratings.
D)tapping into local credit bureau records.
A
2
WAREZ sites encourage which of the following activities?

A)Violent acts
B)Contact with terrorist cells
C)Copying of copyrighted programs
D)Buying cheap foreign computers
C
3
The acronym EFT stands for:

A)east fun target.
B)ending fund target.
C)earned from trust.
D)electronic funds transfer.
D
4
Which of the following is unlikely to be classed as a computer crime?

A)Phony tax returns
B)Public intoxication
C)Blowing up toilets
D)Pedophilia
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
5
Hackers first targeted:

A)the stock exchange.
B)the government.
C)schools.
D)banks.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
6
Toll fraud is:

A)avoiding a fee to use a road.
B)avoiding phone charges.
C)avoiding cable television fees.
D)avoiding internet services fees.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
7
According to Cressey, embezzlers go through a process that includes all of the following except:

A)opportunity.
B)secret financial problem.
C)remorse.
D)rationalizing.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
8
The Masters of Destruction (MOD) corrupted the databases of all of the following companies except:

A)ITT.
B)Sprint.
C)Pacific Bell.
D)Nynex.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
9
In 1996 the General Accounting Office said that hackers had targeted the Pentagon __________ times and gained entry 2 of every 3 times.

A)250,000
B)100,000
C)half a million
D)a million
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
10
Showoffs have which of the following qualities?

A)Goal is to do the most damage
B)Goal is fun, not profit
C)Coasting along looking for doors to open
D)Goal is breaking in
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
11
According to the text, the broad but somewhat more specific definition of computer crime can be described as:

A)destruction, theft, unauthorized or illegal use, modification or copying of information, programs, services, equipment, or communication networks.
B)a crime that could not be committed without a computer.
C)crimes using a computer to accomplish their ends.
D)a computer or its periphery used as a weapon.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
12
The term "hacker" can include all of the following except a(n):

A)norm-violating individual.
B)accidental tourist.
C)curious individual.
D)computer virtuoso.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
13
According to the text, all of the following have been invaded to get credit and debit card information except:

A)Western Union.
B)Yahoo.com.
C)America Online.
D)Egghead.com.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
14
Malicious hacking, affecting national security, has affected all of the following except:

A)White House computers.
B)Pacific Fleet computers.
C)Congressional committee files.
D)Boeing Corporation.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
15
The average bank robbery nets approximately:

A)$1,200.
B)$3,200.
C)$5,400.
D)$2,100.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
16
Crackers break which of the following?

A)Government security codes
B)Copy protection codes
C)Password codes
D)Access codes
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
17
In the 1970s a Los Angeles-based insurance company programmed its computers to do all of the following except:

A)fail to pay legitimate claims.
B)sell fake policies to other companies.
C)issue policies on people who did not exist.
D)use reinsurance to disguise indebtedness.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
18
Computer crimes may have begun with the use of the blue box. The blue box involved which instrument?

A)Phones
B)Radios
C)Televisions
D)Stereos
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
19
Which one of the following crimes could not be classified as a computer crime?

A)Espionage
B)Scams
C)Assault
D)Sabotage
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
20
An authorized program planted on a computer is known as a(n):

A)Trojan Horse.
B)Achilles Heel.
C)Sword of Damocles.
D)Cyclops Eye.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
21
Computer crime has become increasingly globalized.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
22
Mafiaboy activities affected all of the following except:

A)eBay.
B)Buy.com.
C)Yahoo.com.
D)Amazon.com.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
23
Mafiaboy turned out to be a(n) ____________ Canadian.

A)25-year-old
B)12-year-old
C)15-year-old
D)18-year-old
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
24
The Nigerian scam involved:

A)contributions to overthrow Communist Nigerian government.
B)a fake charity for Nigerian refugees.
C)a smuggling operation to get dissenters out of Nigeria.
D)a ploy using deceptive emails and stories of sequestered funds
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
25
International cooperation in regards to stealing software has faltered because of minimal economic impact.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
26
Stealth programs:

A)hide from virus protection programs.
B)are triggered at some point in the future.
C)infect the host computer.
D)multiply.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
27
Playpen-mentality hackers have the goal of breaking in.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
28
Back door programs:

A)allow entry at will.
B)insert advertisements.
C)attack specific programs.
D)look for passwords.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
29
The most effective computer crimes are those perpetrated by experts.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
30
The broad but somewhat more specific definition of computer crime can be described as destruction, theft, unauthorized or illegal use, modification or copying of information, programs, services, equipment, or communication networks.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
31
Computers can be used to commit all of the following kinds of espionage except:

A)social.
B)international.
C)political.
D)industrial.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
32
The average computer crime nets $500,000.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
33
Trap doors or sleepers allow a technique known as salami slicing to loot accounts. This is taking small amounts from a lot of people.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
34
Viruses:

A)infect the host computer.
B)multiply.
C)are triggered at some point in the future.
D)hide from virus protection programs.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
35
Reasons for the Nigerian scam include all of the following except:

A)it has a well-educated populace.
B)it is an oil-rich country with a healthy economy.
C)it uses English as a first language.
D)it is a well-populated country.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
36
So-called first generation phone "phreaks" used their talents to steal from checking accounts.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
37
If you send out 30,000 e-mails and get only one response, but you get $40.00 per response and you send out a half a million e-mails, how much money can you make?

A)$750,000
B)$100,00
C)$1 million
D)$250,000
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
38
The magnitude of Mafiaboy damage was estimated to exceed at least:

A)$1 billion.
B)$100 million.
C)$10 million.
D)$500 million.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
39
Coasting along looking for doors to open is a quality of cookbook hackers.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
40
A less formal definition of computer crime would be those crimes using a computer to accomplish its ends.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
41
Michael Bloomberg was the subject of a computer crime. He was asked to pay a sum of money in return for being advised as to the perpetrator's methods that were used to invade his system. In street crime terms this would be extortion.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
42
Shoulder surfers ________________ access codes at airports.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
43
Identify and describe the four phases of computer viruses. Practically speaking, how do these stages work and what are the implications in the context of computer crime?
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
44
Explain what the "dark figure" of computer crime means.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
45
The dark figure of crime is crime that is ________________.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
46
The easiest way into a computer is through the ________________ door.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
47
A simple but effective form of electronic bank robbery used ________________ slips.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
48
Discuss why early computer hackers exhibited few characteristics of secondary deviance as defined by Lemert.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
49
The virus that overwrites the system, and whose data files download a password-thieving program, destroys files, and is sent to everyone on the contact list was called ________________ Letter.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
50
Describe the three state process defined by Cressey that characterized typical embezzlers.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
51
A denial of service ________________ shuts down a Web site.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
52
A reason for the Nigerian scam is that it has a well-educated populace.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
53
Logic bombs hide from virus protection programs.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
54
Worms infect the ________________ computer.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
55
The fastest-spreading virus is a variation of the________________ virus.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
56
Only the ________________ computer criminals are caught.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
57
Mafiaboy got caught because he was traced through emails.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
58
The motivation for the Masters of Destruction was money.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
59
Sniffer programs look for ________________.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
60
Examine both domestic and international computer espionage and give examples of each. Why do you think it is more difficult to determine the extent of international espionage?
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
61
Evaluate and explain why you think it has become so much easier to commit identity theft.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
62
Distinguish between the following: Trojan Horse, sniffer, spyware, trap door, logic bomb, stealth virus, and phishing.
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
63
Match between columns
Toll fraud
Avoid phone charges
Toll fraud
Steal access codes at airports
Toll fraud
Unreported crime
Toll fraud
Look for programs
Toll fraud
Allow reentry at will
Toll fraud
Multiplies
Toll fraud
Infect the host computer
Toll fraud
Hide from virus protection programs
Shoulder surfers
Avoid phone charges
Shoulder surfers
Steal access codes at airports
Shoulder surfers
Unreported crime
Shoulder surfers
Look for programs
Shoulder surfers
Allow reentry at will
Shoulder surfers
Multiplies
Shoulder surfers
Infect the host computer
Shoulder surfers
Hide from virus protection programs
Sniffer programs
Avoid phone charges
Sniffer programs
Steal access codes at airports
Sniffer programs
Unreported crime
Sniffer programs
Look for programs
Sniffer programs
Allow reentry at will
Sniffer programs
Multiplies
Sniffer programs
Infect the host computer
Sniffer programs
Hide from virus protection programs
Stealth programs
Avoid phone charges
Stealth programs
Steal access codes at airports
Stealth programs
Unreported crime
Stealth programs
Look for programs
Stealth programs
Allow reentry at will
Stealth programs
Multiplies
Stealth programs
Infect the host computer
Stealth programs
Hide from virus protection programs
Back-door programs
Avoid phone charges
Back-door programs
Steal access codes at airports
Back-door programs
Unreported crime
Back-door programs
Look for programs
Back-door programs
Allow reentry at will
Back-door programs
Multiplies
Back-door programs
Infect the host computer
Back-door programs
Hide from virus protection programs
Dark figure of crime
Avoid phone charges
Dark figure of crime
Steal access codes at airports
Dark figure of crime
Unreported crime
Dark figure of crime
Look for programs
Dark figure of crime
Allow reentry at will
Dark figure of crime
Multiplies
Dark figure of crime
Infect the host computer
Dark figure of crime
Hide from virus protection programs
Worm
Avoid phone charges
Worm
Steal access codes at airports
Worm
Unreported crime
Worm
Look for programs
Worm
Allow reentry at will
Worm
Multiplies
Worm
Infect the host computer
Worm
Hide from virus protection programs
Virus
Avoid phone charges
Virus
Steal access codes at airports
Virus
Unreported crime
Virus
Look for programs
Virus
Allow reentry at will
Virus
Multiplies
Virus
Infect the host computer
Virus
Hide from virus protection programs
Unlock Deck
Unlock for access to all 63 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 63 flashcards in this deck.