Deck 15: Cyberpatterns: Criminal Behavior on the Internet
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/23
Play
Full screen (f)
Deck 15: Cyberpatterns: Criminal Behavior on the Internet
1
Risk assessment on the Internet works in the same way as in the physical world.
True
2
Individuals who engage in espionage and fraud/abuse are referred to as what?
a. Computer criminals
b. Computer crackers
c. Vandals
d. Hackers
a. Computer criminals
b. Computer crackers
c. Vandals
d. Hackers
Computer criminals
3
The Internet influences victim risk, putting an otherwise low-risk victim at high risk of certain crimes.
True
4
An offender who uses anonymity provided by the Internet and performs covering behavior to avoid detection is an example of risk behavior.
a. Low-
b. Medium-
c. High-
d. Extreme-
a. Low-
b. Medium-
c. High-
d. Extreme-
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is not a goal or criminal profiling in cyber investigations?
a. Giving insight into offender motivations
b. Assessing the dangerousness of the offender
c. Revealing additional sources of evidence
d. All of the above are goals
a. Giving insight into offender motivations
b. Assessing the dangerousness of the offender
c. Revealing additional sources of evidence
d. All of the above are goals
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
6
refers to the process by which a sexual predatory offender gains control over his victim.
a. Manipulation
b. Grooming
c. Exploitation
d. Abuse
a. Manipulation
b. Grooming
c. Exploitation
d. Abuse
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
7
As offenders become more aware of digital forensic techniques, they are employing which of the following concealment tools and techniques?
a. Encryption
b. Misleading file names
c. Disk wiping
d. All of the above
a. Encryption
b. Misleading file names
c. Disk wiping
d. All of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
8
Cybertrails refer to evidence that is consciously left behind by the offender.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
9
It is productive for investigators to view cybertrails as an extension of the physical world.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
10
An offender can use the Internet both proactively and reactively.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
11
It is important for a profiler to consider when digital evidence should be present but is absent.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
12
Criminal profiling can be most useful when a significant amount of information is known about the offender.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is most revealing from a victimology standpoint and may suggest the way the offender crossed cybertrails with the victim?
a. A person's private online hangouts
b. A person's e-mail correspondences
c. A person's instant messaging correspondence
d. A person's Web history
a. A person's private online hangouts
b. A person's e-mail correspondences
c. A person's instant messaging correspondence
d. A person's Web history
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
14
An offender's Web page history may give insight into his or her motive and fantasy.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
15
Investigators are currently encountering a decrease in the amount of digital evidence of witness, victim, and criminal activity.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
16
A child left unattended in an Internet chat room talking with strangers in as example of a --------- risk victim.
A) Low-
B) Medium-
C) High-
D) Extreme-
A) Low-
B) Medium-
C) High-
D) Extreme-
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
17
Similar to crime in the physical world, computer intrusions can be primary and secondary crime scenes, each containing potentially useful information.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
18
To date, the majority of efforts to apply profiling to crimes involving computers have focused on what type of criminal?
a. Computer crackers
b. Computer criminals
c. Vandals
d. All of the above
a. Computer crackers
b. Computer criminals
c. Vandals
d. All of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
19
occurs when one person or program successfully masquerades as another by falsifying data and gains an illegitimate advantage.
a. Hackers
b. Spoofing
c. Exploitation
d. Grooming
a. Hackers
b. Spoofing
c. Exploitation
d. Grooming
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is true regarding the Internet?
a. An offender can use it proactively to enhance MO
b. An offender can use it reactively to avoid detection and capture
c. It provides greater access to victims
d. All of the above
a. An offender can use it proactively to enhance MO
b. An offender can use it reactively to avoid detection and capture
c. It provides greater access to victims
d. All of the above
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
21
Explain the importance of victimology in assessing cybercrimes. Provide an example of online victim activity that may be relevant to an investigation.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
22
Provide 3 examples of ways that criminal profiling can assist with investigations of cybercrimes.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck
23
Define the term cybertrail. Provide 2 examples of techniques that offenders are employing in an attempt to reduce their cybertrails.
Unlock Deck
Unlock for access to all 23 flashcards in this deck.
Unlock Deck
k this deck