Deck 9: Crimes in the Cyber System

Full screen (f)
exit full mode
Question
What role is the computer playing if it is hacked?

A) target of an offense
B) tool for a crime
C) incidental to a crime
D) storage for information about crimes
Use Space or
up arrow
down arrow
to flip the card.
Question
What is usually stolen during theft as a computer crime?

A) information
B) access to subscriptions
C) business plans
D) personal information
Question
The theft of intellectual property is what type of stolen information?

A) confidential business information
B) property protected by cyber security companies
C) information protected by copyright
D) works written for publication but not copyrighted
Question
What computer crime can result from responding to phishing emails?

A) piracy
B) identity theft
C) deletion of data
D) virus
Question
What type of crime do hackers or crackers usually commit?

A) unauthorized access
B) theft as a computer crime
C) cyberterrorism
D) virus introduction
Question
If a computer virus is not introduced into a computer by an intruder, what is the intruder's probable goal?

A) recreational
B) cyberterrorism
C) obtain information
D) protection
Question
If an offender remotely accesses the control systems of an infant formula manufacturer and changes the ingredients with a deadly result, what type of crime has been committed?

A) phishing
B) software crime
C) cyberterrorism
D) hacking
Question
Which of the following cannot be considered a type of software crime?

A) copyright violations
B) counterfeiting
C) piracy
D) child pornography
Question
If someone failed to pay for an item "bought" on eBay, what type of crime would they be committing?

A) internet crime
B) extortion
C) money laundering
D) theft as a computer crime
Question
White-collar cybercrimes are committed at work either by employees or what other actor?

A) clients
B) tech employees
C) employers
D) hired professionals
Question
What is one general characteristic of cybercriminals when they are committing a crime?

A) They work alone or with a network of other offenders.
B) They are paid to commit computer crimes.
C) They are often hired to work inside a company.
D) They work only as part of a crime network.
Question
A group of infected computers online, under the control of one cyber offender at the same time, is known as what type of computer crime?

A) virus
B) network
C) botnet
D) unidentified access
Question
Why do cybercriminals form cybergangs?

A) Being part of a gang helps to expand their skill sets.
B) They are able to keep secrets.
C) It is easier to hide their identities as part of a cybergang.
D) They form because of their expertise.
Question
When cyber offenders steal information for profit, what is one way they sell stolen information?

A) to specific buyers based on what is being sought
B) offer dumps of credit card and/or banking information
C) auction to cybercriminals for buyers wanting specific items
D) check with their networks for buyers
Question
Which explanation for computer crime focuses on the degree of knowledge offenders typically have about computers?

A) peer association explanations
B) opportunity explanations
C) structural changes
D) human factors
Question
A survey by the Ponemon Institute found that the cost of cyber offending was highest in which industries?

A) financial, hospitals, and utilities
B) hospitals, energy, and utilities
C) energy, financial, and hospitals
D) utilities, financial, and energy
Question
Hospitals are particularly vulnerable to what type of cyberattack?

A) malware
B) ransomware
C) virus
D) data loss
Question
Over one-third of companies surveyed in a study on cybercrime attributed some of their cyberattacks to whom?

A) professional hackers
B) cybergangs
C) malicious insiders
D) a lone cyber offender
Question
What issue arises in regards to preventing computer crimes?

A) Offenders have high levels of education.
B) Criminal justice officials are not trained to respond to computer crimes.
C) Offenses occur very quickly.
D) Employees might sense a computer crime occurring.
Question
How do victim characteristics inhibit law enforcement response to computer crimes?

A) Victims try to hide their losses.
B) They can't figure out the extent of the cybercrime.
C) Some victims report the crime against them right away.
D) Victims often don't know that they are victims.
Question
What type of computer crime is most prevalent on college campuses?

A) piracy
B) hacking
C) unauthorized access
D) online stalking
Question
Efforts to punish cybercriminals to prevent them from committing crimes is what type of strategy?

A) employer-based strategies
B) police-based strategies
C) criminal justice system-based strategies
D) retributive strategies
Question
The Computer Fraud and Abuse Act of 1984, broadened in 1996 to make various aspects of computer offending a federal crime, is what strategy for responding to cybercrime?

A) legislative
B) policing
C) retributive
D) hybrid
Question
Which of the following is an employee-based strategy employers use to protect their businesses from computer crime in the workplace?

A) employee-initiated audits of their computer use
B) employees no longer using computers at home
C) employers checking employee usage of databases
D) learning to detect suspicious employee computer behaviors
Question
Why are colleges and universities a possible target for cyber criminals?

A) the financial incentive to target campuses
B) opportunity for various cybercrimes, both attacks and internet crimes
C) piracy and digital piracy opportunities
D) the enormous amount of data collected and stored on campuses
Question
Computer crime and cybercrime refer to computer-related behaviors that are illegal, but not harmful.
Question
Two types of crackers exist, those on the inside of a targeted company and those on the outside.
Question
Piracy is most specifically considered a type of internet crime.
Question
Overpayment fraud is considered theft as a computer crime.
Question
White-collar cybercrime describes crimes that occur outside of an employer's workplace.
Question
The topology of cybercriminals suggests that they may work alone, with a group of associates, or within a network.
Question
Interference with an individual's access to their technology because of cyber offending can cause physical and social consequences for the victim.
Question
Opportunity explanations for computer crimes focus on the ease with which offenses are committed.
Question
Unlike victims of other white-collar crimes that often fail to report their victimization, most victims of computer-related crimes report offenses.
Question
Complex jurisdictional issues encourage cooperation among law enforcement agencies in their efforts to respond to cybercrime.
Question
Analyze the reasons officials have difficulties responding to computer crimes.
Question
Describe three characteristics of cybergangs.
Question
Describe internet piracy.
Question
Compare the motives of hackers versus crackers.
Question
Describe counterfeiting software crimes.
Question
Discuss the issues that complicate responding to cybercrime.
Question
Choose one of the sectors of critical infrastructure and develop a discussion about what the consequences and the costs of a cyber offense on that sector might be.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Crimes in the Cyber System
1
What role is the computer playing if it is hacked?

A) target of an offense
B) tool for a crime
C) incidental to a crime
D) storage for information about crimes
A
2
What is usually stolen during theft as a computer crime?

A) information
B) access to subscriptions
C) business plans
D) personal information
A
3
The theft of intellectual property is what type of stolen information?

A) confidential business information
B) property protected by cyber security companies
C) information protected by copyright
D) works written for publication but not copyrighted
C
4
What computer crime can result from responding to phishing emails?

A) piracy
B) identity theft
C) deletion of data
D) virus
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
What type of crime do hackers or crackers usually commit?

A) unauthorized access
B) theft as a computer crime
C) cyberterrorism
D) virus introduction
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
If a computer virus is not introduced into a computer by an intruder, what is the intruder's probable goal?

A) recreational
B) cyberterrorism
C) obtain information
D) protection
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
If an offender remotely accesses the control systems of an infant formula manufacturer and changes the ingredients with a deadly result, what type of crime has been committed?

A) phishing
B) software crime
C) cyberterrorism
D) hacking
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following cannot be considered a type of software crime?

A) copyright violations
B) counterfeiting
C) piracy
D) child pornography
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
If someone failed to pay for an item "bought" on eBay, what type of crime would they be committing?

A) internet crime
B) extortion
C) money laundering
D) theft as a computer crime
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
White-collar cybercrimes are committed at work either by employees or what other actor?

A) clients
B) tech employees
C) employers
D) hired professionals
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
What is one general characteristic of cybercriminals when they are committing a crime?

A) They work alone or with a network of other offenders.
B) They are paid to commit computer crimes.
C) They are often hired to work inside a company.
D) They work only as part of a crime network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
A group of infected computers online, under the control of one cyber offender at the same time, is known as what type of computer crime?

A) virus
B) network
C) botnet
D) unidentified access
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
Why do cybercriminals form cybergangs?

A) Being part of a gang helps to expand their skill sets.
B) They are able to keep secrets.
C) It is easier to hide their identities as part of a cybergang.
D) They form because of their expertise.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
When cyber offenders steal information for profit, what is one way they sell stolen information?

A) to specific buyers based on what is being sought
B) offer dumps of credit card and/or banking information
C) auction to cybercriminals for buyers wanting specific items
D) check with their networks for buyers
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
Which explanation for computer crime focuses on the degree of knowledge offenders typically have about computers?

A) peer association explanations
B) opportunity explanations
C) structural changes
D) human factors
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
A survey by the Ponemon Institute found that the cost of cyber offending was highest in which industries?

A) financial, hospitals, and utilities
B) hospitals, energy, and utilities
C) energy, financial, and hospitals
D) utilities, financial, and energy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
Hospitals are particularly vulnerable to what type of cyberattack?

A) malware
B) ransomware
C) virus
D) data loss
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
Over one-third of companies surveyed in a study on cybercrime attributed some of their cyberattacks to whom?

A) professional hackers
B) cybergangs
C) malicious insiders
D) a lone cyber offender
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
What issue arises in regards to preventing computer crimes?

A) Offenders have high levels of education.
B) Criminal justice officials are not trained to respond to computer crimes.
C) Offenses occur very quickly.
D) Employees might sense a computer crime occurring.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
How do victim characteristics inhibit law enforcement response to computer crimes?

A) Victims try to hide their losses.
B) They can't figure out the extent of the cybercrime.
C) Some victims report the crime against them right away.
D) Victims often don't know that they are victims.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
What type of computer crime is most prevalent on college campuses?

A) piracy
B) hacking
C) unauthorized access
D) online stalking
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Efforts to punish cybercriminals to prevent them from committing crimes is what type of strategy?

A) employer-based strategies
B) police-based strategies
C) criminal justice system-based strategies
D) retributive strategies
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
The Computer Fraud and Abuse Act of 1984, broadened in 1996 to make various aspects of computer offending a federal crime, is what strategy for responding to cybercrime?

A) legislative
B) policing
C) retributive
D) hybrid
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is an employee-based strategy employers use to protect their businesses from computer crime in the workplace?

A) employee-initiated audits of their computer use
B) employees no longer using computers at home
C) employers checking employee usage of databases
D) learning to detect suspicious employee computer behaviors
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Why are colleges and universities a possible target for cyber criminals?

A) the financial incentive to target campuses
B) opportunity for various cybercrimes, both attacks and internet crimes
C) piracy and digital piracy opportunities
D) the enormous amount of data collected and stored on campuses
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
Computer crime and cybercrime refer to computer-related behaviors that are illegal, but not harmful.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Two types of crackers exist, those on the inside of a targeted company and those on the outside.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Piracy is most specifically considered a type of internet crime.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Overpayment fraud is considered theft as a computer crime.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
White-collar cybercrime describes crimes that occur outside of an employer's workplace.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
The topology of cybercriminals suggests that they may work alone, with a group of associates, or within a network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Interference with an individual's access to their technology because of cyber offending can cause physical and social consequences for the victim.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Opportunity explanations for computer crimes focus on the ease with which offenses are committed.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Unlike victims of other white-collar crimes that often fail to report their victimization, most victims of computer-related crimes report offenses.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
Complex jurisdictional issues encourage cooperation among law enforcement agencies in their efforts to respond to cybercrime.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
Analyze the reasons officials have difficulties responding to computer crimes.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Describe three characteristics of cybergangs.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Describe internet piracy.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Compare the motives of hackers versus crackers.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Describe counterfeiting software crimes.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Discuss the issues that complicate responding to cybercrime.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Choose one of the sectors of critical infrastructure and develop a discussion about what the consequences and the costs of a cyber offense on that sector might be.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.