6227933091 | Expanded use of SS numbers... | it is the primary reason for the ease of identity theft. | 0 | |
6227937853 | NOT a component of information warfare. | propaganda | 1 | |
6227941584 | True or false. Research has shown that most criminals fall into stage 3 or 4 of Kohlberg's stages of moral development. | False. They fall into stage 1 or 2 for criminals and stage 3 or 4 for noncriminal. | 2 | |
6227948396 | True or false. Espionage as service actors are usually better trained and better financed than state actors and typically do not leave forensic traces of their activities. | False. This is true of state actors who do not leave forensic traces behind and are more professional. | 3 | |
6227953829 | Websites that are commonly infected | small business websites, victim of script kiddies. | 4 | |
6228001044 | Information Age | 1975+. The gathering and transmission of information. | 5 | |
6228037758 | Malware | destructive software embedded in a system or network. | 6 | |
6228043258 | Research generally focuses on... | mechanisms and techniques used to commit crime, rather than than on offenders and the offenses they commit. | 7 | |
6228102518 | Donn Parker | the first person to comment on the feasibility and potential of cyber security. | 8 | |
6228134243 | Large variations of cyber crime estimates exist because... | it is difficult to place monetary value on intellectual property and there are multiple levels of costs. | 9 | |
6228221695 | Biggest threat to companies are... | insiders. They know how the company works and often have high-level credentials to steal products and information. Also, they're less likely to be caught. | 10 | |
6228275009 | Computer as a target | denial of service one would expect or the alteration of data. | 11 | |
6228277686 | Computer as the instrument of crime | Used to obtain other criminal means. A target hack. | 12 | |
6228290734 | Computer as incidental/accompanying to crime | it facilitates a crime. Relies on computer technology. | 13 | |
6228302978 | Crimes associated with the prevalence of computers | victims of cyber crime increase. | 14 | |
6228376100 | Terrorism | the pre-planned use or threat to use violence by individuals or sub-national groups to obtain political or social goals by intimidating large scale audiences. Their motive is important. | 15 | |
6228379974 | Domestic Terrorism | home directed, home-grown, and more prevalent. | 16 | |
6228378962 | Transnational Terrorism | venue country targets another country. | 17 | |
6228412579 | Reasons cyber terrorism is ignored... | lack of information and a lack of understanding. Victimization is ignored and results in revenue loss. | 18 | |
6228431553 | Mass media's role in cyber terrorism... | does not use correct terminology and does not know the difference between hacking and cyber terrorism. | 19 | |
6228471863 | Cyberterrorism | a premeditated, politically, or ideologically motivated attack or threat of attack against information, computer systems, computer programs, and data that can result in violence against civilian targets. | 20 | |
6228475262 | 6 components of information warfare (psy-elec-mil-physi-secur-info) | psychological operations, electronic warfare, military deception, physical destruction, security measures, and information attacks | 21 | |
6228477940 | Terrorism is defined by... | the nature of the act, not by the nature of the perpetrators or the nature of their cause. | 22 | |
6228481956 | "Hacktivism" | a hacker whose action is aimed at promoting a political or social cause. Characterized by website defacement, vandalism, and chaos. | 23 | |
6228495622 | What has facilitated the expansion of almost every traditional form of crime? | cybercrime. | 24 | |
6228497631 | Stuxnet | (2009) a virus used to infect the operating systems of specific command and control devices primarily found within the pumps and gas centrifuges used in the Natanz nuclear enrichment facilities in Iran. | 25 | |
6228515571 | Flame | (2012) a large program that was written primarily for espionage and information gathering. It allowed the attackers to seek and secure drawings, plans, policies, and other documents stored in a computer or network. | 26 | |
6228519231 | Information attacks are... | less destructive, but more disruptive (think simply: attacking information is not a physical, destructive, thing). | 27 | |
6228521338 | Virus | piece of code that attaches itself to other instructions within a computer like software application codes or booting systems. | 28 | |
6228524562 | Distributed Denial-of-Service (DDoS) Attack | stab taken by a cyber attacker to thwart the legitimate usage of a service. Destruction and changing configuration information for a system, expenditure of resources needed for legit operation, and the actual physical changing of network elements. | 29 | |
6228527195 | Intrusions | any set of actions that endanger the integrity, confidentiality, or availability of a computer resource. | 30 | |
6228562382 | Facilitation of attack encompasses | things such as communication via the internet by terrorist groups. | 31 | |
6228564752 | Data Hiding | a.k.a. stenography. Includes an assortment of methods for secret communications that can conceal the fact that a message even exists at all. | 32 | |
6228579718 | Cryptography | methodology to secure and protect information from unwanted eyes and unauthorized use. Generally used in conjunction with data hiding. (think kryptonite laser eyes protecting computer information) | 33 | |
6228580831 | Propaganda and Promotion | pursued via the Internet because it remains largely unregulated and has the potential to reach so many organizations. | 34 | |
6228583156 | Cyberterror is at its greatest when | considered in conjunction with other terrorist actions. | 35 | |
6228585110 | The Russian Perspective | view cyber capabilities as tools of information warfare, which combines intelligence, counterintelligence, disinformation, and electronic warfare, debilitation of communications, degradation of navigation, psychological pressure, and destruction of enemy computer capabilities. Similar to hacktivism, cyber aggression, and cybercrime. | 36 | |
6228624894 | The Chinese Perspective | information warfare is necessary to support their government objectives and strategy. Heavily engaged in critical U.S. infrastructure. | 37 | |
6228629939 | Choice Theory | individuals commit crime due to a rational choice, by weighing the risks and benefits of committing the act. | 38 | |
6228636334 | Why was Choice Theory popular in the late 1970s? | the positive school came into question, crime rates were increasing, and there was an emphasis on punishment, not rehabilitation. | 39 | |
6228638760 | Risks of Choice Theory are | apprehension and punishment, which must outweigh the benefits, to stop an individual from committing an act. | 40 | |
6228642284 | Routine Activities Theory | based on rational choice and was developed by Cohen and Felson. Crime occurs when there is a convergence in time and space . | 41 | |
6228647836 | 3 factors of the Routine Activities Theory: | a motivated offender (hacker), a suitable target (a vulnerable computer system), and the absence of a capable guardian (inadequate software protection). | 42 | |
6228664693 | Deterrence | comes from choice theory and says offenders commit crime because they make a choice to do so. | 43 | |
6228668883 | General Deterrence | seeks to discourage would-be offenders through the threat of punishment. | 44 | |
6228670082 | Specific Deterrence | designed to impose a sanction on a convicted offender in order to prevent him or her from continuing to commit criminal acts in the future. | 45 | |
6228676101 | Cognitive Development Theory | individuals develop in a sequential manner. Kohlberg says there are sequential stages of moral reasoning. | 46 | |
6228678454 | Stage 1 (Kohlberg) | punishment and obedience orientation stage. (the obedience to power and rules) | 47 | |
6228680474 | Stage 2 (Kohlberg) | hedonistic orientation stage. (meeting one's needs & allowing others to do the same) | 48 | |
6228680475 | Stage 3 (Kohlberg) | interpersonal concordance stage. (good intentions and motives for others) | 49 | |
6228680476 | Stage 4 (Kohlberg) | law and order orientation stage. (doing duty to society) | 50 | |
6228681390 | Stage 5 (Kohlberg) | social contract, legalistic orientation stage. (upholding rules agreed upon by society) | 51 | |
6228681391 | Stage 6 (Kohlberg) | orientation to universal ethical principles stage. (obligation to principles) | 52 | |
6228737135 | Antisocial Personality Disorder | a pervasive pattern of disregard for and the violation of the right of others that begins in childhood or early adolescence and continues into adulthood. Correct term for psychopath or sociopath. | 53 | |
6228739842 | Pedophilia and Computers | comes from an interest in computers due to existing pedophilia and an interest in pedophilia as a result of viewing these types of images online. | 54 | |
6228749022 | Strain Theory | society instills a desire to achieve in citizens (the American Dream) and those who do not have equal opportunity are strained and more likely to be criminal. | 55 | |
6228753332 | What does Merton identify as the goal in Strain Theory? | economic success. | 56 | |
6228755123 | Conformity | accepting goals of society and try to work harder, not deviant. | 57 | |
6228763616 | Ritualism | rejects goal of economic success, but still works hard legally. | 58 | |
6228764750 | Innovation | accepts goal of economic success, but finds illegal ways to obtain this. | 59 | |
6228766746 | Retreatism | no goal and no work, given up. | 60 | |
6228768997 | Rebellion | no goal or means and works against the system. | 61 | |
6228772157 | General Strain Theory according to Agnew | failure to achieve goal, removal of positive stimuli, and addition of negative stimuli. | 62 | |
6228774046 | "Relative Deprivation" | offers an explanation why white collar crimes may occur. | 63 | |
6228774861 | 3 ways to cope | minimizing the importance of goals, negative outcomes, or accepting responsibility. | 64 | |
6228782827 | Social Process Theories focus on | analyzing the impact of certain factors on crime. | 65 | |
6228784601 | Learning Theory | individuals commit crime including computer crime, because they learn the attitudes, skills, and rationalizations necessary to commit these acts. | 66 | |
6228788103 | Sutherland's Differential Association Theory | crime comes from social interaction. | 67 | |
6228790316 | Aker's Differential Reinforcement Theory | process whereby one is exposed to normative definitions that are relatively more favorable or unfavorable to illegal or law-abiding behavior. | 68 | |
6228793081 | Sykes and Matza's techniques of Neutralization/Drift Theory | learning can facilitate criminal behavior. Most criminals hold conventional values, norms, and beliefs, but must learn to neutralize the values before committing crimes. | 69 | |
6228794883 | 5 techniques of neutralization | denial of responsibility, denial of injury, denial of victim, condemnation of condemners, and appeal to higher loyalties. | 70 | |
6228797136 | Subculture | values, norms, and beliefs that differ from the dominant culture. | 71 | |
6228799592 | What should hacking balance? | secrecy and status as hacking is an illegal act. | 72 | |
6228803061 | Virus Writers are looking for... | money, fame, attention, competition, and fun. It is a learned enterprise and skills are developed through trial and error and writers are unlikely to ever meet face-to-face. | 73 | |
6228825853 | Social Control Theory | assumes people will violate the law, but is looking into why this is so. It has been found that the strength of an individual's ties to conventional individuals and society is a factor when choosing to violate the law. | 74 | |
6228829558 | Gottfredson and Hirschi's Self-Control Theory | argues that person's tendency to commit crimes can be found in his or her level of self-control. Instilled by age 8. | 75 | |
6228832466 | Innovation Hacking | assisting investigators and law enforcement officers in understanding the way hackers think. | 76 | |
6228835626 | What is the most frequent online activities of legitimate hackers? | communication and association. | 77 | |
6228838776 | Youth Phenomenon | this is a normal part of life, youths are digital natives. | 78 | |
6228840437 | Hacker | individual with a profound interest in computers and technology that has used this knowledge to access computer systems without authorization from the systems owners. Authorization is key. | 79 | |
6228843885 | What is responsible for the creation, distribution, and facilitation of modern piracy? | hacking. | 80 | |
6228846177 | What is an example of illegitimate hacking? | breaking into military and government systems and stealing millions of dollars from major banks. | 81 | |
6228849123 | Social Engineering | based on the use of the telephone by acquiring sensitive information from the human running the machine rather than using advanced computer skills to beat the electronic security. A confidence scam. | 82 | |
6228851615 | What is a common form of social engineering that was popular in the 1980s? | phreaking. | 83 | |
6228856215 | Where did the term "hack" come from? | MIT in the 1950s. The term for an elaborate college prank. | 84 | |
6228865775 | What was the media and society's past fear of hackers? | they were known to take control of computers and leave taunting messages to legitimate users frightening the public. | 85 | |
6228902167 | Mass media's impact on hacking... | portrayal of hackers by the media was often incorrect as they used "hacker" to describe all electronic trespassers and vandals. Often only the worst-case scenarios for hacking or network intrusion are published, and not juvenile-level hacking. | 86 | |
6228923685 | True or false. Federal statute makes it a crime to knowingly use false credentials or access devices or a "protected" computer. | True. | 87 | |
6228925895 | Network Intrusion | reading or browsing through confidential files and in doing so, creates a copy of the file. Browsing may be theft, but they did not deprive the owner of the data or the use of the data. | 88 | |
6228928407 | Hacker Subculture | shares a set of values defined in the hacker ethic and may define the efforts to be "prosocial". They report learning experiences, including problem solving and educating others about security vulnerabilities. | 89 | |
6228996228 | True or false. Hacking causes little criminal damage. | True. Their criminal actions are based on their motives and adherence to hacker subculture values, some elements of the hacker subculture do not condone what they define as computer crime. | 90 | |
6228998763 | Cyber criminals are mostly associated with... | fraud, scamming, and embezzlement. | 91 | |
6228999282 | Cracker | malicious hacker. | 92 | |
6229000999 | Script Kiddies | target persons with inoffensive and uninteresting information on their websites. They are concerned with bragging and attacking each other or anyone else who draws their wrath. Use pre-made systems and will troll chat rooms. | 93 | |
6229002019 | White Hat Hacker | ethical hacker. | 94 | |
6229007141 | Grey Hat Hackers | typically behaves in ethical manner, but sometimes indulges in illicit activity. | 95 | |
6229009059 | Black Hat Hackers | a cracker or malicious hacker. May also be someone with a good deal of skill over script kiddies. Quite open with ideas, concepts, and training on new methodologies and tactics for attacking specific systems or spying with new products. | 96 | |
6229013162 | Hacktivists | use of hacker skills and attitudes to convey a political message. | 97 | |
6229014602 | Benign Hack | hiding the incoming university president's office door with a bulletin board. MIT origin. | 98 | |
6229016171 | Elaborate Hack | building a full-sized replica police car on top if a domed building complete with a working light bar and a ticket for parking illegally. MIT origin. | 99 | |
6229038271 | Hacker Origin | 1960s: hackers of this time believed information should be free to all to understand how things work and can be improved. | 100 | |
6229040354 | Levy's Roots of Hacker Culture | 1. Access to computers. 2. Free information. 3. Mistrust of authority. 4. Judged by hacking. 5. Art & beauty on computers. 6. Life changing. | 101 | |
6229062145 | Bulletin Board System (BBS) | late 1970s, hackers could come together online and share and discuss information on the first personal computer communication system. | 102 | |
6229072518 | Focus of law enforcement in the 1980s: | malicious hackers as prominent hacker groups broke the law during this time, including Mitnick. | 103 | |
6229076446 | Why is it difficult to between legitimate hacking and illegitimate hacking? | human behavior is dynamic and contextual. | 104 | |
6229078767 | 5 social norms of hacker subculture (tech-know-com-cat-law) | technology, knowledge, commitment, categorization, and law or legality of hacking | 105 | |
6229082790 | Knowledge is showcased at... | hacker conferences. | 106 | |
6229083617 | Commitment | the study and practice of hacking techniques in order to show skill. | 107 | |
6229084606 | Categorization | attitudinal components, must be in a certain state of mind or spirit. | 108 | |
6229093791 | True of false. Concern over potential law violations appears to have little effect on hacker's behavior. | True. | 109 | |
6229126081 | What justifications are being used when speaking out about illegal applications? | Warnings! were issues on Russian websites for virus writers as well as similar justifications at Defcon, especially when the presenter's content had rather obvious and serious illegal aspects. | 110 | |
6229133287 | Espionage | theft of intellectual property (IP) for monetary gain. Prey upon technical and social vulnerabilities. | 111 | |
6229134452 | IP | a legal concept that refers to the creations of the mind (patent and art). | 112 | |
6229142961 | Hackers focus on... | functionality and stability (race to get product out $$$) without focusing on security and process control. | 113 | |
6229145230 | Industrial Espionage | the misappropriation of trade secrets related to or included in a product that is produced for or placed in commerce to the economic benefit of anyone other than the owner with the knowledge or intent that the offense will injure the owner of that trade secret. | 114 | |
6229147238 | Economic Espionage | the misappropriation of trade secrets with the knowledge or intent that the offense will benefit a foreign government, foreign instrumentality, or foreign agent. Includes stealing, copying, transmitting, etc. | 115 | |
6229149444 | Corporate Espionage | occurs primarily between different types of organizations and is conducted by corporate spies infiltrating the target organization eavesdropping on competitor communications, digging though trash for discarded draft reports, and planting wiretaps on phones or computerized logging devices on accessible computers. | 116 | |
6229155588 | Economic Espionage Act of 1996 (EEA) | first federal act to define and enforce penalties for trade secret theft and implemented a fine. Corporations who suspect that they are victims of espionage schemes may request an FBI investigation. | 117 | |
6229157627 | Espionage as a Service (Eaas) | a group of sophisticated criminals (often from a cartel or family) collects as much information as possible on as many high-value targets as possible and then sells that information to as many competitors ad interested parties as possible. | 118 | |
6229163801 | Criminal activities related to corporate espionage are prosecuted under federal statues including.. | the U.S. Patriot Act, Computer Fraud and Abuse Act of 1986, as well as Electronic Eavesdropping. | 119 | |
6229165938 | FBI on lost money | we are losing billions every year to foreign and domestic competitors and related criminal elements. They use "cover" organizations to engage in business relationships to build and abuse trust, or by other means like bribery, theft, and hacking. e.g.). The Straggler Group in the tourism industry. | 120 | |
6229170185 | American Society of Industrial Services (ASIS) | issued a survey, Trends of Proprietary Information Loss, to businesses that showed that the theft of their IP resulted in damages ranging from $10,000 to more than $5.5 million and that their IP was compromised regardless of format. | 121 | |
6229171881 | Organized Crime | any group having some manner of a formalized structure and whose primary objective is to obtain money through illegal activities and such groups maintain their position through the use of actual or threatened violence, corrupt public officials, graft, & extortion. Usually have a significant impact on their region and attack legitimate businesses. | 122 | |
6229177633 | What percentage of failed businesses are due to employee theft and business bankruptcies? | 95% of failed businesses and 30% of businesses bankruptcies are due to employee theft. | 123 | |
6229186253 | Employee theft preys upon... | a permissive environment plus a misplacement of trust. Primarily due to the misappropriation of cash and/or non-cash by employees through various forms of fraud. | 124 | |
6229199142 | How long does it typically take for crime to be committed on the job? | 62 months. It takes another 32 months to be caught. | 125 | |
6229214794 | Low and Slow Approach | taking a little over a long period of time, reduces the chance of being caught. Also called smurfing. | 126 | |
6229218296 | Sabotage | category of insider threat that describes an individual taking revenge against an organization primarily because they are angry. Current or former employees, contractors, business partners, or affiliates intentionally exceed or misuse authorized level of access to networks or systems with the intention of harm. 86% hold technical positions. | 127 | |
6229222850 | Characteristics of employees that commit sabotage hold responsibilities such as: | technical issues, management, and planning. | 128 | |
6229230039 | Sabotage's number 1 motivator is a | disgruntled employee with unmet expectations. | 129 | |
6229236050 | Social media is used to | communicate and collect intelligence. Takes advantage of e-mail as it is a transit point for a mine of information. Information is then posted on the underground market for sale, buyer may use information for many types of cyber crimes. | 130 | |
6229239772 | Dragnets are circumvented for what reason? | to communicate without being detected. | 131 | |
6229243883 | What economic, political, and social factors in Africa helped to develop African criminal enterprises into global threats? | computer waste was imported to Africa and the people there used the scraps to advance their technology. | 132 | |
6229257153 | Nigerian Criminal Enterprise (NCE) | famous for financial fraud and schemes for friendship, especially through email. | 133 | |
6229259997 | The Nigerian Crime Initiative | uses joint task-forces in 6 major cities to stop the NCE. | 134 | |
6229261463 | Asian Criminal Enterprises evolved from | Chinese tongs which was a group of early Chinese-American immigrants in cities across the west. Often speak several languages, operate highly sophisticated criminal operations, and have extensive financial capabilities. | 135 | |
6229265604 | Traditional Criminal Enterprises | Chinese triads based in China. | 136 | |
6229280444 | Nontraditional Criminal Enterprises | Japanese Yakuza which are based in the U.S include the Chinese tongs, triad affiliates, and Asian street gangs. | 137 | |
6229282685 | What is the largest organized crime group in the world? | Japanese Yakuza with over 100,000 registered members. Focus is on drug trafficking, gambling, prostitution, and loan sharking. | 138 | |
6229286064 | Corporate Fashion | an effort to increase efficiency and effectiveness by defining roles, reporting structure, and authority. | 139 | |
6229315215 | What region of organized crime poses a new threat to the U.S.? | Balkan organized crime. They follow traditional clan structure. | 140 | |
6229318477 | Traditional Clan Structure | clans develop in specific territories, governed by the "code", which values loyalty and secrecy. Led by a central leader who still has ties to the Balkan region. | 141 | |
6229320283 | Eurasian Criminal Enterprises | group of criminals born in or with family from the former Soviet Union or Central Europe. Began in 1970s with "thieves in law". | 142 | |
6229333515 | What are Russian groups favored cyber crimes? | online fraud, which includes online banking, phishing, and other financial fraud spamming. | 143 | |
6229339409 | Italian Organized Crime | La Cosa Nostra (LCN) or the Mafia. Illegally came to the U.S. and in the past 200 years has become one of the most notorious and widespread of all criminal activities with approximately 3,000 members in the U.S | 144 | |
6229343336 | What is a unique characteristic of Italian Organized Crime? | they are known to collaborate with other organized crime groups and it is estimated that their worldwide criminal activities are worth more than $100 billion annually. | 145 | |
6229347336 | What are Middle Eastern Criminal Enterprises known for? | theft of financial fraud rings. Some groups have no relation to terror and are only looking to make money. | 146 | |
6229349630 | Cybercrime is a new concept for what organized crime group? | Mexican and South American drug trafficking. It is used today to make their organizations more secure, capable, and efficient. There are more problems in a face-to-face transactions | 147 | |
6229357185 | What do Mexican cartels needs to get the best current and emerging technology and supporting infrastructure? | an enormous cash flow. | 148 | |
6229360105 | Tor | is needed to access the deep web. It links participating servers and websites together while encrypting all communications between each piece. Real-time criminal transactions, drug deals, weapon sales, human trafficking coordination, murder for hire contracts, and solicitations for hacker services can be found here. Other services are sold such as malware code, botnet leasing, and performing DDOS attacks. | 149 | |
6229363306 | The Dark Web is | untraceable and difficult to access for the regular Internet user. | 150 | |
6229365482 | 2 types of exploit kits | Incognito 2.0 and Bomb | 151 | |
6229366493 | Silk Road | the eBay of drugs and illegal contraband. | 152 | |
6229369155 | Bitcoins | an electronically secure payment form that is digitally signed and anonymous. | 153 | |
6229372803 | What abilities does a cyber crime master have? | the ability to collect data. | 154 | |
6229374092 | Cyber criminals are commonly | males who dress casually, are intelligent, independent, college-educated, and pale skinned. | 155 | |
6229377227 | Drug Lords typically | publicly display wealth, lives a materialistic lifestyle, is cold, brutish, and very likely to smoke tobacco products. | 156 | |
6229382669 | Why is white collar crime typically ignored? | it doesn't illicit the same feelings as traditional crime. | 157 | |
6229403531 | Street Crime | made up of homicide, rape, armed robbery, and aggravated assault and is what gets media attention. | 158 | |
6229406145 | Who was the first to distinguish between street crime and crimes of the privileged class in the late 1940s? | Sutherland. | 159 | |
6229407576 | White Collar Crime | committed by society's elite - people with the economic wherewithal and status to shape the criminal law in their favor and avoid detection and punishment. | 160 | |
6229423801 | The media focuses on what type of crime? | blue collar crime because it makes better stories. Blue collar crime costs only $14 billion yearly, while white collar crime costs $250 billion yearly. | 161 | |
6229430464 | Problems in white collar crime include | a lack of white collar crime laws and this type of crime usually affects corporations, and the public does not feel bad for them | 162 | |
6229433538 | Embezzlement | unlawful misappropriation for personal use of money, property, or some other thing of value that has been entrusted to an offender's care, custody, or control. A violation of trust. | 163 | |
6229436447 | Typical characteristics of an embezzler | not a person of high social status. Typically someone who managed the financial affairs of the social elite. | 164 | |
6229437193 | How do modern day embezzlers differ from past embezzlers? | used to be a female bank teller, but today, they're more likely to be men, ages 30-50. | 165 | |
6229454399 | Cressey's 4 step process: | 1. Experiencing financial strain that can't be alleviated through legitimate means. 2. Alleviates their problem via embezzlement. 3. Must posses the technical knowledge to perform the act. 4. Use of "neutralization techniques" to overcome lingering guilt. | 166 | |
6229462632 | Is embezzlement a "computer-assisted" crime or a "computer-focused" crime? | a "computer-assisted" crime. | 167 | |
6229466319 | The modern day embezzler is | an "internal perpetrator" or an authorized user of computer systems who uses legitimate access to computer files to commit theft. | 168 | |
6229468740 | The advent of technologically driven financial management techniques may have... | narrowed the pool of potential embezzlers to those individuals who possess the special ability to do this. | 169 | |
6229470099 | Corporate Espionage | any theft of proprietary business information through spying or deception, particularly the theft of "trade secrets". Targeted in civil courts. | 170 | |
6229482520 | Trade Secrets | any proprietary information that is of value to a commercial enterprise because that information provides a competitive advantage over business rivals. | 171 | |
6229486217 | Corporate Insiders | persons who have legitimate access to a company's computer networks, such as employees, information technology personnel, or corporate executives. 85% carried out by insiders. May use information for blackmail money. | 172 | |
6229487310 | Corporate Outsiders | persons who crack into a corporation's computer data networks without any form of legitimate access of rights. | 173 | |
6229488905 | Ubiquitous email use has | employee exchanges readily accessible corporate data available to cyberspace hackers. | 174 | |
6229503089 | EEA 1st offense targets | and attempts to enforce espionage crimes originating from foreign governments and businesses by creating criminal penalties for those who engage in these acts. | 175 | |
6229503984 | EEA 2nd offense targets | and enforces domestic espionage between competing U.S. firms by making the theft of trade secrets involved in interstate commerce a federal crime. | 176 | |
6229505535 | Money Laundering | the act of concealing the source of assets that have been illegally obtained. Primary objective is to hide the source and ownership of such funds through the creation of a seemingly legitimate history or paper trail. | 177 | |
6229860318 | Traditionally money laundering was accomplished through | cash that was illegally obtained and could be physically transported. The launder could quickly transform hard currency into legitimate real property like real estate or commercial interests. Launderers also turn to a method called "smurfing" which involves the division of large amounts of cash into smaller denominations so as to conceal its common origin | 178 | |
6229876196 | What are 2 primary cash transfer institutions? | FedWire (federal government) and CHIPS (private banking companies). | 179 | |
6229880573 | e-cash | an electronic replacement for cash. Law enforcement fear that the increasing use of cashless systems may promote unique "cyberlaundering" schemes that are more difficult to detect and defend against. | 180 | |
6229884627 | Bank Secrecy Act of 1970 (BSA) | requires banks and other financial institutions to file records concerning suspicious financial transactions over $10,000. 1986 Money Laundering Control Act works to close certain loopholes in the BSA. | 181 | |
6230267417 | Skimming Devices | attached to ATMs and read credit card numbers and record the data. Sold in carding markets. | 182 | |
6230349480 | Violations of the Identity Theft and Assumption Deterrence Act may be punishable by up to how many years? | 15 years in prison. | 183 | |
6230388537 | Fraud schemes committed over the internet are simply | new takes on old themes. Chain letter hoaxes, confidence schemes, and bait-and-switch con games are now performed over an electronic medium. | 184 | |
6230394709 | Financial Institution Fraud | attempts to conceal the truth from deposit and lending institutions to gain money. | 185 | |
6230413294 | Confidence Schemes | most common and involve a breach of personal trust. | 186 | |
6230414417 | Online Auction Fraud | widely reported Internet fraud by a large margin. | 187 | |
6230419918 | Phishing | attempt to lure or hook potential victims to fraudulent websites for the purpose of gathering sensitive personal information. Usually says an account has been compromised or needs maintenance. | 188 | |
6230486823 | True or false. There is no centralized data base that collects information on the damage viruses leave. | True. | 189 | |
6230487819 | More time, energy, and resources, are spent on what than anything else? | anti-virus software. Viruses create fear for the general public, and fear sells security systems. | 190 | |
6230492051 | Psuedo-Virus Expert | a person who proclaims expertise in office workgroups around the world, claiming they know about viruses and how to prevent them. False-authority syndrome. | 191 | |
6230496492 | Fusion of Responsibility | someone else will do it, or it won't be me. | 192 | |
6230502406 | How to virus writers attack systems? | they are opportunistic and chose to attack systems at their weakest and most vulnerable points. | 193 | |
6230504119 | Damage | most important variable of a virus or malicious code; graded based on the potential damage they can do. | 194 | |
6230504644 | Level of Vulnerability | ability of the attacker to execute commands on a victim's computer or network, the ability to access data on a remote system, ability to take control of a system and assume another identity, and ability of the attacker to deny service to legitimate traffic on a given system or systems. The weak point of software. | 195 | |
6230531126 | Exposure to Vulnerabilities | ease for the attacker. Potential problems or security holes that are present that would allow an attacker to exploit the vulnerabilities. | 196 | |
6231726512 | Wildness | measures the extent to which a virus is spreading among computer users and systems. | 197 | |
6231731059 | What programs are like any other program and are designed for a specific functions? | viruses and malware. They are written for a variety of noncriminal purposes. | 198 | |
6231737808 | The development of virus construction tools by virus writers allows what? | allows a large number of less sophisticated computer users to write and create viruses. | 199 | |
6231744184 | Virus Construction Set | a utility program intended for creating new computer viruses. | 200 | |
6231747435 | Encryption | the scrambling or encoding of data to prevent reading or tampering with the data. Requires a password or key and can also use "stealth". | 201 | |
6231751808 | How does destructiveness vary? | from virtually harmless to extraordinarily dangerous and malicious. | 202 | |
6231755789 | When was the first virus discovered? | may have been in the late 1960s on early versions of Univac and IBM machines, known as "rabbit" programs. Modern virus was found in the 1980s, correlating with the growth of the PC industry. | 203 | |
6231757317 | How were early viruses spread? | early viruses infected boot sectors and floppy disks and were easy to detect. | 204 | |
6231767799 | Brain | a boot sector virus that was sent out to see how far it would spread and spread via floppy disks. | 205 | |
6231774515 | The spread of viruses increased because... | rapid growth of the Internet, rapid growth and availability of PCs, the availability of the polymorphic engine, and the availability of virus creation tools that first hit in July of 1992. | 206 | |
6231778848 | How are viruses categorized? | by the environment they operate in, the operating system they are targeted at, type of encryption and operating algorithms, and destructiveness. | 207 | |
6231785795 | File Viruses | uses a particular operating system to propagate by parasite, companion, or through link viruses, and infects any type of file, overwrite. | 208 | |
6231788175 | Boot Viruses | attacks boot sector of the system. Operates based on algorithms of starting an operating system upon power on or reboot, after the hardware test, the system reads the boot disk, and passes control to the virus. | 209 | |
6231790185 | Macro Viruses | most commonly associated with business software and infect documents, spreadsheets, databases, and presentation files. Takes advantage of macro languages built into common business software (e.g. Microsoft Office). It creates a new macro, and then redefines one or several of the standard macro. | 210 | |
6231792491 | Network Viruses | attack networks themselves or e-mail systems of the networks in order to spread themselves. Main operating principle is its capability to transfer its code to a remote server or workstation on its own. | 211 | |
6231794991 | Worm | stand-alone piece of code. Term came from Shockwave Rider. It copies itself from one disk to another or copies itself using e-mail or another transport method. May damage or compromise the security of the computer. | 212 | |
6231800685 | Morris Worm (1998) | crippled the internet for several days and exploited buffer overrun flaws. Supposed to run slowly. | 213 | |
6231802033 | Trojan Horse | unauthorized program contained within a legitimate program that performs functions unknown and unwanted by the user. Usually masquerades something desirable like a joke program or legitimate software program. | 214 | |
6231804601 | How does a Trojan Horse work? | a hidden program waits for some computer event to occur, a data to be reached, or some other type of trigger, and then delivers its payload. | 215 | |
6231807987 | Can a Trojan Horse copy itself? | it does not replicate nor does it copy itself, but causes damages or compromises the security of the computer. Can also be viruses or remote control programs that provide complete access to a victim's computer and makes it one of the most accessible weapons that hackers use for an attack. | 216 | |
6231809843 | Adware | program that is essentially a pain to the user that manifests itself in several ways including changes to the browser, redirecting start up pages, replacing the search functions within the browser and generating pop-up ads and frames that are difficult to shut down. | 217 | |
6231812227 | Spyware | applications that send information via the internet to the publishers or programmers for marketing purposes without notification to users. | 218 | |
6231814703 | Where is spyware typically installed? | installed in some functional software and takes advantage of the fact that many software users do not read the end user license agreement or fine print. | 219 | |
6231815694 | Cookies | is a file that contains information about a program, web site, use, or the user's computer. | 220 | |
6231816581 | DoS Attack | uses multiple systems to attack one or more victim systems or website with the intent of denying service to legitimate users wishing to log on or utilize the attacked server. Sends a phony request to the server and overloads it and prevents legitimate traffic. Remarkably effective. | 221 | |
6231821192 | Zombie Machines | used to perform a DoS attack and is compromised on university campuses. | 222 | |
6231825582 | Blended Threats | combines the characteristics of viruses, worms, Trojan horses, and malicious code with server and internet vulnerabilities to initiate, transmit, and spread an attack. Use multiple methods to rapidly spread and cause widespread damage. | 223 | |
6231828598 | What is the essence of a blended attack? | multiple payloads and multiple targets. Experts predict an increase in this. | 224 | |
6231835313 | Botnets | reach very large sizes and may include 1,000s of machines enabling bot operators to engage in a variety of different acts. | 225 | |
6231838306 | An attackers' main motive is what? | acquiring information and data to steal money. Significant profit motives. | 226 | |
6231843883 | What stages of profession do virus writers go through? | go from students and schoolchildren to college students and young adults to professional virus writers. At each stage, destructive capability and technical expertise increases. | 227 |
Digital Crime & Digital Terrorism Midterm Flashcards
Primary tabs
Need Help?
We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.
For general help, questions, and suggestions, try our dedicated support forums.
If you need to contact the Course-Notes.Org web experience team, please use our contact form.
Need Notes?
While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!