Chapter 15 Because Cybercrimes Defy Long held Assumptions About The

subject Type Homework Help
subject Pages 9
subject Words 2718
subject Authors Larry J. Siegel

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
1. is a new breed of offenses typically involving the theft and/or destruction of information,
resources, or funds utilizing computers, computer networks, or the Internet.
2. is responsible for the globalization phenomenon or the process of creating transnational
markets, politics, and legal systemsin other words, creating a global economy.
3. The phenomenon is the process of creating transnational markets, politics, and legal systems.
4. Malicious attacks aimed at disrupting, defacing, and destroying technology is known as .
5. crimes are challenging for criminologists to explain because they defy long-held assumptions about
the cause of crime.
page-pf2
6. schemes range from illegally copying material under copyright protection to using
technology to commit traditional theft-based offenses such as larceny and fraud.
7. Internet attacks against an enemy nations technological infrastructure is known as .
8. Using cyberspace for acts of violence, including spying and disrupting an enemy’s computer network is known as
.
9. Trade secrets stolen by a company’s competitors, which can be either domestic or foreign, is a form of computer
crime known as .
10. Using an electronic device or camera on an ATM that copies information from a bank card’s magnetic strip
whenever a customer uses the machine is an example of .
page-pf3
11. Attempts to flood a computer network, thereby preventing legitimate network traffic, is an example of cybercrime
known as a .
12. There are three major types of Internet securities fraud: market manipulation, fraudulent offerings of securities, and
.
13. There are two principal forms of market manipulation, the and the cybersmear.
14. are software programs that have been illegally posted on the Internet for use by members of a group
page-pf4
15. Using the Internet to steal someones identity and/or impersonate the victim in order to conduct illicit transactions
such as committing fraud using the victim’s name is known as .
16. is the illegal buying and/or selling of merchandise on the Internet.
17. To meet the increasing threat of phishing and identity theft, Congress passed the Act of 1998
(Identity Theft Act) to make it a federal crime.
18. Someone who collects and transfers money or goods acquired illegally and then transfers them to a third party is
known as a .
19. Sometimes called "carding" or "brand spoofing," is a scam in which the perpetrator sends out e-
mails that appear to come from legitimate Web enterprises to gain personal information.
page-pf5
20. A malicious software program is known as .
21. Computer are programs that attack computer networks (or the Internet) by self-replicating and
sending themselves to other users, generally via e-mail, without the aid of the operator.
22. Using the Internet to gather information that is considered private and confidential, whether by an
estranged spouse or a foreign business competitor, is termed .
23. Martha and Bo have been having a sexual affair at work, unknown to their respected spouses, and after gaining
what she wanted from the relationship, Martha ended her affair. Bo, still seeking the attention of his lover, begins
to track Martha's every move via Facebook, Twitter, and other social media accounts, as well as tracking her
location through the GPS-monitoring systems of these media outlets. This would be an example of
.
page-pf6
24. is defined as willful and repeated harm inflicted through the medium of
electronic text.
25. Some experts question the existence of and claim that hackers are regularly mistaken for
terrorists.
26. Which of the following statements best reflects cybercrime?
a. As information technology evolves, cybercriminals are rapidly replacing non-cyber offenders.
b. Innovation brings change and, with it, new opportunities to commit crime.
c. Despite the rapid evolution of cybercrime, the justice system has managed to keep pace.
d. Cybercriminals have likely reached the height of innovation in terms of discovering new methods to commit
crime via information technology.
27. Information technology (IT) is the key to the system and is responsible for creating the globalization
phenomenon.
a. political b. Internet
c. economic d. social
page-pf7
28. Why do cybercrimes present a compelling challenge for the justice system and law enforcement community?
a. Cybercrime is rapidly evolving.
b. Cybercrime is difficult to detect through traditional law enforcement channels.
c. Cybercrime demands that agents of the justice system develop technical skills that match those of the
perpetrators.
d. Cybercrime presents a compelling challenge for all these reasons.
29. As the threat of terrorism and cybercrime grows, so too may tolerance for invasions of privacy to combat
these threats. What belief may sway public opinion and justify the use of IT by law enforcement?
a. the belief that there is not much to fear from law enforcements use of IT
b. the belief that IT increases safety and that intrusions into personal space are warranted if lives are saved
c. the belief that IT is not invading homes but gathering information from public spaces
d. all of the above
30. Why do cybercrimes present a significant challenge for criminologists?
a. Because cybercrimes predominantly occur only in industrialized countries.
b. Because, unlike non-cyber crimes, cybercrimes defy accurate measurement.
c. Because cybercrimes defy long-held assumptions about the cause of crime.
d. Because cybercrimes are a function of the social environment.
page-pf8
31. Which type of cybercrime consists of acts aimed at undermining the social, economic, and political system of an
enemy nation?
a. cyberattack b. cyberwar
c. cyberhack d. cyberoffense
32. Not all instances of computer theft and computer fraud fall under existing statues because the property stolen may
be:
a. difficult to recover. b. intangible.
c. difficult to identify. d. shipped overseas.
33. Which type of offenses involves the perpetrator carefully skimming small sums from the balances of a large
number of accounts in order to bypass internal controls and escape detection?
a. financial fraud b. theft of information
c. salami fraud d. software fraud
page-pf9
34. It is difficult to prosecute and control Internet pornography because:
a. Federal legislation has been successfully challenged in the courts under the First Amendment.
b. As soon as one Web site is shutdown, another emerges to fill the gap.
c. Nearly all Internet porn sites are based in foreign countries.
d. Federal legislation has lagged behind the Internet porn industry.
35. Sharing files with friends who did not pay for them is an example of:
a. cyber copying. b. cloning.
c. deceptive copying. d. copyright infringement.
36. A is designed to harass or extort money from legitimate users of an Internet service by threatening to
prevent the user from having access to the service.
a. Theft of service b. Hijack-of-service attack
c. Denial-of-service attack d. Cheating attack
page-pfa
37. Theft through the illegal reproduction and distribution of movies, software, games, and music, is estimated to cost
U.S. industries worldwide each year.
a. $ 20 billion b. $35 billion
c. $ 93 billion d. more than $100 billion
38. This crime occurs when individuals make securities recommendations and fail to disclose that they are being paid
to disseminate their favorable opinions:
a. illegal touting. b. fraudulent offerings.
c. market manipulation. d. deceptive priming.
39. Congress has treated computer-related crime as a distinct federal offense since the passage of what legislation?
a. the National Information Infrastructure
Protection Act in 1996
c. the Frank Abagnale Technology Act in
1998
b. the Counterfeit Access Device and Computer Fraud
and Abuse Law in 1984
d. the Identity Theft and Assumption Deterrence Act in
1998
page-pfb
40. What are “cyber smears and pump and dumps?
a. forms of illegal file sharing b. forms of cyber stalking
c. forms of market manipulation d. forms of denial-of-service attack
41. While many wonder how people can be so easily duped, the governments Internet fraud center receives
200,000 complaints yearly, and Internet scams result in over in losses each year.
a. $10 billion b. $10 million
c. $240 billion d. $240 million
42. Shoplisting is a type of fraud that involves purchasing or finding legitimate retail receipts, stealing the
products listed on the receipts, returning the items to the retailer for store credit or a gift card, and then selling the
gift card on the Internet at a discount for quick cash.
a. phishing b. e-tailing
c. spamming d. vishing
43. When an identity thief creates false e-mails and/or Web sites that look legitimate but are designed to gain illegal
access to a victims personal information, it is called:
a. spamming. b. phishing.
c. mousetrapping. d. warez.
page-pfc
44. Computer worms are similar to viruses except that they use computer networks or the Internet to do what?
a. swat or shoplist merchandise b. rip or “crack security codes
c. crash websites d. self-replicate
45. What is the difference between a Trojan horse and a virus?
a. Trojan horses are benign applications.
b. Trojan horses do not replicate themselves.
c. Trojan horses are not as destructive.
d. Trojan horses can penetrate firewalls.
46. What is the most common form of spam?
a. e-mail b. instant messaging
c. mobile phone messaging d. Usenet newsgroups
47. Some spam can simply be an unwanted advertisement. Under what circumstance can spam become a crime?
a. when it causes emotional distress to a victim
b. when it involves pornography
c. when it causes serious harm to a computer or network
d. when it involves an organized group of spammers
page-pfd
48. Cybercriminals who aim their malicious attacks at disrupting, defacing, and destroying technology that they find
offensive are known as .
a. cyberterrorists b. cybervandals
c. cyberstalkers d. cyberthieves
49. The new phenomenon or form of cyber entertainment called involves the use of spoofing technology to
call 9-1-1 in order to fake a critical emergency, such as hostage situation, that draws a real-life response from law
enforcement.
a. swatting b. pigging
c. cuffing d. copping
50. Which of the following is most true about cyberbullying?
a. Girls are just as likely as boys to be victims. b. Traditional bullying is still more common
than cyberbullying.
c. Cyberbullying has been linked to low self-esteem and
suicidal tendencies.
d. All of the above.
page-pfe
51. Former Notre Dame linebacker Manti Te'o was a victim of what type of cyber act?
a. catfishing b. hogging
c. noodling d. trolling
52. Loverspy is known as:
a. one of the most damaging cyberspying programs ever. b. the high-profile Internet child pornographer.
c. the inventor of catfishing. d. a Trojan horse virus.
53. Edward Snowdens effort to warn the public about the is discussed within the context of
espionage but could be included as governmental cyberspying.
a. NSA spying program
b. Obamacare programs's microchip implant requirement
c. Department of Homeland Securities Internet fraud program
d. Russia's spy network

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.