Cyber Crime and Cyber Terrorism

RefreshedRabbit avatar
RefreshedRabbit
·
·
Download

Start Quiz

Study Flashcards

10 Questions

What is a common feature of pyramid schemes in the digital age?

Professional-looking Web sites and official-sounding Web addresses

What is the primary goal of phishing scams?

To trick victims into providing financial information

How has the Internet affected harassment and bullying?

The Internet has proven to be a perfect medium for this type of behavior

What is the main distinction between the computer as instrument and the computer as incidental?

Whether the computer is the primary instrument of the crime or merely facilitates it

What type of criminal enterprise has clearly benefited from the Internet?

Child pornography

What is an example of a crime that could fall under the category of the computer as incidental?

Loan sharking

How has the Internet affected the communication of criminal organizations?

It has enabled key communication for the sale and exchange of illegal goods and services

What is a common goal of crimes that fall under the category of the computer as instrument?

To obtain financial information or commit financial fraud

What is a challenge in identifying which crimes fall under which category?

The emergence of the Internet has complicated the classification of crimes

What is an example of a crime that uses the computer as an instrument?

Phishing

Study Notes

Cyber Crime and Cyber Terrorism

  • Cybercrime and cyber terrorism are evolutionary and fundamentally different from other subjects due to their rapid growth and changing nature.
  • The Covid-19 pandemic and Russia-Ukraine war have significantly impacted the scope and impact of cybercrime and cyber terrorism.

Defining the Terms

  • The prefix "cyber" refers to anything related to computers or computer networks.
  • Cybercrime and cyberterrorism encompass a range of crimes committed in the fields of information technology and computer networks.
  • Malware includes viruses, worms, Trojan horses, spyware, and adware, which aim to disrupt computer services, collect sensitive information, or gain access to private computers.

Overview of Cybercrime

  • Cybercrime has increased dramatically in recent years.
  • There is inconsistency in defining computer crime offenses and a lack of systematic data collection on offenses.
  • Offenses vary in character, from clear criminality to acts where culpability is less clear.
  • The global nature of networking offenses complicates the situation.

The Reality of Increased Cybervictimization

  • The exponential growth of e-commerce and online financial transactions has increased threats from outsiders.
  • The greatest threats may come from insiders or outsiders.
  • The number of cybercrime victims is expected to grow substantially.

Changes to Cybervictimization and the Emergence of Cyber Terror

  • Cybercrime and cyberterrorism are on parallel tracks, with cyberterrorism posing a grave threat.
  • The National Infrastructure Protection Plan defines both "acts of terrorism" and "cyberthreats" as important evolving threats to critical infrastructures.

The Computer as Target

  • Crimes where the computer is the target include:
    • Denial of expected service (DoS) attacks, which seek to deny legitimate users access to their data or computer.
    • Network intrusions that alter data, targeting server owners or business operations.
    • Computer vandalism, including defacement or alteration of a website, causing loss of revenue and public embarrassment.

The Computer as Instrument

  • Crimes where the computer is used as an instrument of the crime include:
    • Theft, which can be the use of proprietary services without payment.
    • Fraud, which exploits trust in business transactions and can be perpetrated by buyers, sellers, or peers.
    • Pyramid schemes, which have found new legitimacy through professional-looking websites.
    • Phishing, which uses convincing fraudulent websites to track victims and obtain financial information.
    • Threats, harassment, and bullying, which have found a "perfect" medium in the internet.

The Computer as Incidental

  • Crimes where the computer is incidental to the crime, but facilitates it, include:
    • Loan sharking, drug rings, money laundering, and production and distribution of child pornography.
    • Luring victims, which has been facilitated by the internet.
  • There is no clear distinction between when the computer is incidental to the crime and when it is an instrument of the crime.

This quiz covers the evolving topics of cybercrime and cyber terrorism, including their impact on society and notable events such as the Covid-19 pandemic and Russia-Ukraine war.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Cybercrime Prevention
9 questions

Cybercrime Prevention

SignificantAndradite avatar
SignificantAndradite
Cybercrime Quiz
5 questions

Cybercrime Quiz

UnwaveringStarlitSky avatar
UnwaveringStarlitSky
Cybercrime Quiz
8 questions

Cybercrime Quiz

AccomplishedStream3784 avatar
AccomplishedStream3784
Cybercrime Quiz
5 questions

Cybercrime Quiz

ResplendentMorganite avatar
ResplendentMorganite
Use Quizgecko on...
Browser
Browser