10 Questions
What is a common feature of pyramid schemes in the digital age?
Professional-looking Web sites and official-sounding Web addresses
What is the primary goal of phishing scams?
To trick victims into providing financial information
How has the Internet affected harassment and bullying?
The Internet has proven to be a perfect medium for this type of behavior
What is the main distinction between the computer as instrument and the computer as incidental?
Whether the computer is the primary instrument of the crime or merely facilitates it
What type of criminal enterprise has clearly benefited from the Internet?
Child pornography
What is an example of a crime that could fall under the category of the computer as incidental?
Loan sharking
How has the Internet affected the communication of criminal organizations?
It has enabled key communication for the sale and exchange of illegal goods and services
What is a common goal of crimes that fall under the category of the computer as instrument?
To obtain financial information or commit financial fraud
What is a challenge in identifying which crimes fall under which category?
The emergence of the Internet has complicated the classification of crimes
What is an example of a crime that uses the computer as an instrument?
Phishing
Study Notes
Cyber Crime and Cyber Terrorism
- Cybercrime and cyber terrorism are evolutionary and fundamentally different from other subjects due to their rapid growth and changing nature.
- The Covid-19 pandemic and Russia-Ukraine war have significantly impacted the scope and impact of cybercrime and cyber terrorism.
Defining the Terms
- The prefix "cyber" refers to anything related to computers or computer networks.
- Cybercrime and cyberterrorism encompass a range of crimes committed in the fields of information technology and computer networks.
- Malware includes viruses, worms, Trojan horses, spyware, and adware, which aim to disrupt computer services, collect sensitive information, or gain access to private computers.
Overview of Cybercrime
- Cybercrime has increased dramatically in recent years.
- There is inconsistency in defining computer crime offenses and a lack of systematic data collection on offenses.
- Offenses vary in character, from clear criminality to acts where culpability is less clear.
- The global nature of networking offenses complicates the situation.
The Reality of Increased Cybervictimization
- The exponential growth of e-commerce and online financial transactions has increased threats from outsiders.
- The greatest threats may come from insiders or outsiders.
- The number of cybercrime victims is expected to grow substantially.
Changes to Cybervictimization and the Emergence of Cyber Terror
- Cybercrime and cyberterrorism are on parallel tracks, with cyberterrorism posing a grave threat.
- The National Infrastructure Protection Plan defines both "acts of terrorism" and "cyberthreats" as important evolving threats to critical infrastructures.
The Computer as Target
- Crimes where the computer is the target include:
- Denial of expected service (DoS) attacks, which seek to deny legitimate users access to their data or computer.
- Network intrusions that alter data, targeting server owners or business operations.
- Computer vandalism, including defacement or alteration of a website, causing loss of revenue and public embarrassment.
The Computer as Instrument
- Crimes where the computer is used as an instrument of the crime include:
- Theft, which can be the use of proprietary services without payment.
- Fraud, which exploits trust in business transactions and can be perpetrated by buyers, sellers, or peers.
- Pyramid schemes, which have found new legitimacy through professional-looking websites.
- Phishing, which uses convincing fraudulent websites to track victims and obtain financial information.
- Threats, harassment, and bullying, which have found a "perfect" medium in the internet.
The Computer as Incidental
- Crimes where the computer is incidental to the crime, but facilitates it, include:
- Loan sharking, drug rings, money laundering, and production and distribution of child pornography.
- Luring victims, which has been facilitated by the internet.
- There is no clear distinction between when the computer is incidental to the crime and when it is an instrument of the crime.
This quiz covers the evolving topics of cybercrime and cyber terrorism, including their impact on society and notable events such as the Covid-19 pandemic and Russia-Ukraine war.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free