Podcast
Questions and Answers
Which of the following is a potential threat associated with computer crimes?
Which of the following is a potential threat associated with computer crimes?
Web-based criminal activity exclusively involves theft of personal information.
Web-based criminal activity exclusively involves theft of personal information.
False
What kind of terrorism is mentioned as changing the face of traditional terrorist actions?
What kind of terrorism is mentioned as changing the face of traditional terrorist actions?
Modern terrorism using technology
Computer crimes include threats to personal security such as ______.
Computer crimes include threats to personal security such as ______.
Signup and view all the answers
Match the following terms with their related activities:
Match the following terms with their related activities:
Signup and view all the answers
Which type of crime is characterized by unwanted and repetitive electronic messages?
Which type of crime is characterized by unwanted and repetitive electronic messages?
Signup and view all the answers
Industrial espionage is a practice that only occurs in the financial sector.
Industrial espionage is a practice that only occurs in the financial sector.
Signup and view all the answers
One of the six classifications of motive for computer intruders is ______.
One of the six classifications of motive for computer intruders is ______.
Signup and view all the answers
What is primarily targeted by worms in the context of cyber attacks?
What is primarily targeted by worms in the context of cyber attacks?
Signup and view all the answers
Cyberbullying is an example of web-based criminal activity.
Cyberbullying is an example of web-based criminal activity.
Signup and view all the answers
What era of viruses primarily targeted DOS machines?
What era of viruses primarily targeted DOS machines?
Signup and view all the answers
The __________ is an attack that attempts to overwhelm a server's resources.
The __________ is an attack that attempts to overwhelm a server's resources.
Signup and view all the answers
Match the following crimes with their descriptions:
Match the following crimes with their descriptions:
Signup and view all the answers
Which type of attack uses compromised computers as an army?
Which type of attack uses compromised computers as an army?
Signup and view all the answers
Emails containing unsolicited advertisements represent spam.
Emails containing unsolicited advertisements represent spam.
Signup and view all the answers
What is one of the main characteristics of viruses from the Internet Era?
What is one of the main characteristics of viruses from the Internet Era?
Signup and view all the answers
Which of the following describes ransomware?
Which of the following describes ransomware?
Signup and view all the answers
Less educated users are generally less vulnerable to ransomware attacks.
Less educated users are generally less vulnerable to ransomware attacks.
Signup and view all the answers
What was the ransom amount demanded by the PC Cyborg virus?
What was the ransom amount demanded by the PC Cyborg virus?
Signup and view all the answers
Social engineering techniques, such as shoulder surfing and dumpster diving, are ways to steal __________ information.
Social engineering techniques, such as shoulder surfing and dumpster diving, are ways to steal __________ information.
Signup and view all the answers
Match the following types of information theft with their descriptions:
Match the following types of information theft with their descriptions:
Signup and view all the answers
Which of the following is NOT a method of proprietary information theft?
Which of the following is NOT a method of proprietary information theft?
Signup and view all the answers
Political espionage involves the monitoring of a nation’s internal communications by foreign governments.
Political espionage involves the monitoring of a nation’s internal communications by foreign governments.
Signup and view all the answers
Name one group that is estimated to have intelligence operations targeting the U.S.
Name one group that is estimated to have intelligence operations targeting the U.S.
Signup and view all the answers
What is the primary goal of cyber terrorism?
What is the primary goal of cyber terrorism?
Signup and view all the answers
Child pornography is legal in some states in the U.S.
Child pornography is legal in some states in the U.S.
Signup and view all the answers
Name two reasons why individuals may possess child pornography.
Name two reasons why individuals may possess child pornography.
Signup and view all the answers
Online predators often use ____________ to identify potential victims.
Online predators often use ____________ to identify potential victims.
Signup and view all the answers
What strategy has law enforcement used to combat online child exploitation?
What strategy has law enforcement used to combat online child exploitation?
Signup and view all the answers
Match the following reasons for possession of child pornography with the correct category:
Match the following reasons for possession of child pornography with the correct category:
Signup and view all the answers
Cyber terrorism primarily targets private companies rather than governmental systems.
Cyber terrorism primarily targets private companies rather than governmental systems.
Signup and view all the answers
The use of ___________ and worms is common in cyber terrorism.
The use of ___________ and worms is common in cyber terrorism.
Signup and view all the answers
What is the Salami technique primarily used for?
What is the Salami technique primarily used for?
Signup and view all the answers
IP Spoofing involves mimicking a third party to gain unauthorized access to funds.
IP Spoofing involves mimicking a third party to gain unauthorized access to funds.
Signup and view all the answers
What is insider trading?
What is insider trading?
Signup and view all the answers
The practice of disguising the origins of illegally obtained money is known as __________.
The practice of disguising the origins of illegally obtained money is known as __________.
Signup and view all the answers
Which of the following is an example of a fraudulent instrument?
Which of the following is an example of a fraudulent instrument?
Signup and view all the answers
Match the following neo-traditional crime terms with their definitions:
Match the following neo-traditional crime terms with their definitions:
Signup and view all the answers
Securities fraud primarily relies on accessing public stock information.
Securities fraud primarily relies on accessing public stock information.
Signup and view all the answers
What is the role of technology in fraudulent instruments?
What is the role of technology in fraudulent instruments?
Signup and view all the answers
Which of the following is a form of online auction fraud?
Which of the following is a form of online auction fraud?
Signup and view all the answers
Internet auction fraud primarily affects individuals of a specific gender and social class.
Internet auction fraud primarily affects individuals of a specific gender and social class.
Signup and view all the answers
What technique involves the unauthorized charging of consumers via monthly telecommunication fees?
What technique involves the unauthorized charging of consumers via monthly telecommunication fees?
Signup and view all the answers
In online credit card fraud, _______ involves stealing information from cards via devices installed at ATMs.
In online credit card fraud, _______ involves stealing information from cards via devices installed at ATMs.
Signup and view all the answers
Match the following types of online fraud with their descriptions:
Match the following types of online fraud with their descriptions:
Signup and view all the answers
Which of the following is a form of web-based criminal activity?
Which of the following is a form of web-based criminal activity?
Signup and view all the answers
Identity theft is an example of financial loss associated with computer crimes.
Identity theft is an example of financial loss associated with computer crimes.
Signup and view all the answers
Name one emerging trend in web-based crime.
Name one emerging trend in web-based crime.
Signup and view all the answers
One potential threat to public safety from computer crimes is ______.
One potential threat to public safety from computer crimes is ______.
Signup and view all the answers
Match the following types of online crime with their descriptions:
Match the following types of online crime with their descriptions:
Signup and view all the answers
Which classification of motive does an individual committing industrial espionage primarily fall under?
Which classification of motive does an individual committing industrial espionage primarily fall under?
Signup and view all the answers
Industrial espionage is exclusive to the technology sector.
Industrial espionage is exclusive to the technology sector.
Signup and view all the answers
What is one method used in cyber terrorism?
What is one method used in cyber terrorism?
Signup and view all the answers
Which stage of money laundering involves the return of illicit funds to the legitimate economy?
Which stage of money laundering involves the return of illicit funds to the legitimate economy?
Signup and view all the answers
Frozing accounts is an effective method for combating money laundering.
Frozing accounts is an effective method for combating money laundering.
Signup and view all the answers
What is the term used for using networks to obscure the origins of illicit funds during money laundering?
What is the term used for using networks to obscure the origins of illicit funds during money laundering?
Signup and view all the answers
The process of using technical expertise in cyber crime is decreasingly __________.
The process of using technical expertise in cyber crime is decreasingly __________.
Signup and view all the answers
Match the stages of money laundering with their descriptions:
Match the stages of money laundering with their descriptions:
Signup and view all the answers
What is a significant challenge in enforcing the Internet Gambling Prohibition & Enforcement Act of 2006?
What is a significant challenge in enforcing the Internet Gambling Prohibition & Enforcement Act of 2006?
Signup and view all the answers
Cyberbullying is illegal under federal law in the United States.
Cyberbullying is illegal under federal law in the United States.
Signup and view all the answers
What term refers to the willful, malicious, and repeated harassment of an individual using electronic means?
What term refers to the willful, malicious, and repeated harassment of an individual using electronic means?
Signup and view all the answers
Online pharmacies are used to make legitimate and ______ purchases privately.
Online pharmacies are used to make legitimate and ______ purchases privately.
Signup and view all the answers
Match the following neo-traditional crime terms with their descriptions:
Match the following neo-traditional crime terms with their descriptions:
Signup and view all the answers
Which of the following is a characteristic of online gambling?
Which of the following is a characteristic of online gambling?
Signup and view all the answers
Cyberharassment is defined as an act focusing on the fear caused by the harassment.
Cyberharassment is defined as an act focusing on the fear caused by the harassment.
Signup and view all the answers
What act involves using electronic forms of contact aggressively and repeatedly against someone who cannot easily defend themselves?
What act involves using electronic forms of contact aggressively and repeatedly against someone who cannot easily defend themselves?
Signup and view all the answers
Which of the following describes the use of the Salami technique?
Which of the following describes the use of the Salami technique?
Signup and view all the answers
IP Spoofing is a method used to gain unauthorized access to funds by mimicking a legitimate third party.
IP Spoofing is a method used to gain unauthorized access to funds by mimicking a legitimate third party.
Signup and view all the answers
What is the primary purpose of money laundering?
What is the primary purpose of money laundering?
Signup and view all the answers
Fraudulent instruments include __________ and forgery through technological means.
Fraudulent instruments include __________ and forgery through technological means.
Signup and view all the answers
Match the following neo-traditional crimes with their definitions:
Match the following neo-traditional crimes with their definitions:
Signup and view all the answers
Which of the following is an example of a method used in securities fraud?
Which of the following is an example of a method used in securities fraud?
Signup and view all the answers
The practice of e-Fencing involves buying stolen goods without using technology.
The practice of e-Fencing involves buying stolen goods without using technology.
Signup and view all the answers
What is the main tactic involved in the practice of insider trading?
What is the main tactic involved in the practice of insider trading?
Signup and view all the answers
Study Notes
Web-Based Criminal Activity
- Computer crimes include financial losses, threats to personal security, industrial espionage, international security, and public safety.
- Online crime can involve interference with lawful use of computers, theft of information and copyright infringement, dissemination of contraband or offensive materials, and fraudulent activities.
Malware: Viruses
- Viruses have evolved through different phases: Classical Era, Floppy Era, Macro Era, and Internet Era.
- Internet Era viruses are highly sophisticated and seek out vulnerable systems.
Malware: Worms, DoS, and Botnets
- Worms are commonly used to create DoS attacks.
- DoS and DDoS (Distributed Denial of Service) attacks aim to overload servers.
- Botnets utilize compromised computers to form an army used for theft, extortion, and DDoS attacks.
Malware: Spam
- Spam abuses electronic messaging systems and consumes vast resources.
Malware: Ransomware
- Ransomware encrypts digital resources, making them inaccessible until ransom is paid.
- Successful ransomware attacks depend on user education levels and software sophistication.
Theft of Information, Data Manipulation, and Web Encroachment
- Proprietary information theft can occur through insiders, social engineering, equipment theft, and malware.
- Trade secrets and copyrights are valuable forms of intellectual property that can be stolen by employees, competitors, and governments.
Cyber Terrorism
- Cyber Terrorism involves politically or religiously motivated attacks targeting data compilations, computer programs, and information systems to disrupt services or acquire information.
- Cyber terrorists employ various methods, including viruses and worms, against government institutions.
Neo-Traditional Crime
- Child pornography is difficult to define and prosecute due to First Amendment issues, but it is illegal in all states.
- Child enticement/exploitation often involves online predators using chat rooms to identify vulnerable victims.
- Data Diddling is a method of fraud involving data manipulation, often rerouting funds from multiple accounts.
- Salami technique involves stealing tiny amounts of money from millions of accounts to avoid detection.
- IP Spoofing manipulates data packets to mimic third-party access and gain funds.
Neo-Traditional Crime
- Securities Fraud and Stock Manipulation take advantage of instant access to real-time stock information, leading to day-trading with limited company knowledge.
- Insider trading involves individuals with confidential information using it for personal financial gain.
Neo-Traditional Crime
- e-Fencing utilizes technology for selling stolen goods.
- Fraudulent Instruments include counterfeit and forged materials created using technology.
Ancillary Crimes
- Money Laundering involves deliberate financial transactions to conceal the origins and destination of income.
- Money laundering plays a crucial role in enabling organized crime.
Web-Based Criminal Activity
- Computer crimes include threats to personal security, international security, public safety, financial losses, and industrial espionage.
- Computer crimes also include interference with lawful use of computers, such as DOS attacks, malware use, and cyber vandalism.
- Online crime includes theft of information and copyright infringement, such as industrial espionage.
Neo-Traditional Crime
- Online pharmacies are used to make legitimate and illegitimate purchases of steroids, amphetamines, and painkillers.
- Convenience and privacy contribute to the popularity of online pharmacies.
- Online Gambling is easy to access and conduct, which can lead to problematic gambling by minors.
- The Internet Gambling Prohibition & Enforcement Act of 2006 makes online gambling illegal, but it is difficult to enforce due to lack of public and international cooperation.
- Cyberstalking is stalking that is conducted via electronic communication.
- Cyberharassment focuses on the actual harm suffered by a victim, including the defacement of character.
- Cyberbullying is an aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend himself or herself.
- Cyberbullying is illegal only in some states, not under Federal law.
- Online fraud includes intentional deception, misrepresentation, or falsehood.
- Online auction fraud includes nondelivery of goods, misrepresentation of the condition of an item, hidden charges, and shill bidding.
- Online credit card fraud include skimming and RFID.
- Skimming is installing devices, such as those at ATMs, to steal information from cards.
- RFID involves taking information from "wave and pay" devices.
- Web-cramming is the unauthorized charging of consumers via monthly telecommunication fees.
- ISP Jacking is disconnecting individual users from their selected Internet service providers and redirecting them to illegitimate servers.
- Data Diddling is any method of fraud via data manipulation, most commonly used to redirect or reroute data representing monies or economic exchanges.
- The Salami technique is stealing a fraction of a cent from millions of accounts to go undetected.
- IP Spoofing is manipulating data packets between computers to mimic a third party and falsely gain access to funds.
- Individuals are vulnerable to dissemination of false information, which can be used to trick individuals in purchasing stock at inflated prices.
- Insider trading occurs when individuals with access to confidential information unavailable to the public use it to make stock purchases or sales for personal gain.
- E-Fencing is the sale of stolen goods through technological means.
- Fraudulent instruments, such as counterfeiting and forgery, can be conducted through technological means.
Ancillary Crimes
- Money laundering is a practice that involves deliberate financial transactions to conceal the identity, source, and/or destination of income.
- Money laundering commonly assists organized crime.
- The process of money laundering involves placement, layering, and integration.
- Placement is the point of entry of illicit funds.
- Layering involves using networks to obscure the origins of funds.
- Integration is the return of funds to the legitimate economy.
- Combating money laundering can be accomplished by freezing or forfeiting funds, and holding internet service providers and financial institutions accountable for inadequate security measures.
Conclusions
- Technology both enhances and threatens modern society.
- Computer crime is increasing due to the rise of computers acting as storage warehouses, increasing connectivity and interdependence, decreasing importance of technical expertise, increasing sophistication of threat groups, and government apathy.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore the nuances of web-based criminal activities, including computer crimes that threaten personal security and public safety. Learn about different types of malware such as viruses, worms, and ransomware, along with their impacts on systems and networks. Test your knowledge of online threats and defensive measures.