Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Counseling
Q:
List and describe the various forms of worms and viruses.
Q:
Explain how the Internet has increased stalking and bullying into cyberstalking and cyberbullying. What have been the ramifications of technology on these crimes?
Q:
Explain etailing fraud, and in your explanation, provide your opinion on why and how technology and the Internet has made this crime more profitable.
Q:
List and describe the primary ways that criminals use phishing and identity theft techniques for monetary gain.
Q:
Compare and contrast the different forms of cybercrime for profit.
Q:
Distinguish among cybertheft, cybervandalism, and cyberwar.
Q:
Discuss the concept of cybercrime and why and how it has become important.
Q:
________________ now supplies 90 percent of the world's opium.
Q:
The ______________ are an underground Asian crime group with criminal societies based in Hong Kong. They control secret markets and bus routes and are often involved in money laundering and drug trafficking.
Q:
The ___________________________ Act of 1998 became the first federal statute that made identity theft a crime.
Q:
______________ includes efforts by intelligence agencies to penetrate computer networks of an enemy nation in order to steal important dates.
Q:
___________________ crime has economic gain as its primary goal, although power and status may also be motivating factors.
Q:
________________ includes the illegal use of the Internet to gather information that is considered private and confidential.
Q:
______________ consists of unsolicited advertisements or promotional material, typically in unwanted emails, but can also be sent via instant messaging, text messaging, and other forms of media.
Q:
___________ includes the willful and repeated harm inflicted through the medium of electronic text.
Q:
A _________________ is a program that is secretly attached to a computer system, monitors the network's work output, and waits for a particular signal, such as a date, to appear.
Q:
A malicious software program may also be called _________________
Q:
Computer _____________ are programs that attack computer networks by self-replicating and sending themselves to other users, generally via email without the aid of the operator.
Q:
A computer program that looks like a benign application but contains illicit codes that can damage the system operations is called a ______________________
Q:
______________ fraud consists of the illegal buying and selling of merchandise on the Internet.
Q:
In the case of MGM Studios, INC v. Grokster, Ltd. found that peer-to-peer ______________ sites are another form of illegal copyright infringement and are punishable by fines and or confinement.
Q:
A ____________ occurs when negative information is spread online about a stock, driving down its price and enabling people to buy it at an artificially low price.
Q:
Extorting money from an Internet service user by threatening to prevent the user from having access to the service is called a _______________________
Q:
Illegally removing small sums from the balances of a large number of accounts and converting them for person use is a term known as _______________________.
Q:
Using the Internet to impersonate the victim in order to conduct illicit transactions such as fraud is called ________________
Q:
___________________ is a term computer hackers and software pirates use to describe a game or application that is made available for use on the Internet in violation of its copyright protection.
Q:
A __________________ involves placing deceptive information online to get unsuspecting investors interested in a stock while those spreading the information sell previously purchased stock at an inflated price.
Q:
The use of computer networks for criminal profits, copyright infringements, identity theft, and Internet securities are examples of cyber-crimes called ___________________.
Q:
Malicious attacks aimed at disrupting, defacing, and destroying technology are referred to as _______________.
Q:
__________________ is defined as the theft or destruction of information, resources, or funds via computers, computer networks, or the Internet.
Q:
Criminal conspiracies that cross national and international borders and involve the planning and execution of illicit ventures by groups or networks in more than one country is known as _______.
Q:
Jody and David begin an etailing fraud scam on campus with the rest of Jody's friends on the volleyball team. Which of the following scenarios would most likely be considered etailing fraud?
a. Jody and his friends purchase stereo equipment online and purchasing cheaper, but similar stereo equipment at a local store. After receiving the original purchase, they ship the cheaper version back to the online store for a full refund
b. Jody obtains legitimate receipts for merchandise and enters a store, taking from the shelf the same merchandise and returns the stolen product for cash
c. Jody has her friends purchase stock in a company and after purchasing at a low rate, she spread information via an online blog about the success of the company, increasing the stock price, and having her friends sell at an inflated rate
d. David spread negative information about the university online in an attempt to hold the university ransom unless they agree to pay an agreed-upon sum of money for David to remove the slanderous information
Q:
After getting a taste for illegal activity, Jody and David decide to participate in other illegal cybercrimes. They decide to use the university listserv to email all students and faculty at the university notifying them that their account has been hacked and to email their name and password back to the sender. This is an example of ______.
a. phishing
b. cyber smear
c. a pump and dump
d. spear-phishing
Q:
Jody is a 21-year-old college student from Wheeling, WV. She attends a local state university with her boyfriend, David, and the two are set to graduate next May with degrees in criminal justice. Answer the following questions:
One of Jody's friends on the volleyball team regularly downloads music from the Internet and has gotten Jody to participate in the activity as well. Although Jody knows this is illegal, she is participating in a cybercrime called______.
a. file sharing
b. salami slicing
c. warez
d. skimming
Q:
Which of the following is an Asian transnational group involved in manufacturing and trafficking methamphetamine who originated in Thailand?
a. Red Wa
b. Jao Pho
c. Triads
d. Fuk Ching
Q:
Which of the following is true about Asian transnational crime groups?
a. Chinese gangs are primarily involved in human trafficking, especially the shipment of young, poor, Asian women to Eastern Europe and Thailand for the sex trade
b. The heijin is Thailand's #1 criminal group, involved primarily in the manufacturing and distribution of methamphetamines
c. The Jao Pho, the Philippines largest gang, is often involved in street crime and prostitution and are now one of the largest growing groups on the west coast of the United States
d. In Taiwan, the number one organized crime problem is the penetration of mobsters into legitimate business sectors and politics
Q:
Which of the following is most true about the group known as the Surenos?
a. They originated in Latin America, first as a protective force for Pablo Escobar, and later became a major player in the distribution of cocaine and heroin along border towns in Texas.
b. They are one of the largest groups in the world involved in human trafficking, preying on the young women in the poorest regions and eventually selling them into sexual slavery.
c. They are an alliance of hundreds of individual Mexican American street gangs who gained popularity by selling drugs within prisons.
d. None of the above
Q:
Latin American and Mexican cartels primary method of income is through ______.
a. drug sales and drug smuggling
b. human trafficking
c. gambling
d. loan sharking
Q:
Which of the following is false in regard to Russian organized crime groups in the United States?
a. They are involved primarily in frauds and scams.
b. They are involved in health care fraud.
c. They are primary players in drug trafficking.
d. They are believed to be a major player in credit card fraud.
Q:
Passed in 1970, the _______________________ act is federal legislation that enables prosecutors to bring additional criminal and civil charges against people whose multiple criminal acts constitute a conspiracy.
a. RICO
b. G.R.E.A.T.
c. Federal Lautenberg
d. Transnational Anti-Criminal Organization (TACO) Act
Q:
Which of the following is false about transnational organized crime?
a. It usually does not include drug sales but is more inclined to commit business-related crimes.
b. It is usually structured along hierarchical lines.
c. Groups are quick and effective in controlling and disciplining members.
d. They do not include terror organizations.
Q:
The Internet Crime Complaint Center, based in Fairmont, WV, is run by the National White Collar Crime Center and which federal agency?
a. DEA
b. FBI
c. CIA
d. INS
Q:
Which of the following is true about the Convention on Cybercrime, ratified in 2006?
a. It was the first international treaty to address the definition and enforcement of cybercrime
b. It has been signed by 70 nations
c. It fails to address a common legal framework to eliminate jurisdictional hurdles
d. All of the above
Q:
What was the significance of the Counterfeit Access Device and Computer Fraud and Abuse Law?
a. It protected classified U.S defense and foreign relations information.
b. It made identity theft a separate crime against the individual whose identity was stolen.
c. It created a federal insurance program to assist victims of computer fraud.
d. All of the above
Q:
Lockhead Martin, the world's largest aerospace company, announced it detected a significant cyber attack against its information systems that was thwarted. According to the text, this is an example of _______.
a. cyberespionage
b. cyberspying
c. cybervandalism
d. cyberterrorism
Q:
Thefollowing illustrates the story of Rebecca Caine who was terrorized by her ex-boyfriend Peter Atkinson who bombarded her with hundreds of texts and calls a day and even posted nude pictures of her online. His actions are characterized as______. a. cyberbullying
b. cyberspying
c. cyberabuse
d. cyberstalking
Q:
Which of the following is false in regard to cyberbullying?
a. Girls are more likely to post harmful videos or pictures, while boys are more likely to spread rumors.
b. Adolescent girls are significantly more likely to have experienced cyberbullying than boys.
c. Cyberbullying can happen via the computer or cellphone.
d. 17 percent of students in a recent survey say they have harassed someone online.
Q:
David Smith pleaded guilty to state and federal charges and was sentenced to 20 months in prison for his $80 million dollar cyber attack in the form of a ______.
a. computer worm
b. Trojan horse
c. slag code
d. logic bomb
Q:
The creation of false emails or websites that look legitimate but are designed to gain illegal access to a victim's personal information
a. phishing
b. warez
c. dumpster diving
d. spearing
Q:
Extorting money from an Internet service user by threatening to prevent the user from having access to the service is known as ______.
a. denial-retrial
b. Trojan horse
c. warez
d. denial-of-service attack
Q:
Becky obtains a legitimate receipt from a store and returns to the store, shops, and picks up the identical item return to the service desk to get a refund. Becky has just committed _______.
a. shoplisting
b. entail fraud
c. phishing
d. mass marketing fraud
Q:
Similar to a salami slice fraud but on a much larger and usually more complex scale, ________________ sometimes is perpetrated as a "one-off kamikaze" fraud.
a. theft of information
b. manipulation of accounts
c. corporate espionage
d. warez
Q:
Which of the following best depicts a phishing scheme?
a. Cassandra writes a fictional column about the university he works for in an attempt to hurt enrollment after failing to earn tenure
b. Jennifer spreads negative information about a company online in an attempt to draw down stock prices for her colleagues
c. Kareem begins sending emails to random users about how to purchase the hot, new, Christmas toy for the season in an attempt to ascertain personal information for his use
d. Tammy places deceptive information online to get unsuspecting investors interested in a stock, thus driving up the price, and allowing her to sell her shares at an inflated price
Q:
Which of the following would be an example of acyber smearscam?
a. Bill writes a fictional column about Exxon Mobile closing, hence driving down stock prices for his friends to purchase
b. Jenny sends emails with embedded worms to random Gmail users to obtain personal information in attemptto make aquick profit
c. Ryan steals the identity of his biology professors and using his credit card information to purchase his books for the system; afterward he quickly dumps the card to eliminate the trace
d. Frank spreads rumors about his ex-girlfriend Diana, including her promiscuity, sexual orientation, and prior drug use on Instagram
Q:
Which of the following is false in regard to denial-of-service (DoS) attacks?
a. DoS attacks are not about profit or ransom, but instead about inconveniencing the targeted party
b. Even respectable businesspeople have been accused of launching DoS attacks against rival businesses
c. Online, offshore, gambling sites are particularly vulnerable to DoS attacks
d. Many U.S organizations have been affected by DoS attacks, including New York City email accounts and Rutgers University
Q:
Which of the following is not true in regard to drug distribution and the Internet?
a. While many illegal sites exist, nearly 90 percent are certified by the National Association of Boards of Pharmacy.
b. Often drugs sold on the Internet are adulterated, expired, or the wrong dose.
c. Numerous websites provide prescriptions written by cyber doctors.
d. There are no controls for preventing children from ordering drugs.
Q:
Which of the following is true about ATM skimming crimes?
a. Devices are typically undetectable
b. Devices are usually placed only for a short time
c. Phony keyboards are sometimes attached
d. All of the above
Q:
A type of computer crime which includes the unauthorized obtaining of information from a computer (hacking), including software that is copied for profit.
a. Theft of information
b. Manipulation
c. Corporate espionage
d. Skimming
Q:
Catherine is a college professor who was recently appointed to chair of the department. As chair, she illegally removes small sums of money from a large number of accounts associated with the department and uses the money to fund her lavish vacations to the Africa, Asia, and Europe. This is an example of a______.
a. Trojan horse
b. salami slice fraud
c. Ponzi scheme
d. warez scheme
Q:
Which of the following is a form of computer crime?
a. Theft of information
b. Corporate espionage
c. Manipulation of accounts
d. All of the above are computer crimes
Q:
The federal government has actively pursued members of the warez community through new legislation. Which of the following is one of these acts?
a. Computer Fraud and Abuse Act
b. Federal Lautenberg Act
c. RICO Act
d. Copyright Infringement Act
Q:
A term computer hackers and software pirates use to describe a game or application that is made available for use on the Internet in violation of its copyright protection.
a. Warez
b. Phishing
c. Suarez
d. Salami slice
Q:
Malicious attacks aimed at disrupting, defacing, and destroying technology.
a. Cybervandalism
b. Cyberwar
c. Cyberterrorism
d. Cyber malware
Q:
Which of the following is not true about the "cyber age" according to the text?
a. Facebook reached 10 million users in 2015.
b. There are over 500 million tweets a day.
c. Nearly 4 billion industries use email.
d. Over 190 billion email messages are sent daily.
Q:
The theft and/or destruction of information, resources, or funds via computers, computer networks, or the Internet.
a. Cybercrime
b. Organized crime
c. Connected crime
d. Technology crime
Q:
One of the primary issues for combating transnational drug crime is that the United States has little influence in some key drug-producing areas, such as Taliban-held Afghanistan and Myanmar. a. True
b. False
Q:
Efforts to combat transnational organized crime are typically in the hands of federal agencies a. True
b. False
Q:
Even though United States and international law agencies work together, if a transnational group is destroyed and if monetary gain is readily available, it is quickly replaced.
a. True
b. False
Q:
Since the fall of the Soviet Union in 1991, Russian organized crime groups have become almost obsolete. a. True
b. False
Q:
The primary means of income for transnational organized crime groups are by using force to enter into and maximize profits in legitimate businesses. a. True
b. False
Q:
Organized crime in the United States is a local commodity, controlled by five Mafia families in New York, Pittsburgh, Miami, Chicago, and Seattle. a. True
b. False
Q:
Transnational organized crime is a conspiratorial activity, involving the coordination of numerous people in the planning and execution of illegal acts or in the pursuit of a legitimate objective by unlawful means. a. True
b. False
Q:
Based in Fairmont, WV, the Internet Crime Complaint Center is run by the FBI and the National White Collar Crime Center with the goal to analyze fraud-related complaints. a. True
b. False
Q:
The Convention on Cybercrime, ratified by the U.S. Senate in 2006, was the first international treaty to address the definition and enforcement of cybercrime. a. True
b. False
Q:
Spear-phishing attacks have decreased between 2013 and 2014 due to the creation of the U.S. Anti-Trust and Reinforcement Act which penalizes first time offenders with life in prison.
a. True
b. False
Q:
While many feel the United States is not vulnerable to cyber attacks, a Chinese espionage ring known as the Titan Rain was able to penetrate a U.S. military base and NASA obtaining the U.S. Army's flight-planning software. a. True
b. False
Q:
The illegal sale of counterfeit goods and illegal use of intellectual property to commit crime, such as stock manipulation, have been used to support terrorist activities. a. True
b. False
Q:
Cyberespionage efforts are well-practiced by Chinese organizations, one of which is known as the Titan Rain and has penetrated NASA computers. a. Trueb. False
Q:
Cyberstalking refers to the use of the Internet to steal one's identity for profit. a. True
b. False
Q:
Defacers are typically members of an extensive social network who are eager to demonstrate their reasons for hacking and often leave calling cards, greetings, and taunts on the webpages they corrupt.
a. True
b. False