Deck 3: Traditional Computer Crime: Early Hackers and Theft of Components

ملء الشاشة (f)
exit full mode
سؤال
Originally, members of the Legion of Doom (LoD) were ________.

A) phreakers
B) crackers
C) cyberpunks
D) hacktivists
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What was the Illuminati?

A) a board owned and operated by Steve Jackson Games
B) a destructive program that crippled over 6,000 computers in 1988
C) a military database containing sensitive information
D) an organization pointing out security flaws in institutional systems
سؤال
________ was the most infamous of all hackers and has been the subject of numerous books and movies.

A) Kevin Mitnick
B) Kevin Poulsen
C) Prophet
D) Urvile
سؤال
What motivates pure hackers to steal information?

A) political need
B) intellectual challenge
C) sexual gratification
D) economic desire
سؤال
Which of the following is the least destructive category of hackers?

A) technological thrill seekers
B) insiders
C) informational voyeurs
D) hacktivists
سؤال
What can the exponential increase in online harassment, stock manipulation, and child pornography be attributed to?

A) the introduction of cloud computing
B) the increase in international guidelines for cyberactivity
C) the increase in academic knowledge
D) the increase in anonymous e-mail accounts and remailers
سؤال
Which was the first event to signal the potential of computer crime?

A) the crash of AT&T
B) the destruction caused by the Morris worm
C) the hacking of the MILNET system
D) the victimization of Michigan Bell
سؤال
The theft and resale of which computer component has proven to be the most lucrative?

A) CPUs
B) motherboards
C) integrated chips
D) serial ports
سؤال
Which of the following qualifies as social engineering?

A) the illegal copying and distribution of a newly released theatrical film
B) a brute force search for an employee's password
C) befriending a company's cleaning crew to gain access to rooms and buildings
D) using an anonymizer to conduct hard-to-track Internet searches
سؤال
Which of the following is true of the infamous hacking board Plovernet?

A) It went online in March 1980.
B) It was a breeding ground for hacking groups like LoD.
C) It was responsible for the hacking of the Los Alamos military computers in 1982.
D) It was originally formed in Bonn, Germany.
سؤال
________ are designed to strip the source-address information from e-mail messages.

A) Copper boxes
B) Anonymizers
C) Ethercards
D) Integrated chips
سؤال
________ hat hackers are individuals who identify and exploit system vulnerabilities for nefarious purposes.

A) White
B) Blue
C) Gray
D) Black
سؤال
Which of the following is a factor that leads many individual users of the Internet to assume that their identities are safely protected?

A) the dearth of interjurisdictional communication
B) the difficulty in using modern communication technology
C) the lack of opportunity to engage in computer crime
D) the global acceptance of First Amendment rights
سؤال
Which of the following hacking-related developments occurred after the year 2000?

A) the release of the Morris worm
B) Kevin Poulsen's exploitation of the telecom system to "win" a Porsche
C) the introduction of commercially available security products
D) the emergence of identity theft as an issue for consumers
سؤال
________ are the least sophisticated of all cybercriminals.

A) Script kiddies
B) Cyberpunks
C) Cybercriminal organizations
D) Crackers
سؤال
Who was directly responsible for the downfall of LoD?

A) Control-C
B) Fry Guy
C) Robert Morris
D) Silver Spy
سؤال
Which of the following is NOT one of the primary motivations for computer intrusion in contemporary society?

A) revenge
B) political motives
C) to benefit others
D) boredom
سؤال
Which of the following hacking-related developments occurred during the 1990s?

A) Robert Morris releases his worm on the Internet, and is indicted under newly passed legislation.
B) Commercially available security products are introduced.
C) Phreakers emerge, costing AT&T a fortune in uncollected long-distance charges.
D) A dramatic increase in hacktivism occurs.
سؤال
Which of the following is NOT a general category of computer crime?

A) targets
B) means
C) vicinage
D) incidentals
سؤال
Which of the following does NOT accurately describe the Secret Service actions that prompted the seminal court case Steve Jackson Games, Inc.v.U.S.Secret Service et al.?

A) The Secret Service used a DDoS attack to infiltrate and sabotage the company's operations.
B) Agents executed an unsigned search warrant.
C) Agents used Gestapo-like tactics by seizing virtually everything, including business records, private electronic mail, and the drafts of forthcoming games.
D) The Secret Service promoted the unfounded view that the bulletin board was a medium for the exchange of hacking information.
سؤال
The increase in anonymous e-mail accounts and remailers has intensified incidences of online harassment, stock manipulation, and child pornography.
سؤال
The term "hacking" was introduced at MIT in the 1980s.
سؤال
Computer thieves have traditionally been able to market their stolen goods as legitimate.
سؤال
Which of the following groups does NOT figure in the multilateral film privacy strategy of the Chinese Triads?

A) privacy pressers
B) hacktivists
C) piracy burners
D) runners
سؤال
Like traditional communication carriers, Internet service providers are required to maintain transmission records.
سؤال
________ acknowledge(s) the futility of trying to stop people from copying software and instead relies on people's honesty.

A) Shareware
B) WareZ sites
C) Parallel imports
D) Broadcast piracy
سؤال
The issue of vicinage has been simplified by the lack of international guidelines for cyberactivity.
سؤال
The term cybercriminal organizations does not include traditional organized crime syndicates.
سؤال
________ can be defined as the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.

A) Signal theft
B) Theatrical print theft
C) Data piracy
D) Parallel imports
سؤال
Insiders pose the most overrated danger to informational security.
سؤال
Which of the following is NOT a method of film piracy?

A) broadcast piracy
B) public performances
C) parallel imports
D) software development
سؤال
What is the primary reason that the resale of integrated chips is so lucrative?

A) increase of legitimate global marketplaces
B) ease in manipulation
C) magnitude of computer transactions
D) the basic law of supply and demand
سؤال
Activities like the theft of computer hardware and the infringement of software copyrights have become unpopular as computer components become smaller and more valuable.
سؤال
Blue boxes were extremely popular among college dorms and were widely considered harmless by users.
سؤال
Traditional hacker culture was characterized by an antiestablishment rhetoric.
سؤال
Hackers, irrespective of national origin, display startling similarities.
سؤال
Shareware publishers encourage users to give copies of programs to friends and colleagues but ask everyone who uses a program regularly to pay a registration fee to the program's author directly.
سؤال
Not all crimes involving computers can be characterized as "computer crime."
سؤال
Fry Guy and the Atlanta Three were directly responsible for the downfall of the Legion of Doom (LoD).
سؤال
According to accomplished phreakers, the theft of telephone access codes requires great technical expertise.
سؤال
Describe the five general categories of cybercriminals in today's society.
سؤال
________ are the most organized groups trafficking in stolen computer components.
سؤال
________ activities may range from snooping around neighbors' computers to searching the recesses of top-secret government databases.
سؤال
The ________ program exploited security holes in the Unix operating system, infecting 10 percent of all computers connected to the Internet.
سؤال
Law enforcement agencies should look to ________ and federal legislation to prosecute computer crimes in the absence of technology-specific legislation.
سؤال
________ is the term use by law enforcement authorities to categorize those involved in vandalism, destructive programs, and general mischief for no economic gain.
سؤال
The promise of anonymity coupled with the dearth of ________ encourages deviant activity.
سؤال
In hacking activities, one computer provides the ________ for the criminal activity, while another serves as the target.
سؤال
List and describe the primary motivations for computer intrusion or theft of information in contemporary society.
The answer should include the following points:
National origin, ideology, or demographics aside, there appear to be six primary motivations for computer intrusion or theft of information in contemporary society:
-Boredom
-Intellectual challenge (mining for knowledge-pure hackers)
-Revenge (insiders, disgruntled employees, etc.)
-Sexual gratification (stalking, harassment, etc.)
-Economic (criminals)
-Political (hacktivists, terrorists, spies, etc.)
سؤال
Many members of the ________ were not malicious or criminal minded and proclaimed themselves as public servants, pointing out security flaws in institutional systems so that repairs would be made.
سؤال
________ are those individuals who have authorized or legitimate access to a computer system, but who exceed that authorization.
سؤال
Operations known as ________ involve prepaid calls being sold on the street using stolen access or PBX codes during operations.
سؤال
Traditionally, criminal statutes were predicated on the ________ of the criminal act.
سؤال
________ refers to the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.
سؤال
Briefly discuss the three incidents of the 1980s that exposed the vulnerability of data systems and outlined potential repercussions for national security.
سؤال
________ were devices which "tricked" switching systems into granting free access to long-distance lines.
سؤال
________ involves the manipulation of telecommunications carriers to gain knowledge of telecommunications, and/or theft of applicable services.
سؤال
________ sites enable visitors to download software illegally in violation of copyright protections.
سؤال
Differentiate between traditional crime and computer crime.
سؤال
Discuss what can be done to apprehend/prevent computer-related crime.
سؤال
Match between columns
Script kiddies
are the lowest life form of cybercriminal
Script kiddies
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Script kiddies
target data which is valuable on its face
Script kiddies
routinely held conferences to discuss their exploits and successes
Script kiddies
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Cybercriminal organizations
are the lowest life form of cybercriminal
Cybercriminal organizations
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Cybercriminal organizations
target data which is valuable on its face
Cybercriminal organizations
routinely held conferences to discuss their exploits and successes
Cybercriminal organizations
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Phreakers
are the lowest life form of cybercriminal
Phreakers
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Phreakers
target data which is valuable on its face
Phreakers
routinely held conferences to discuss their exploits and successes
Phreakers
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Cyberpunks
are the lowest life form of cybercriminal
Cyberpunks
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Cyberpunks
target data which is valuable on its face
Cyberpunks
routinely held conferences to discuss their exploits and successes
Cyberpunks
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Crackers
are the lowest life form of cybercriminal
Crackers
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Crackers
target data which is valuable on its face
Crackers
routinely held conferences to discuss their exploits and successes
Crackers
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
سؤال
Match between columns
The epitome of sophisticated international hacking, originally formed in Gemmany
Legion of Doom
The epitome of sophisticated international hacking, originally formed in Gemmany
8BBS
The epitome of sophisticated international hacking, originally formed in Gemmany
Plovernet
The epitome of sophisticated international hacking, originally formed in Gemmany
ALTOS
The epitome of sophisticated international hacking, originally formed in Gemmany
414 Private
East Coast hacking board that became a breeding ground for hacking groups
Legion of Doom
East Coast hacking board that became a breeding ground for hacking groups
8BBS
East Coast hacking board that became a breeding ground for hacking groups
Plovernet
East Coast hacking board that became a breeding ground for hacking groups
ALTOS
East Coast hacking board that became a breeding ground for hacking groups
414 Private
One of the first hacking boards, popular on the West Coast
Legion of Doom
One of the first hacking boards, popular on the West Coast
8BBS
One of the first hacking boards, popular on the West Coast
Plovernet
One of the first hacking boards, popular on the West Coast
ALTOS
One of the first hacking boards, popular on the West Coast
414 Private
The most notable early hacking group
Legion of Doom
The most notable early hacking group
8BBS
The most notable early hacking group
Plovernet
The most notable early hacking group
ALTOS
The most notable early hacking group
414 Private
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
Legion of Doom
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
8BBS
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
Plovernet
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
ALTOS
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
414 Private
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/62
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Traditional Computer Crime: Early Hackers and Theft of Components
1
Originally, members of the Legion of Doom (LoD) were ________.

A) phreakers
B) crackers
C) cyberpunks
D) hacktivists
A
2
What was the Illuminati?

A) a board owned and operated by Steve Jackson Games
B) a destructive program that crippled over 6,000 computers in 1988
C) a military database containing sensitive information
D) an organization pointing out security flaws in institutional systems
A
3
________ was the most infamous of all hackers and has been the subject of numerous books and movies.

A) Kevin Mitnick
B) Kevin Poulsen
C) Prophet
D) Urvile
A
4
What motivates pure hackers to steal information?

A) political need
B) intellectual challenge
C) sexual gratification
D) economic desire
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is the least destructive category of hackers?

A) technological thrill seekers
B) insiders
C) informational voyeurs
D) hacktivists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
6
What can the exponential increase in online harassment, stock manipulation, and child pornography be attributed to?

A) the introduction of cloud computing
B) the increase in international guidelines for cyberactivity
C) the increase in academic knowledge
D) the increase in anonymous e-mail accounts and remailers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which was the first event to signal the potential of computer crime?

A) the crash of AT&T
B) the destruction caused by the Morris worm
C) the hacking of the MILNET system
D) the victimization of Michigan Bell
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
8
The theft and resale of which computer component has proven to be the most lucrative?

A) CPUs
B) motherboards
C) integrated chips
D) serial ports
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following qualifies as social engineering?

A) the illegal copying and distribution of a newly released theatrical film
B) a brute force search for an employee's password
C) befriending a company's cleaning crew to gain access to rooms and buildings
D) using an anonymizer to conduct hard-to-track Internet searches
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is true of the infamous hacking board Plovernet?

A) It went online in March 1980.
B) It was a breeding ground for hacking groups like LoD.
C) It was responsible for the hacking of the Los Alamos military computers in 1982.
D) It was originally formed in Bonn, Germany.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
11
________ are designed to strip the source-address information from e-mail messages.

A) Copper boxes
B) Anonymizers
C) Ethercards
D) Integrated chips
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
12
________ hat hackers are individuals who identify and exploit system vulnerabilities for nefarious purposes.

A) White
B) Blue
C) Gray
D) Black
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is a factor that leads many individual users of the Internet to assume that their identities are safely protected?

A) the dearth of interjurisdictional communication
B) the difficulty in using modern communication technology
C) the lack of opportunity to engage in computer crime
D) the global acceptance of First Amendment rights
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following hacking-related developments occurred after the year 2000?

A) the release of the Morris worm
B) Kevin Poulsen's exploitation of the telecom system to "win" a Porsche
C) the introduction of commercially available security products
D) the emergence of identity theft as an issue for consumers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
15
________ are the least sophisticated of all cybercriminals.

A) Script kiddies
B) Cyberpunks
C) Cybercriminal organizations
D) Crackers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
16
Who was directly responsible for the downfall of LoD?

A) Control-C
B) Fry Guy
C) Robert Morris
D) Silver Spy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is NOT one of the primary motivations for computer intrusion in contemporary society?

A) revenge
B) political motives
C) to benefit others
D) boredom
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following hacking-related developments occurred during the 1990s?

A) Robert Morris releases his worm on the Internet, and is indicted under newly passed legislation.
B) Commercially available security products are introduced.
C) Phreakers emerge, costing AT&T a fortune in uncollected long-distance charges.
D) A dramatic increase in hacktivism occurs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is NOT a general category of computer crime?

A) targets
B) means
C) vicinage
D) incidentals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following does NOT accurately describe the Secret Service actions that prompted the seminal court case Steve Jackson Games, Inc.v.U.S.Secret Service et al.?

A) The Secret Service used a DDoS attack to infiltrate and sabotage the company's operations.
B) Agents executed an unsigned search warrant.
C) Agents used Gestapo-like tactics by seizing virtually everything, including business records, private electronic mail, and the drafts of forthcoming games.
D) The Secret Service promoted the unfounded view that the bulletin board was a medium for the exchange of hacking information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
21
The increase in anonymous e-mail accounts and remailers has intensified incidences of online harassment, stock manipulation, and child pornography.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
22
The term "hacking" was introduced at MIT in the 1980s.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
23
Computer thieves have traditionally been able to market their stolen goods as legitimate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following groups does NOT figure in the multilateral film privacy strategy of the Chinese Triads?

A) privacy pressers
B) hacktivists
C) piracy burners
D) runners
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
25
Like traditional communication carriers, Internet service providers are required to maintain transmission records.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
26
________ acknowledge(s) the futility of trying to stop people from copying software and instead relies on people's honesty.

A) Shareware
B) WareZ sites
C) Parallel imports
D) Broadcast piracy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
27
The issue of vicinage has been simplified by the lack of international guidelines for cyberactivity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
28
The term cybercriminal organizations does not include traditional organized crime syndicates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
29
________ can be defined as the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.

A) Signal theft
B) Theatrical print theft
C) Data piracy
D) Parallel imports
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
30
Insiders pose the most overrated danger to informational security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following is NOT a method of film piracy?

A) broadcast piracy
B) public performances
C) parallel imports
D) software development
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
32
What is the primary reason that the resale of integrated chips is so lucrative?

A) increase of legitimate global marketplaces
B) ease in manipulation
C) magnitude of computer transactions
D) the basic law of supply and demand
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
33
Activities like the theft of computer hardware and the infringement of software copyrights have become unpopular as computer components become smaller and more valuable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
34
Blue boxes were extremely popular among college dorms and were widely considered harmless by users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
35
Traditional hacker culture was characterized by an antiestablishment rhetoric.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
36
Hackers, irrespective of national origin, display startling similarities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
37
Shareware publishers encourage users to give copies of programs to friends and colleagues but ask everyone who uses a program regularly to pay a registration fee to the program's author directly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
38
Not all crimes involving computers can be characterized as "computer crime."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
39
Fry Guy and the Atlanta Three were directly responsible for the downfall of the Legion of Doom (LoD).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
40
According to accomplished phreakers, the theft of telephone access codes requires great technical expertise.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
41
Describe the five general categories of cybercriminals in today's society.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
42
________ are the most organized groups trafficking in stolen computer components.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
43
________ activities may range from snooping around neighbors' computers to searching the recesses of top-secret government databases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
44
The ________ program exploited security holes in the Unix operating system, infecting 10 percent of all computers connected to the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
45
Law enforcement agencies should look to ________ and federal legislation to prosecute computer crimes in the absence of technology-specific legislation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
46
________ is the term use by law enforcement authorities to categorize those involved in vandalism, destructive programs, and general mischief for no economic gain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
47
The promise of anonymity coupled with the dearth of ________ encourages deviant activity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
48
In hacking activities, one computer provides the ________ for the criminal activity, while another serves as the target.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
49
List and describe the primary motivations for computer intrusion or theft of information in contemporary society.
The answer should include the following points:
National origin, ideology, or demographics aside, there appear to be six primary motivations for computer intrusion or theft of information in contemporary society:
-Boredom
-Intellectual challenge (mining for knowledge-pure hackers)
-Revenge (insiders, disgruntled employees, etc.)
-Sexual gratification (stalking, harassment, etc.)
-Economic (criminals)
-Political (hacktivists, terrorists, spies, etc.)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
50
Many members of the ________ were not malicious or criminal minded and proclaimed themselves as public servants, pointing out security flaws in institutional systems so that repairs would be made.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
51
________ are those individuals who have authorized or legitimate access to a computer system, but who exceed that authorization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
52
Operations known as ________ involve prepaid calls being sold on the street using stolen access or PBX codes during operations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
53
Traditionally, criminal statutes were predicated on the ________ of the criminal act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
54
________ refers to the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
55
Briefly discuss the three incidents of the 1980s that exposed the vulnerability of data systems and outlined potential repercussions for national security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
56
________ were devices which "tricked" switching systems into granting free access to long-distance lines.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
57
________ involves the manipulation of telecommunications carriers to gain knowledge of telecommunications, and/or theft of applicable services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
58
________ sites enable visitors to download software illegally in violation of copyright protections.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
59
Differentiate between traditional crime and computer crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
60
Discuss what can be done to apprehend/prevent computer-related crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
61
Match between columns
Script kiddies
are the lowest life form of cybercriminal
Script kiddies
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Script kiddies
target data which is valuable on its face
Script kiddies
routinely held conferences to discuss their exploits and successes
Script kiddies
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Cybercriminal organizations
are the lowest life form of cybercriminal
Cybercriminal organizations
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Cybercriminal organizations
target data which is valuable on its face
Cybercriminal organizations
routinely held conferences to discuss their exploits and successes
Cybercriminal organizations
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Phreakers
are the lowest life form of cybercriminal
Phreakers
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Phreakers
target data which is valuable on its face
Phreakers
routinely held conferences to discuss their exploits and successes
Phreakers
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Cyberpunks
are the lowest life form of cybercriminal
Cyberpunks
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Cyberpunks
target data which is valuable on its face
Cyberpunks
routinely held conferences to discuss their exploits and successes
Cyberpunks
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
Crackers
are the lowest life form of cybercriminal
Crackers
groups comprised of criminally minded individuals who have used the Internet to communicate, collaborate, and facilitate cybercrime
Crackers
target data which is valuable on its face
Crackers
routinely held conferences to discuss their exploits and successes
Crackers
used by law enforcement officials to refer to individuals intent on wreaking havoc via the Internet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
62
Match between columns
The epitome of sophisticated international hacking, originally formed in Gemmany
Legion of Doom
The epitome of sophisticated international hacking, originally formed in Gemmany
8BBS
The epitome of sophisticated international hacking, originally formed in Gemmany
Plovernet
The epitome of sophisticated international hacking, originally formed in Gemmany
ALTOS
The epitome of sophisticated international hacking, originally formed in Gemmany
414 Private
East Coast hacking board that became a breeding ground for hacking groups
Legion of Doom
East Coast hacking board that became a breeding ground for hacking groups
8BBS
East Coast hacking board that became a breeding ground for hacking groups
Plovernet
East Coast hacking board that became a breeding ground for hacking groups
ALTOS
East Coast hacking board that became a breeding ground for hacking groups
414 Private
One of the first hacking boards, popular on the West Coast
Legion of Doom
One of the first hacking boards, popular on the West Coast
8BBS
One of the first hacking boards, popular on the West Coast
Plovernet
One of the first hacking boards, popular on the West Coast
ALTOS
One of the first hacking boards, popular on the West Coast
414 Private
The most notable early hacking group
Legion of Doom
The most notable early hacking group
8BBS
The most notable early hacking group
Plovernet
The most notable early hacking group
ALTOS
The most notable early hacking group
414 Private
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
Legion of Doom
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
8BBS
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
Plovernet
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
ALTOS
Group of teenage hackers who hacked into the Los Alamos military computers in the earlY 1980s
414 Private
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.