Deck 4: Contemporary Computer Crime

ملء الشاشة (f)
exit full mode
سؤال
Which of the following refers to a computer that has been compromised by some form of malware, enabling the criminal to remotely control that computer?

A) Trojan
B) bundler
C) zombie
D) rootkit
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following launched the first online casino in 1995 with 18 games?

A) PokerStars
B) Rational Group US Holdings
C) Internet Casinos, Inc.
D) Full Tilt Poker
سؤال
Which of the following best defines shoulder surfing?

A) using computers to remotely perform malicious or criminal tasks
B) using electronic messaging systems to randomly or indiscriminately send unsolicited bulk messages
C) rendering computers or digital resources inoperable in furtherance of the illegal compulsion of an action or exchange
D) literally watching someone from behind, as he or she inputs a password
سؤال
According to the Office of Juvenile Justice and Delinquency Prevention (OJJDP) and the National Center for Missing and Exploited Children (NCMEC), almost all possessors of child pornography are ________.

A) black males who are younger than 25
B) white males who are younger than 25
C) homosexual males who are older than 25
D) white males who are older than 25
سؤال
Which of the following refers to a software program or hardware device that records everything you type into a compromised computer?

A) keyloggers
B) salamis
C) worms
D) Trojans
سؤال
Cybervandalism and cyberterrorism are examples of which category of online crime?

A) theft of information and copyright infringement
B) interference with lawful use of computers
C) threatening communications
D) dissemination of contraband or offensive materials
سؤال
Which of the following refers to stalkers who are delusional and believe that their victim is in love with them or has had a previous relationship with them?

A) obsessional stalkers
B) love-obsession stalkers
C) erotomaniacs
D) vengeance stalker
سؤال
Which of the following statements regarding online gaming is untrue?

A) The increase in e-banking allows users to access and add funds without even leaving their chair.
B) The continuous operation of online casinos makes them accessible 24 hours a day.
C) The lack of physicality and geographical location makes online casinos accessible to any user with a computer, PDA, or cell phone.
D) Minors' accessibility to online gaming is restricted, as age verification is mandatory.
سؤال
Which of the following is true regarding child pornography in the United States?

A) NAMBLA is an organization created by the federal government and operated by the National Center for Missing and Exploited Children.
B) The PROTECT Act has not been successful in withstanding constitutional challenges regarding child pornography.
C) The possession or distribution of child pornography is jurisdictionally illegal in just 32 states and all territories.
D) The Supreme Court ruled that the Child Pornography Prevention Act was unconstitutional.
سؤال
Which of the following types of fraud occurs when a fraudster adds hidden charges to the advertised price, perhaps in shipping or handling?

A) fee stacking
B) misrepresentation
C) nondelivery
D) shill bidding
سؤال
Which of the following is NOT a primary motivation for the possession of child pornography?

A) fight for legalizing man/boy sexual relationship
B) satisfaction of a desire for new and different sexual stimuli
C) satisfaction of a peculiar curiosity
D) possession and subsequent distribution designed for economic profit
سؤال
Which of the following refers to a malware program that encrypts or otherwise renders computer or digital resources inoperable or inaccessible in furtherance of the illegal compulsion of an action or exchange?

A) worm
B) social engineering
C) ransomware
D) spyware
سؤال
Which of the following refers to the abuse of electronic messaging systems to randomly or indiscriminately send unsolicited bulk messages?

A) phishing
B) spamming
C) phreaking
D) shoulder surfing
سؤال
Which of the following eras of computer viruses is largely characterized by infection of DOS machines spread by removable media?

A) Classical era
B) Internet era
C) Macro era
D) Floppy era
سؤال
The individuals who seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers are known as ________.

A) obsessional stalkers
B) love-obsession stalkers
C) erotomaniacs
D) vengeance stalkers
سؤال
A deliberate, politically or religiously motivated attack against data compilations, computer programs, and/or information systems that is intended to disrupt and/or deny service or acquire information that disrupts the social, physical, or political infrastructure of a target, is known as ________.

A) cyberterrorism
B) salami technique
C) cyberstalking
D) cyberbullying
سؤال
Which of the following is atypical of both physical stalkers and cyberstalkers?

A) They are usually known to their victims.
B) They are motivated by economic gain.
C) They are usually male.
D) They usually focus their attentions on women.
سؤال
Which of the following is NOT true regarding child pornography and child exploitation?

A) Almost 40 percent of arrested offenders who met victims online possessed child pornography materials.
B) Usually, youngsters who enjoy access to unsupervised computer communications are not victims.
C) Child pornography is used as both a tool for sexual gratification and as a means to seduce or groom potential victims.
D) Typical prey of child exploitation includes those individuals who express frustration with parental controls or who appear particularly naïve or vulnerable.
سؤال
Which of the following refers to two distinct methods of distributed denial of service (DDoS) attacks?

A) spamming and fraggling
B) smurfing and fraggling
C) stalking and spamming
D) freezing and stalking
سؤال
Which of the following is NOT true regarding the success of ransomwares?

A) Ransomware is most successful when the applicable victim lacks knowledge of or is apathetic to system security.
B) Ransomware succeeds when the level of data destruction caused by sabotage cannot be recovered using commercially available software.
C) Ransomware payments are typically made in hard cash directly to the perpetrator.
D) In order for ransomware to be successful, the compromised data must have some worth to the victim.
سؤال
The Macro Era of computer viruses was largely characterized by infection of DOS machines spread by removable media.
سؤال
Which of the following refers to redirecting thin slices of accounts into a designated location?

A) salami technique
B) data diddling
C) spoofing
D) ISP-jacking
سؤال
Recent studies indicate that the emergence of cloud computing and removable media has effectively decreased theft of information or breaches in digital security.
سؤال
At the dawn of the computer age, the term "computer crime" usually referred to the theft of computers or computer components.
سؤال
The ultimate goal of ransomware can be realized only when a secure method of payment is available.
سؤال
Which of the following refers to the sale of stolen goods through technological means?

A) day trading
B) insider trading
C) e-Fencing
D) spoofing
سؤال
Spamming refers to the abuse of electronic messaging systems to randomly or indiscriminately send unsolicited bulk messages.
سؤال
The SAFE DOSES Act targets computer malware attacks.
سؤال
The possession or distribution of child pornography is jurisdictionally illegal in all 50 states and in all territories under the umbrella of the United States.
سؤال
Victims of harassment and stalking are overwhelmingly females or children.
سؤال
Vengeance or terrorist stalkers are motivated by either economic gain or revenge.
سؤال
To steal credit card information by installing devices on card readers located in ATMs, gas pumps, restaurants, grocery stores, retail establishments, or any other area where magnetic strip card readers are employed is known as ________.

A) spamming
B) skimming
C) RFID
D) shill bidding
سؤال
Which of the following refers to the deliberate manipulation of an existing program to redirect or reroute data representing monies or economic exchanges?

A) ISP jacking
B) web cramming
C) data diddling
D) IP spoofing
سؤال
Which of the following refers to a seller in an auction driving up the cost of his or her own item by bidding on it?

A) fee stacking
B) shill bidding
C) misrepresentation
D) nondelivery
سؤال
Shill bidding at an auction occurs when a fraudster accepts payment for an item and then fails to deliver it.
سؤال
A deliberate politically or religiously motivated attack against data compilations, computer programs, and/or information systems which is intended to disrupt and/or deny service or acquire information which disrupts the social, physical, or political infrastructure of a target is known as cyberterrorism.
سؤال
According to the Office of Juvenile Justice and Delinquency Prevention (OJJDP) and the National Center for Missing and Exploited Children (NCMEC), almost all possessors of child pornography are black males who are under the age of 25.
سؤال
Rootkit is a software program or hardware device that records all keystrokes of a compromised computer.
سؤال
Stealing credit card information by installing devices on magnetic card readers located in ATMs and gas pumps is known as data diddling.
سؤال
Like the majority of malware, whose survival is almost entirely contingent upon concealment, ransomware does not proclaim its existence at inception.
سؤال
________ involves the use of radio waves to facilitate the transfer of information between an electronic tag (or label) and a reader.
سؤال
Discuss various methods of criminal theft of information or data manipulation.
سؤال
________ stalkers seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers.
سؤال
Engaging in deliberate financial transactions to conceal the identity, source, and/or destination of income is known as ________.
سؤال
An aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend him-or herself is known as ________.
سؤال
The process of buying and selling highly speculative stocks within one trading day is known as ________.
سؤال
________ refers to the deliberate manipulation of an existing program to redirect or reroute data representing monies or economic exchanges.
سؤال
An intentional deception, misrepresentation, or falsehood made with the intention of receiving unwarranted compensation or gratification is known as ________.
سؤال
________ involves disconnecting individual users from their selected Internet service providers and redirecting them to illegitimate servers.
سؤال
The sale of stolen goods through technological means is known as ________.
سؤال
________ is most often accomplished when criminals develop new Web pages for small businesses and nonprofit groups for little or no expense.
سؤال
________ may be defined as the willful, malicious, and repeated following and/ or harassing of another person in an effort to inflict or cause fear of actual harm through words or deeds.
سؤال
________ are delusional and believe that their victim is in love with them or has had a previous relationship with them.
سؤال
What are some of the malwares employed by terrorists, hacktivists, corporate spies, criminals, and pleasure seekers?
سؤال
Misrepresentation occurs in an auction when a fraudster deceives the bidder as to the item's ________.
سؤال
Compromised computers attached to the Internet, which are often used to remotely perform malicious or criminal tasks, are called ________.
سؤال
A malware program that encrypts or otherwise renders computer or digital resources inoperable or inaccessible in furtherance of the illegal compulsion of an action or exchange is termed as ________.
سؤال
Discuss the process of money laundering and the methods of combating it in the computer era.
سؤال
Discuss how a traditional crime such as dissemination of contraband and offensive materials has reappeared in the computer era.
The answer should include the following points:
-Child pornography
-Child enticement/exploitation
-Online pharmacies
-Online gambling
سؤال
What, in your opinion, are the factors that make online gambling attractive to customers?
سؤال
Match between columns
Obsessional stalkers
They seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers.
Obsessional stalkers
They are individuals who have low selfesteem and target a victim whom they hold in high regard.
Obsessional stalkers
They are delusional and believe that their victim is in love with them or has had a previous relationship with them.
Obsessional stalkers
They do not seek or fantasize about a personal relationship with the victim; rather, they are motivated by either economic gain or revenge
Erotomaniacs
They seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers.
Erotomaniacs
They are individuals who have low selfesteem and target a victim whom they hold in high regard.
Erotomaniacs
They are delusional and believe that their victim is in love with them or has had a previous relationship with them.
Erotomaniacs
They do not seek or fantasize about a personal relationship with the victim; rather, they are motivated by either economic gain or revenge
Vengeance or terrorist stalkers
They seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers.
Vengeance or terrorist stalkers
They are individuals who have low selfesteem and target a victim whom they hold in high regard.
Vengeance or terrorist stalkers
They are delusional and believe that their victim is in love with them or has had a previous relationship with them.
Vengeance or terrorist stalkers
They do not seek or fantasize about a personal relationship with the victim; rather, they are motivated by either economic gain or revenge
Love-obsession stalkers
They seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers.
Love-obsession stalkers
They are individuals who have low selfesteem and target a victim whom they hold in high regard.
Love-obsession stalkers
They are delusional and believe that their victim is in love with them or has had a previous relationship with them.
Love-obsession stalkers
They do not seek or fantasize about a personal relationship with the victim; rather, they are motivated by either economic gain or revenge
سؤال
Match between columns
Infection of DOS machines spread by removable media
The Classical Era
Infection of DOS machines spread by removable media
The Floppy Era
Infection of DOS machines spread by removable media
The Internet Era
The introduction of group of publicized infections such as CodeRed and Sir Cam, with new methods of replication
The Classical Era
The introduction of group of publicized infections such as CodeRed and Sir Cam, with new methods of replication
The Floppy Era
The introduction of group of publicized infections such as CodeRed and Sir Cam, with new methods of replication
The Internet Era
System anomalies occurred accidentally or as a result of pranks by programers or system administrators
The Classical Era
System anomalies occurred accidentally or as a result of pranks by programers or system administrators
The Floppy Era
System anomalies occurred accidentally or as a result of pranks by programers or system administrators
The Internet Era
سؤال
Match between columns
Interference with lawful use of computer's
Cybervandalism, cyberterrorism
Interference with lawful use of computer's
Industrial espionage and ID fraud
Interference with lawful use of computer's
Money laundering and conspiracy
Ancillary crimes
Cybervandalism, cyberterrorism
Ancillary crimes
Industrial espionage and ID fraud
Ancillary crimes
Money laundering and conspiracy
Theft of information and copyright infringement
Cybervandalism, cyberterrorism
Theft of information and copyright infringement
Industrial espionage and ID fraud
Theft of information and copyright infringement
Money laundering and conspiracy
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/63
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Contemporary Computer Crime
1
Which of the following refers to a computer that has been compromised by some form of malware, enabling the criminal to remotely control that computer?

A) Trojan
B) bundler
C) zombie
D) rootkit
C
2
Which of the following launched the first online casino in 1995 with 18 games?

A) PokerStars
B) Rational Group US Holdings
C) Internet Casinos, Inc.
D) Full Tilt Poker
C
3
Which of the following best defines shoulder surfing?

A) using computers to remotely perform malicious or criminal tasks
B) using electronic messaging systems to randomly or indiscriminately send unsolicited bulk messages
C) rendering computers or digital resources inoperable in furtherance of the illegal compulsion of an action or exchange
D) literally watching someone from behind, as he or she inputs a password
D
4
According to the Office of Juvenile Justice and Delinquency Prevention (OJJDP) and the National Center for Missing and Exploited Children (NCMEC), almost all possessors of child pornography are ________.

A) black males who are younger than 25
B) white males who are younger than 25
C) homosexual males who are older than 25
D) white males who are older than 25
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following refers to a software program or hardware device that records everything you type into a compromised computer?

A) keyloggers
B) salamis
C) worms
D) Trojans
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
6
Cybervandalism and cyberterrorism are examples of which category of online crime?

A) theft of information and copyright infringement
B) interference with lawful use of computers
C) threatening communications
D) dissemination of contraband or offensive materials
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following refers to stalkers who are delusional and believe that their victim is in love with them or has had a previous relationship with them?

A) obsessional stalkers
B) love-obsession stalkers
C) erotomaniacs
D) vengeance stalker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following statements regarding online gaming is untrue?

A) The increase in e-banking allows users to access and add funds without even leaving their chair.
B) The continuous operation of online casinos makes them accessible 24 hours a day.
C) The lack of physicality and geographical location makes online casinos accessible to any user with a computer, PDA, or cell phone.
D) Minors' accessibility to online gaming is restricted, as age verification is mandatory.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is true regarding child pornography in the United States?

A) NAMBLA is an organization created by the federal government and operated by the National Center for Missing and Exploited Children.
B) The PROTECT Act has not been successful in withstanding constitutional challenges regarding child pornography.
C) The possession or distribution of child pornography is jurisdictionally illegal in just 32 states and all territories.
D) The Supreme Court ruled that the Child Pornography Prevention Act was unconstitutional.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following types of fraud occurs when a fraudster adds hidden charges to the advertised price, perhaps in shipping or handling?

A) fee stacking
B) misrepresentation
C) nondelivery
D) shill bidding
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is NOT a primary motivation for the possession of child pornography?

A) fight for legalizing man/boy sexual relationship
B) satisfaction of a desire for new and different sexual stimuli
C) satisfaction of a peculiar curiosity
D) possession and subsequent distribution designed for economic profit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following refers to a malware program that encrypts or otherwise renders computer or digital resources inoperable or inaccessible in furtherance of the illegal compulsion of an action or exchange?

A) worm
B) social engineering
C) ransomware
D) spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following refers to the abuse of electronic messaging systems to randomly or indiscriminately send unsolicited bulk messages?

A) phishing
B) spamming
C) phreaking
D) shoulder surfing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following eras of computer viruses is largely characterized by infection of DOS machines spread by removable media?

A) Classical era
B) Internet era
C) Macro era
D) Floppy era
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
15
The individuals who seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers are known as ________.

A) obsessional stalkers
B) love-obsession stalkers
C) erotomaniacs
D) vengeance stalkers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
16
A deliberate, politically or religiously motivated attack against data compilations, computer programs, and/or information systems that is intended to disrupt and/or deny service or acquire information that disrupts the social, physical, or political infrastructure of a target, is known as ________.

A) cyberterrorism
B) salami technique
C) cyberstalking
D) cyberbullying
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is atypical of both physical stalkers and cyberstalkers?

A) They are usually known to their victims.
B) They are motivated by economic gain.
C) They are usually male.
D) They usually focus their attentions on women.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is NOT true regarding child pornography and child exploitation?

A) Almost 40 percent of arrested offenders who met victims online possessed child pornography materials.
B) Usually, youngsters who enjoy access to unsupervised computer communications are not victims.
C) Child pornography is used as both a tool for sexual gratification and as a means to seduce or groom potential victims.
D) Typical prey of child exploitation includes those individuals who express frustration with parental controls or who appear particularly naïve or vulnerable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following refers to two distinct methods of distributed denial of service (DDoS) attacks?

A) spamming and fraggling
B) smurfing and fraggling
C) stalking and spamming
D) freezing and stalking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is NOT true regarding the success of ransomwares?

A) Ransomware is most successful when the applicable victim lacks knowledge of or is apathetic to system security.
B) Ransomware succeeds when the level of data destruction caused by sabotage cannot be recovered using commercially available software.
C) Ransomware payments are typically made in hard cash directly to the perpetrator.
D) In order for ransomware to be successful, the compromised data must have some worth to the victim.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
21
The Macro Era of computer viruses was largely characterized by infection of DOS machines spread by removable media.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following refers to redirecting thin slices of accounts into a designated location?

A) salami technique
B) data diddling
C) spoofing
D) ISP-jacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
23
Recent studies indicate that the emergence of cloud computing and removable media has effectively decreased theft of information or breaches in digital security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
24
At the dawn of the computer age, the term "computer crime" usually referred to the theft of computers or computer components.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
25
The ultimate goal of ransomware can be realized only when a secure method of payment is available.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following refers to the sale of stolen goods through technological means?

A) day trading
B) insider trading
C) e-Fencing
D) spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
27
Spamming refers to the abuse of electronic messaging systems to randomly or indiscriminately send unsolicited bulk messages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
28
The SAFE DOSES Act targets computer malware attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
29
The possession or distribution of child pornography is jurisdictionally illegal in all 50 states and in all territories under the umbrella of the United States.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
30
Victims of harassment and stalking are overwhelmingly females or children.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
31
Vengeance or terrorist stalkers are motivated by either economic gain or revenge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
32
To steal credit card information by installing devices on card readers located in ATMs, gas pumps, restaurants, grocery stores, retail establishments, or any other area where magnetic strip card readers are employed is known as ________.

A) spamming
B) skimming
C) RFID
D) shill bidding
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following refers to the deliberate manipulation of an existing program to redirect or reroute data representing monies or economic exchanges?

A) ISP jacking
B) web cramming
C) data diddling
D) IP spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following refers to a seller in an auction driving up the cost of his or her own item by bidding on it?

A) fee stacking
B) shill bidding
C) misrepresentation
D) nondelivery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
35
Shill bidding at an auction occurs when a fraudster accepts payment for an item and then fails to deliver it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
36
A deliberate politically or religiously motivated attack against data compilations, computer programs, and/or information systems which is intended to disrupt and/or deny service or acquire information which disrupts the social, physical, or political infrastructure of a target is known as cyberterrorism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
37
According to the Office of Juvenile Justice and Delinquency Prevention (OJJDP) and the National Center for Missing and Exploited Children (NCMEC), almost all possessors of child pornography are black males who are under the age of 25.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
38
Rootkit is a software program or hardware device that records all keystrokes of a compromised computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
39
Stealing credit card information by installing devices on magnetic card readers located in ATMs and gas pumps is known as data diddling.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
40
Like the majority of malware, whose survival is almost entirely contingent upon concealment, ransomware does not proclaim its existence at inception.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
41
________ involves the use of radio waves to facilitate the transfer of information between an electronic tag (or label) and a reader.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
42
Discuss various methods of criminal theft of information or data manipulation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
43
________ stalkers seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
44
Engaging in deliberate financial transactions to conceal the identity, source, and/or destination of income is known as ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
45
An aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend him-or herself is known as ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
46
The process of buying and selling highly speculative stocks within one trading day is known as ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
47
________ refers to the deliberate manipulation of an existing program to redirect or reroute data representing monies or economic exchanges.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
48
An intentional deception, misrepresentation, or falsehood made with the intention of receiving unwarranted compensation or gratification is known as ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
49
________ involves disconnecting individual users from their selected Internet service providers and redirecting them to illegitimate servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
50
The sale of stolen goods through technological means is known as ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
51
________ is most often accomplished when criminals develop new Web pages for small businesses and nonprofit groups for little or no expense.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
52
________ may be defined as the willful, malicious, and repeated following and/ or harassing of another person in an effort to inflict or cause fear of actual harm through words or deeds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
53
________ are delusional and believe that their victim is in love with them or has had a previous relationship with them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
54
What are some of the malwares employed by terrorists, hacktivists, corporate spies, criminals, and pleasure seekers?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
55
Misrepresentation occurs in an auction when a fraudster deceives the bidder as to the item's ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
56
Compromised computers attached to the Internet, which are often used to remotely perform malicious or criminal tasks, are called ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
57
A malware program that encrypts or otherwise renders computer or digital resources inoperable or inaccessible in furtherance of the illegal compulsion of an action or exchange is termed as ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
58
Discuss the process of money laundering and the methods of combating it in the computer era.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
59
Discuss how a traditional crime such as dissemination of contraband and offensive materials has reappeared in the computer era.
The answer should include the following points:
-Child pornography
-Child enticement/exploitation
-Online pharmacies
-Online gambling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
60
What, in your opinion, are the factors that make online gambling attractive to customers?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
61
Match between columns
Obsessional stalkers
They seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers.
Obsessional stalkers
They are individuals who have low selfesteem and target a victim whom they hold in high regard.
Obsessional stalkers
They are delusional and believe that their victim is in love with them or has had a previous relationship with them.
Obsessional stalkers
They do not seek or fantasize about a personal relationship with the victim; rather, they are motivated by either economic gain or revenge
Erotomaniacs
They seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers.
Erotomaniacs
They are individuals who have low selfesteem and target a victim whom they hold in high regard.
Erotomaniacs
They are delusional and believe that their victim is in love with them or has had a previous relationship with them.
Erotomaniacs
They do not seek or fantasize about a personal relationship with the victim; rather, they are motivated by either economic gain or revenge
Vengeance or terrorist stalkers
They seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers.
Vengeance or terrorist stalkers
They are individuals who have low selfesteem and target a victim whom they hold in high regard.
Vengeance or terrorist stalkers
They are delusional and believe that their victim is in love with them or has had a previous relationship with them.
Vengeance or terrorist stalkers
They do not seek or fantasize about a personal relationship with the victim; rather, they are motivated by either economic gain or revenge
Love-obsession stalkers
They seek to re-establish a relationship with an unwilling partner and are considered the most dangerous of stalkers.
Love-obsession stalkers
They are individuals who have low selfesteem and target a victim whom they hold in high regard.
Love-obsession stalkers
They are delusional and believe that their victim is in love with them or has had a previous relationship with them.
Love-obsession stalkers
They do not seek or fantasize about a personal relationship with the victim; rather, they are motivated by either economic gain or revenge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
62
Match between columns
Infection of DOS machines spread by removable media
The Classical Era
Infection of DOS machines spread by removable media
The Floppy Era
Infection of DOS machines spread by removable media
The Internet Era
The introduction of group of publicized infections such as CodeRed and Sir Cam, with new methods of replication
The Classical Era
The introduction of group of publicized infections such as CodeRed and Sir Cam, with new methods of replication
The Floppy Era
The introduction of group of publicized infections such as CodeRed and Sir Cam, with new methods of replication
The Internet Era
System anomalies occurred accidentally or as a result of pranks by programers or system administrators
The Classical Era
System anomalies occurred accidentally or as a result of pranks by programers or system administrators
The Floppy Era
System anomalies occurred accidentally or as a result of pranks by programers or system administrators
The Internet Era
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
63
Match between columns
Interference with lawful use of computer's
Cybervandalism, cyberterrorism
Interference with lawful use of computer's
Industrial espionage and ID fraud
Interference with lawful use of computer's
Money laundering and conspiracy
Ancillary crimes
Cybervandalism, cyberterrorism
Ancillary crimes
Industrial espionage and ID fraud
Ancillary crimes
Money laundering and conspiracy
Theft of information and copyright infringement
Cybervandalism, cyberterrorism
Theft of information and copyright infringement
Industrial espionage and ID fraud
Theft of information and copyright infringement
Money laundering and conspiracy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 63 في هذه المجموعة.