Deck 13: Cyberdeviance

ملء الشاشة (f)
exit full mode
سؤال
Why is it challenging to enforce state and federal legislation against computer crimes?

A) Enforcement is financially prohibitive.
B) Corporations do not like admitting their systems were vulnerable.
C) Those who wrote the laws are not current with the latest technology.
D) Cybercriminals are innovative when committing computer crimes.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What is a primary issue when drafting legislation against computer crime?

A) Laws must allow for technological innovation.
B) Laws must not be too broad.
C) Laws must not infringe on constitutionally protected rights.
D) Laws must cover a wide variety of possible crimes.
سؤال
Why are corporations unwilling to admit they were the victim of cybercrime?

A) Consumer confidence may erode.
B) They will be targeted for additional crimes.
C) They will be charged in connection with any crime that affects consumers.
D) Corporations commit most computer crimes.
سؤال
Which of the following statements about the cost of cybercrime is true?

A) The cost of cybercrime is decreasing.
B) The cost of cybercrime is increasing.
C) The cost of cybercrime is impossible to estimate.
D) Statistics on the costs of cybercrime vary wildly from year to year.
سؤال
Grace walks into the offices of a major movie studio, downloads thousands of confidential files, and uses this information to blackmail several people. What kind of cybercrime is this?

A) computer as incidental to other crime
B) computers as instruments of crime
C) computer as a target
D) crime associated with the prevalence of computers
سؤال
What category of cybercrime is using a computer to store client lists for illegal gambling operations?

A) computer as incidental to other crime
B) computers as instruments of crime
C) computer as a target
D) crime associated with the prevalence of computers
سؤال
Phillipe sells counterfeit copies of popular computer programs, such as Adobe Acrobat. What kind of cybercrime is this?

A) computer as incidental to other crime
B) computers as instruments of crime
C) computer as a target
D) crime associated with the prevalence of computers
سؤال
Graciela is debugging a program for her company using installed computer software that allows her to make changes without going through complicated access procedures. What is this kind of software called?

A) workaround
B) logic bomb
C) Trojan horse
D) trap door
سؤال
What are salami attacks used for?

A) It clones cell phone numbers.
B) It erases someone's identity.
C) theft
D) spying
سؤال
How can a virus infect a computer?

A) The victim downloads a file.
B) The victim buys an item from an unsecured website.
C) The victim leaves the log-in data on a public computer.
D) The victim sends personal information in an e-mail.
سؤال
A cyberdeviant named ScareBear systematically violates the security programs guarding a country's nuclear power plants. He intends to gain political concessions by threatening to initiate a nuclear meltdown. What category of cyberdeviant is ScareBear?

A) malicious hacker
B) career criminal
C) malcontent/addict
D) extreme advocate
سؤال
MotherofFlagons is driven to explore what computers can do. She is curious and will spend days at a time testing government security systems and designing work-arounds for accessing systems she is not supposed to access. She intends no harm, she just loves the challenge. What category of cyberdeviant is MotherofFlagons?

A) cracker
B) hacker
C) cyberpunk
D) coder
سؤال
What is the primary difference between hackers and crackers?

A) Hackers break the law; crackers do not.
B) Crackers are driven by the quest for information; hackers want money.
C) Hackers do not intend harm; crackers do.
D) Hackers are Generation X; crackers are millennial.
سؤال
Why do elite hackers value disembodied anonymity?

A) It makes the subculture more egalitarian.
B) It makes it easier to violate the law.
C) It ensures they are protected from criminal hackers.
D) It disconnects them from a society that does not appreciate them.
سؤال
Jackalope4U is able to interact with message boards without revealing any clues of their social status, race, class, age, or gender. As an elite hacker, they value this ______, because it means they are judged on their accomplishments alone.

A) disembodied anonymity
B) ethical fluidity
C) antipathy gap
D) dialectical materialism
سؤال
What makes cyberdeviant subculture possible?

A) the proliferation of smartphones
B) lack of government oversight
C) inadequate international laws
D) disembodied anonymity
سؤال
Which of the following statements about elite hackers is true?

A) Elite hackers are strong individualists.
B) Elite hackers view themselves as part of an inner circle.
C) Elite hackers enforce a code of behavior for lesser hackers.
D) Elite hackers see themselves as elite spies.
سؤال
What is a major ethical position of elite cyberdeviants?

A) sharing government secrets in public forums
B) collecting the private information of others
C) protecting the property of others against destruction
D) networking with other elite hackers
سؤال
Which of the following is an ethical standard of elite cyberdeviants?

A) leave no trace of security breaches
B) do not irreparably damage a legitimate user's information
C) report security vulnerabilities
D) leave a unique calling card to mark your successful breach of a target
سؤال
According to Donn Parker, how do cyberdeviants justify what they do?

A) They argue the harm they do is limited to computers.
B) They argue the government is too restrictive.
C) They argue that they provide an important security service.
D) They argue that their targets commit more cybercrime than they do.
سؤال
What is the primary motivation of most cyberdeviants?

A) destroying corporations
B) creating disorder
C) a sense of accomplishment
D) anarchy
سؤال
What is the "Robin Hood" syndrome?

A) a justification that cybercriminals use for stealing from large corporations
B) the idea that repressive governments actually create cybercriminals
C) the idea that cybercriminals are psychologically immature
D) a rationalization that cybercriminals are actually helping identify vulnerabilities in security systems
سؤال
Which theory of cyberdeviance would focus on the way that cyberdeviants can reject both the conventional goals and the conventional means of attaining those goals, replacing them with new, cyber-centric, means and goals?

A) social control
B) rational choice
C) differential association
D) anomie
سؤال
A cracker with the handle DeathFromAbove rationalizes her cyberdeviance by explaining that she only steals from corporate bank accounts in order to donate money to public libraries. What technique of neutralization is she using?

A) denial of victim
B) appeal to higher loyalties
C) denial of injury
D) denial of responsibility
سؤال
A cracker with the handle MaxZoom rationalizes his cyberdeviance by explaining that he uploads pirated media files because it doesn't hurt people, just faceless corporations. What technique of neutralization is he using?

A) condemnation of the condemners
B) denial of injury
C) denial of victim
D) appeal to higher loyalties
سؤال
It is easy to draft cybercrime legislation that is both constitutionally defensible and legally enforceable.
سؤال
There is no legislation against cybercrime at the federal level.
سؤال
China is the most frequent point of origin for cybercrime offenses.
سؤال
The demographic category with the highest rate of loss to cybercrime is those aged 50-59.
سؤال
Trap doors have no purpose beyond allowing cybercriminal access to otherwise secure data.
سؤال
A Trojan horse is one kind of virus delivery system.
سؤال
Mae would be classified a hacker, because she has no intention of committing cybercrime, though she likes to test her skills by attempting to breach financial institutions' computer network.
سؤال
Crackers are a kind of cybercriminals.
سؤال
The cyberdeviant subculture is based on real-world commonalities.
سؤال
Cyberdeviant subculture is organized into a hierarchy along strict race and gender lines.
سؤال
The majority of members within the cyberdeviant subculture believe that information should be free.
سؤال
The majority of members within the cyberdeviant subculture believe that computers make life worse.
سؤال
A hacker's status, power, and prestige depend upon recognition from others within the hacker subculture.
سؤال
Most cyberdeviants are motivated by financial gain.
سؤال
According to rational choice theory, cyberdeviants commit their crimes impulsively.
سؤال
How is a worm different from a virus?
سؤال
Distinguish between a hacker and a cracker.
سؤال
Describe three primary forms of unauthorized computer use.
سؤال
Distinguish between technovandalism and technotrespass.
سؤال
Apply the rational choice theory to cybercrime.
سؤال
Distinguish between the four categories of computer crime.
سؤال
Compare and contrast the four types of computer hackers described by Marc Rogers.
سؤال
Apply techniques of neutralization that offenders may use to justify cyberdeviance.
سؤال
Summarize methods of cyberdeviance.
سؤال
Distinguish between the seven types of cybercriminals identified by Donn Parker.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Cyberdeviance
1
Why is it challenging to enforce state and federal legislation against computer crimes?

A) Enforcement is financially prohibitive.
B) Corporations do not like admitting their systems were vulnerable.
C) Those who wrote the laws are not current with the latest technology.
D) Cybercriminals are innovative when committing computer crimes.
B
2
What is a primary issue when drafting legislation against computer crime?

A) Laws must allow for technological innovation.
B) Laws must not be too broad.
C) Laws must not infringe on constitutionally protected rights.
D) Laws must cover a wide variety of possible crimes.
C
3
Why are corporations unwilling to admit they were the victim of cybercrime?

A) Consumer confidence may erode.
B) They will be targeted for additional crimes.
C) They will be charged in connection with any crime that affects consumers.
D) Corporations commit most computer crimes.
A
4
Which of the following statements about the cost of cybercrime is true?

A) The cost of cybercrime is decreasing.
B) The cost of cybercrime is increasing.
C) The cost of cybercrime is impossible to estimate.
D) Statistics on the costs of cybercrime vary wildly from year to year.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Grace walks into the offices of a major movie studio, downloads thousands of confidential files, and uses this information to blackmail several people. What kind of cybercrime is this?

A) computer as incidental to other crime
B) computers as instruments of crime
C) computer as a target
D) crime associated with the prevalence of computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
What category of cybercrime is using a computer to store client lists for illegal gambling operations?

A) computer as incidental to other crime
B) computers as instruments of crime
C) computer as a target
D) crime associated with the prevalence of computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Phillipe sells counterfeit copies of popular computer programs, such as Adobe Acrobat. What kind of cybercrime is this?

A) computer as incidental to other crime
B) computers as instruments of crime
C) computer as a target
D) crime associated with the prevalence of computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Graciela is debugging a program for her company using installed computer software that allows her to make changes without going through complicated access procedures. What is this kind of software called?

A) workaround
B) logic bomb
C) Trojan horse
D) trap door
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
What are salami attacks used for?

A) It clones cell phone numbers.
B) It erases someone's identity.
C) theft
D) spying
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
How can a virus infect a computer?

A) The victim downloads a file.
B) The victim buys an item from an unsecured website.
C) The victim leaves the log-in data on a public computer.
D) The victim sends personal information in an e-mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
A cyberdeviant named ScareBear systematically violates the security programs guarding a country's nuclear power plants. He intends to gain political concessions by threatening to initiate a nuclear meltdown. What category of cyberdeviant is ScareBear?

A) malicious hacker
B) career criminal
C) malcontent/addict
D) extreme advocate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
MotherofFlagons is driven to explore what computers can do. She is curious and will spend days at a time testing government security systems and designing work-arounds for accessing systems she is not supposed to access. She intends no harm, she just loves the challenge. What category of cyberdeviant is MotherofFlagons?

A) cracker
B) hacker
C) cyberpunk
D) coder
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
What is the primary difference between hackers and crackers?

A) Hackers break the law; crackers do not.
B) Crackers are driven by the quest for information; hackers want money.
C) Hackers do not intend harm; crackers do.
D) Hackers are Generation X; crackers are millennial.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Why do elite hackers value disembodied anonymity?

A) It makes the subculture more egalitarian.
B) It makes it easier to violate the law.
C) It ensures they are protected from criminal hackers.
D) It disconnects them from a society that does not appreciate them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Jackalope4U is able to interact with message boards without revealing any clues of their social status, race, class, age, or gender. As an elite hacker, they value this ______, because it means they are judged on their accomplishments alone.

A) disembodied anonymity
B) ethical fluidity
C) antipathy gap
D) dialectical materialism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
What makes cyberdeviant subculture possible?

A) the proliferation of smartphones
B) lack of government oversight
C) inadequate international laws
D) disembodied anonymity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following statements about elite hackers is true?

A) Elite hackers are strong individualists.
B) Elite hackers view themselves as part of an inner circle.
C) Elite hackers enforce a code of behavior for lesser hackers.
D) Elite hackers see themselves as elite spies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
What is a major ethical position of elite cyberdeviants?

A) sharing government secrets in public forums
B) collecting the private information of others
C) protecting the property of others against destruction
D) networking with other elite hackers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is an ethical standard of elite cyberdeviants?

A) leave no trace of security breaches
B) do not irreparably damage a legitimate user's information
C) report security vulnerabilities
D) leave a unique calling card to mark your successful breach of a target
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
According to Donn Parker, how do cyberdeviants justify what they do?

A) They argue the harm they do is limited to computers.
B) They argue the government is too restrictive.
C) They argue that they provide an important security service.
D) They argue that their targets commit more cybercrime than they do.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
What is the primary motivation of most cyberdeviants?

A) destroying corporations
B) creating disorder
C) a sense of accomplishment
D) anarchy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
What is the "Robin Hood" syndrome?

A) a justification that cybercriminals use for stealing from large corporations
B) the idea that repressive governments actually create cybercriminals
C) the idea that cybercriminals are psychologically immature
D) a rationalization that cybercriminals are actually helping identify vulnerabilities in security systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which theory of cyberdeviance would focus on the way that cyberdeviants can reject both the conventional goals and the conventional means of attaining those goals, replacing them with new, cyber-centric, means and goals?

A) social control
B) rational choice
C) differential association
D) anomie
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
A cracker with the handle DeathFromAbove rationalizes her cyberdeviance by explaining that she only steals from corporate bank accounts in order to donate money to public libraries. What technique of neutralization is she using?

A) denial of victim
B) appeal to higher loyalties
C) denial of injury
D) denial of responsibility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
A cracker with the handle MaxZoom rationalizes his cyberdeviance by explaining that he uploads pirated media files because it doesn't hurt people, just faceless corporations. What technique of neutralization is he using?

A) condemnation of the condemners
B) denial of injury
C) denial of victim
D) appeal to higher loyalties
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
It is easy to draft cybercrime legislation that is both constitutionally defensible and legally enforceable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
There is no legislation against cybercrime at the federal level.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
China is the most frequent point of origin for cybercrime offenses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
The demographic category with the highest rate of loss to cybercrime is those aged 50-59.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Trap doors have no purpose beyond allowing cybercriminal access to otherwise secure data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
A Trojan horse is one kind of virus delivery system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Mae would be classified a hacker, because she has no intention of committing cybercrime, though she likes to test her skills by attempting to breach financial institutions' computer network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Crackers are a kind of cybercriminals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
The cyberdeviant subculture is based on real-world commonalities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Cyberdeviant subculture is organized into a hierarchy along strict race and gender lines.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
The majority of members within the cyberdeviant subculture believe that information should be free.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
The majority of members within the cyberdeviant subculture believe that computers make life worse.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
A hacker's status, power, and prestige depend upon recognition from others within the hacker subculture.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Most cyberdeviants are motivated by financial gain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
According to rational choice theory, cyberdeviants commit their crimes impulsively.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
How is a worm different from a virus?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Distinguish between a hacker and a cracker.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Describe three primary forms of unauthorized computer use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Distinguish between technovandalism and technotrespass.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Apply the rational choice theory to cybercrime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Distinguish between the four categories of computer crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Compare and contrast the four types of computer hackers described by Marc Rogers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Apply techniques of neutralization that offenders may use to justify cyberdeviance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Summarize methods of cyberdeviance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Distinguish between the seven types of cybercriminals identified by Donn Parker.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.