Deck 13: Conclusions and Future Issues

Full screen (f)
exit full mode
Question
Which of the following is true about the standard of accreditation of computer forensics?

A) The standard does not require a universal acceptance.
B) The standard does not require a mechanism for empirical testing and debate.
C) The standard requires a rigorous testing by all experts in the field.
D) The standard would increase Daubert/Frye challenges to the recovery of digital evidence.
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is considered true about the use of computers in virtual reality?

A) It will comply with criminal statutes in real-world situations.
B) It will decrease incidences of victimization in real-world situations.
C) It will create an environment conducive to the exploitation of children.
D) It will result in civil libertarians promoting censorship legislation.
Question
Which of the following is true of remote data storage?

A) Search warrants for any location of remote data are likely to be ruled constitutional.
B) Remote data storage aids law enforcement authorities in obtaining incriminating information.
C) The practice of data stripping impedes the efforts of law enforcement agencies.
D) The lack of physicality facilitates the identification of the prevailing legal authority.
Question
Which of the following is true regarding the application of wireless communications?

A) It provides a mechanism for phone location, but not data on the cell site.
B) It presents difficulty in determining jurisdictional boundaries.
C) FCC regulations discourage service providers from locating phones.
D) The Supreme Court recognizes the concept of privacy in wireless communications.
Question
What do existing forfeiture statutes mandate?

A) All assets of a legitimate business facilitating laundering of money obtained in an illegal enterprise cannot be seized.
B) Legitimate money, seized with illegal money, will be returned after deducting a fine.
C) Legitimate revenue if combined with laundered funds can be seized.
D) Legitimate revenue cannot be seized under any circumstances.
Question
All of the following about creation of a law enforcement departmental Web page are true EXCEPT ________.

A) it is used to foster positive relations with the community
B) it illustrates commitment to contemporary problems
C) it provides a mechanism for community input
D) it is unsuited to anonymous reporting
Question
Self-proclaimed "experts" of computer forensics ________.

A) enhance prosecutorial efforts
B) often utilize unrecognized methodologies
C) are much harder to find than true experts
D) recognize their own limitations
Question
Technology has made information ________, thus exponentially increasing its value.

A) illegal
B) obsolete
C) actionable
D) important
Question
The establishment of an accreditation of forensic methodologies and examiners is expected to ________.

A) include both true experts and self-proclaimed experts
B) include only investigators, not forensic programmers
C) increase the likelihood of successful evidentiary challenges
D) increase awareness and extend professionalism
Question
The inclusion of true experts in the development of expertise in forensic methodologies and examiners would result in ________.

A) increased likelihood of successful evidentiary challenges
B) more professionalism in computer investigations
C) decreased awareness among the community
D) greater utilization of unrecognized methodologies
Question
What is the primary reason for the lack of nomenclature that has hindered the investigation and prosecution of computer-related crime?

A) the emergence of wireless technology
B) the vast number of viruses and worms unleashed upon the Internet
C) the reluctance of the Supreme Court to interpret emerging laws
D) the huge increase in seemingly average individuals who are willing to become first-time criminals
Question
Which of the following does NOT hinder the efforts of law enforcement authorities?

A) presence of anonymizer-type technology
B) availability of a search warrant for nonparticularized location of remote data
C) increased remote storage facilities
D) availability of disposable e-mail accounts
Question
Legislatures struggling with issues of state sovereignty must ensure that the federal government takes the role of ________.

A) mediator, not dictator
B) dictator, not mediator
C) both mediator and dictator
D) either mediator or dictator
Question
The development of ________ legislation encourages economic growth consistent with an emerging global market.

A) computer-specific
B) enforcement-friendly
C) virtual
D) content-restrictive
Question
Which of the following is true of establishing accountability for Internet users?

A) Confidentiality should be provided for legitimate users.
B) Anonymity should be given to users who seek it.
C) The expectation of privacy in private activities never conflicts with law enforcement interests.
D) The development of enforcement-friendly legislation is an uncomplicated task.
Question
All of the following statements about cell phone viruses are true EXCEPT which?

A) They are unwanted executable files.
B) They will decrease as universal operating systems emerge.
C) They become contagious after infection.
D) They can be spread by Internet downloads or Bluetooth wireless connection.
Question
Which of the following is NOT one of the traditional problems that must be overcome for there to be effective international cooperation and fewer jurisdictional disputes relating to digital evidence?

A) an overabundance of Multi-Lingual Assistance Treaties (MLATs) that create jurisdictional inconsistencies
B) the presence of cultural stereotypes and multicultural tensions
C) a lack of expertise in criminal justice and legal communities
D) a lack of global consensus on criminal behavior and human rights
Question
Which of the following is a potential benefit that regional or national central reporting stations could offer in an effort to conserve resources in the investigation of computer-related crime?

A) replace the data mining efforts of the NSA and other large federal intelligence agencies
B) provide on-site management assistance for electronic crime units and task forces
C) replace the federal system in which regional U.S. Attorneys' offices report ongoing investigations to the Computer Crime Section of the Department of Justice
D) provide funding to the federal government in the form of grants
Question
Which of the following statements is considered true regarding the development of computer-specific legislation?

A) It should ensure uniformity in application and interpretation within a selected jurisdiction.
B) It must be applicable to traditional problems, not to advanced technology.
C) It must be applicable to tomorrow's technology, not to traditional problems.
D) It should ensure uniformity in application and interpretation irrespective of jurisdictional climate.
Question
Which of the following was the Organization for Economic Cooperation and Development unable to accomplish in its efforts to promote international mandates on computer-related criminal activity?

A) It recognized that cultural differences must be overcome when circumstances dictate.
B) It published an evaluation of existing laws among international communities.
C) It established widespread consensus among member countries on a detailed list of abuses to prohibit and prosecute.
D) It suggested revisions to existing international laws.
Question
Which of the following practices can be employed to enhance the effectiveness of data mining?

A) standardization of data appearance
B) inclusion of duplicate records
C) insertion of anomalous data points
D) retention of compromised data fields
Question
Identifying causal relationships or depth and strength of connections is easy with data mining.
Question
Law enforcement authorities can tap into traditional telephonic exchanges more easily than into wireless communications.
Question
A letter rogatory is a request for assistance from one country's judicial authority to that of another country.
Question
Inaction by the Supreme Court has led to the investigation and prosecution of computer-related crime being hindered by a lack of ________.
Question
Predictive data mining is a valuable tool for the identification of crime trends and suspected terrorists.
Question
Standardization of accreditation for forensic examiners would increase Daubert/Frye challenges to the recovery of digital evidence.
Question
Data mining can be employed in analyzing intelligence and identifying terrorists.
Question
To govern decency on the Web, bills have introduced the proposal of using "E-chip" blocking software as information filters.
Question
The increase of remote data storage facilities is conducive to the efforts of law enforcement authorities.
Question
Standardization of accreditation does not require a universal acceptance or rigorous testing of all experts in the field.
Question
Legitimate revenue that is intermingled with money-laundered funds cannot be seized.
Question
Packet sniffing and ________ have proved to be favorite targets of organizations like EPIC and the ACLU.

A) data mining
B) anonymizer-type technology
C) over-the-counter encryption technology
D) disposable e-mail accounts
Question
Data mining can readily differentiate between good and bad data sources.
Question
The proposal of rating systems for sites is considered unworkable, as no agency is available to enforce such ratings.
Question
Which of the following is considered one of the limitations of data mining as a popular analysis tool?

A) Data mining is incapable of revealing patterns.
B) Data mining's tools of analysis are limited to statistical models, mathematical algorithms, and artificial intelligence.
C) Data mining is employed to enhance services, not analyze intelligence and identify terrorists.
D) Data mining doesn't identify causal relationships or strength of connections.
Question
Teamwork between the law enforcement community and high-tech corporations will result in decreased reporting of criminal victimization among corporate targets.
Question
Which of the following statements is true of data mining?

A) Data quality is enhanced by the presence of duplicate records.
B) Data mining easily differentiates between good and bad data sources.
C) Data mining readily identifies causal relationships or depth and strength of connections.
D) Privacy advocates argue that data mining violates various constitutional rights.
Question
Presence of duplicate records can affect the quality of data in data mining.
Question
In the absence of Multi-Lingual Assistance Treaties (MLATs), international legal assistance is governed by domestic mutual legal assistance laws and practices.
Question
Member countries have been slow to react to international mandates for digital evidence preservation, citing ________ and American imperialism.
Question
Analyze the factors that necessitate the establishment of a standard of accreditation or expertise for computer forensics.Also list the issues to be addressed by such standardization.
Question
________ is a data hiding practice that fragments the data and places it on various servers.
Question
Federal authorities should develop ________ with enforcement components of other nations in the absence of Multi-Lingual Assistance Treaties.
Question
In the context of developing intradepartmental cooperation for computer-related crime, duplication of effort dramatically ________ the efficacy of dedicated efforts.
Question
FCC regulations instruct cellular providers to have the capability of locating phones within a ________ radius for longitude, latitude, and altitude.
Question
Legislation that mandates accountability of ________ servers should be developed to reduce the number of DOS attacks.
Question
The three operational modes of a model law enforcement agency are incident response, ________ management, and prevention.
Question
According to privacy advocates the practice of data mining, due to its limitations, violates ________.
Question
The effectiveness of data mining will be ________ by cleaning up data that has been compromised.
Question
Summarize the various types of data hiding practices that present unique challenges to law enforcement agencies.
Question
Internet downloads, Bluetooth wireless connection, and ________ are the ways by which cell phone viruses are spread via smart phones with connection and data capabilities.
Question
________ is the analysis of large data sets aimed at discovering patterns and relationships.
Question
A ________ is software that captures every action undertaken by an individual user of a suspect machine.
Question
Data mining practices have also been criticized for ________, as there appears to be a tendency to use mined data for things other than that which it was intended.
Question
Evaluate the role of data mining as an analysis tool in government agencies.Also include a note on limitations of data mining and ways to improve its effectiveness.
Question
________ statutes require businesses to assure the identity of their customers.
Question
Assess the benefits obtained by the relationship of the law enforcement community with the private sector in investigating and prosecuting computer-related crime.
Question
Match between columns
Department of Defense
compares its databases with those of the FBI to verify identities in Project Strikeback
Department of Defense
promotes awareness of best practices of cybersecurity
Department of Defense
employs software to analyze phone records and other voluminous data
Department of Defense
mines the intelligence community and the Internet to identify terrorists through the Verity K2 Enterprise program
National Infrastructure Advisory Council
compares its databases with those of the FBI to verify identities in Project Strikeback
National Infrastructure Advisory Council
promotes awareness of best practices of cybersecurity
National Infrastructure Advisory Council
employs software to analyze phone records and other voluminous data
National Infrastructure Advisory Council
mines the intelligence community and the Internet to identify terrorists through the Verity K2 Enterprise program
National Security Agency
compares its databases with those of the FBI to verify identities in Project Strikeback
National Security Agency
promotes awareness of best practices of cybersecurity
National Security Agency
employs software to analyze phone records and other voluminous data
National Security Agency
mines the intelligence community and the Internet to identify terrorists through the Verity K2 Enterprise program
Department of Education
compares its databases with those of the FBI to verify identities in Project Strikeback
Department of Education
promotes awareness of best practices of cybersecurity
Department of Education
employs software to analyze phone records and other voluminous data
Department of Education
mines the intelligence community and the Internet to identify terrorists through the Verity K2 Enterprise program
Question
Match between columns
E-chip blocking software
filters information, though unable to distinguish between legitimate and indecent information
E-chip blocking software
provides privacy and security for consumers by protecting data
E-chip blocking software
fragments data and places on various server's
Data encryption
filters information, though unable to distinguish between legitimate and indecent information
Data encryption
provides privacy and security for consumers by protecting data
Data encryption
fragments data and places on various server's
Data stripping
filters information, though unable to distinguish between legitimate and indecent information
Data stripping
provides privacy and security for consumers by protecting data
Data stripping
fragments data and places on various server's
Question
Match between columns
The Electronic Commerce and Consumer Protection Group
aims at the retention of data to identify online predator's
The Electronic Commerce and Consumer Protection Group
requests judicial assistance from another countivy
The Electronic Commerce and Consumer Protection Group
provides mechanism for communication in emergency situations
Letter rogatory
aims at the retention of data to identify online predator's
Letter rogatory
requests judicial assistance from another countivy
Letter rogatory
provides mechanism for communication in emergency situations
Departmental Web page
aims at the retention of data to identify online predator's
Departmental Web page
requests judicial assistance from another countivy
Departmental Web page
provides mechanism for communication in emergency situations
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/61
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 13: Conclusions and Future Issues
1
Which of the following is true about the standard of accreditation of computer forensics?

A) The standard does not require a universal acceptance.
B) The standard does not require a mechanism for empirical testing and debate.
C) The standard requires a rigorous testing by all experts in the field.
D) The standard would increase Daubert/Frye challenges to the recovery of digital evidence.
A
2
Which of the following is considered true about the use of computers in virtual reality?

A) It will comply with criminal statutes in real-world situations.
B) It will decrease incidences of victimization in real-world situations.
C) It will create an environment conducive to the exploitation of children.
D) It will result in civil libertarians promoting censorship legislation.
C
3
Which of the following is true of remote data storage?

A) Search warrants for any location of remote data are likely to be ruled constitutional.
B) Remote data storage aids law enforcement authorities in obtaining incriminating information.
C) The practice of data stripping impedes the efforts of law enforcement agencies.
D) The lack of physicality facilitates the identification of the prevailing legal authority.
C
4
Which of the following is true regarding the application of wireless communications?

A) It provides a mechanism for phone location, but not data on the cell site.
B) It presents difficulty in determining jurisdictional boundaries.
C) FCC regulations discourage service providers from locating phones.
D) The Supreme Court recognizes the concept of privacy in wireless communications.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
5
What do existing forfeiture statutes mandate?

A) All assets of a legitimate business facilitating laundering of money obtained in an illegal enterprise cannot be seized.
B) Legitimate money, seized with illegal money, will be returned after deducting a fine.
C) Legitimate revenue if combined with laundered funds can be seized.
D) Legitimate revenue cannot be seized under any circumstances.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
6
All of the following about creation of a law enforcement departmental Web page are true EXCEPT ________.

A) it is used to foster positive relations with the community
B) it illustrates commitment to contemporary problems
C) it provides a mechanism for community input
D) it is unsuited to anonymous reporting
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
7
Self-proclaimed "experts" of computer forensics ________.

A) enhance prosecutorial efforts
B) often utilize unrecognized methodologies
C) are much harder to find than true experts
D) recognize their own limitations
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
8
Technology has made information ________, thus exponentially increasing its value.

A) illegal
B) obsolete
C) actionable
D) important
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
9
The establishment of an accreditation of forensic methodologies and examiners is expected to ________.

A) include both true experts and self-proclaimed experts
B) include only investigators, not forensic programmers
C) increase the likelihood of successful evidentiary challenges
D) increase awareness and extend professionalism
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
10
The inclusion of true experts in the development of expertise in forensic methodologies and examiners would result in ________.

A) increased likelihood of successful evidentiary challenges
B) more professionalism in computer investigations
C) decreased awareness among the community
D) greater utilization of unrecognized methodologies
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
11
What is the primary reason for the lack of nomenclature that has hindered the investigation and prosecution of computer-related crime?

A) the emergence of wireless technology
B) the vast number of viruses and worms unleashed upon the Internet
C) the reluctance of the Supreme Court to interpret emerging laws
D) the huge increase in seemingly average individuals who are willing to become first-time criminals
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following does NOT hinder the efforts of law enforcement authorities?

A) presence of anonymizer-type technology
B) availability of a search warrant for nonparticularized location of remote data
C) increased remote storage facilities
D) availability of disposable e-mail accounts
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
13
Legislatures struggling with issues of state sovereignty must ensure that the federal government takes the role of ________.

A) mediator, not dictator
B) dictator, not mediator
C) both mediator and dictator
D) either mediator or dictator
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
14
The development of ________ legislation encourages economic growth consistent with an emerging global market.

A) computer-specific
B) enforcement-friendly
C) virtual
D) content-restrictive
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is true of establishing accountability for Internet users?

A) Confidentiality should be provided for legitimate users.
B) Anonymity should be given to users who seek it.
C) The expectation of privacy in private activities never conflicts with law enforcement interests.
D) The development of enforcement-friendly legislation is an uncomplicated task.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
16
All of the following statements about cell phone viruses are true EXCEPT which?

A) They are unwanted executable files.
B) They will decrease as universal operating systems emerge.
C) They become contagious after infection.
D) They can be spread by Internet downloads or Bluetooth wireless connection.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is NOT one of the traditional problems that must be overcome for there to be effective international cooperation and fewer jurisdictional disputes relating to digital evidence?

A) an overabundance of Multi-Lingual Assistance Treaties (MLATs) that create jurisdictional inconsistencies
B) the presence of cultural stereotypes and multicultural tensions
C) a lack of expertise in criminal justice and legal communities
D) a lack of global consensus on criminal behavior and human rights
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is a potential benefit that regional or national central reporting stations could offer in an effort to conserve resources in the investigation of computer-related crime?

A) replace the data mining efforts of the NSA and other large federal intelligence agencies
B) provide on-site management assistance for electronic crime units and task forces
C) replace the federal system in which regional U.S. Attorneys' offices report ongoing investigations to the Computer Crime Section of the Department of Justice
D) provide funding to the federal government in the form of grants
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following statements is considered true regarding the development of computer-specific legislation?

A) It should ensure uniformity in application and interpretation within a selected jurisdiction.
B) It must be applicable to traditional problems, not to advanced technology.
C) It must be applicable to tomorrow's technology, not to traditional problems.
D) It should ensure uniformity in application and interpretation irrespective of jurisdictional climate.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following was the Organization for Economic Cooperation and Development unable to accomplish in its efforts to promote international mandates on computer-related criminal activity?

A) It recognized that cultural differences must be overcome when circumstances dictate.
B) It published an evaluation of existing laws among international communities.
C) It established widespread consensus among member countries on a detailed list of abuses to prohibit and prosecute.
D) It suggested revisions to existing international laws.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following practices can be employed to enhance the effectiveness of data mining?

A) standardization of data appearance
B) inclusion of duplicate records
C) insertion of anomalous data points
D) retention of compromised data fields
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
22
Identifying causal relationships or depth and strength of connections is easy with data mining.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
23
Law enforcement authorities can tap into traditional telephonic exchanges more easily than into wireless communications.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
24
A letter rogatory is a request for assistance from one country's judicial authority to that of another country.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
25
Inaction by the Supreme Court has led to the investigation and prosecution of computer-related crime being hindered by a lack of ________.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
26
Predictive data mining is a valuable tool for the identification of crime trends and suspected terrorists.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
27
Standardization of accreditation for forensic examiners would increase Daubert/Frye challenges to the recovery of digital evidence.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
28
Data mining can be employed in analyzing intelligence and identifying terrorists.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
29
To govern decency on the Web, bills have introduced the proposal of using "E-chip" blocking software as information filters.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
30
The increase of remote data storage facilities is conducive to the efforts of law enforcement authorities.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
31
Standardization of accreditation does not require a universal acceptance or rigorous testing of all experts in the field.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
32
Legitimate revenue that is intermingled with money-laundered funds cannot be seized.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
33
Packet sniffing and ________ have proved to be favorite targets of organizations like EPIC and the ACLU.

A) data mining
B) anonymizer-type technology
C) over-the-counter encryption technology
D) disposable e-mail accounts
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
34
Data mining can readily differentiate between good and bad data sources.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
35
The proposal of rating systems for sites is considered unworkable, as no agency is available to enforce such ratings.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is considered one of the limitations of data mining as a popular analysis tool?

A) Data mining is incapable of revealing patterns.
B) Data mining's tools of analysis are limited to statistical models, mathematical algorithms, and artificial intelligence.
C) Data mining is employed to enhance services, not analyze intelligence and identify terrorists.
D) Data mining doesn't identify causal relationships or strength of connections.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
37
Teamwork between the law enforcement community and high-tech corporations will result in decreased reporting of criminal victimization among corporate targets.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following statements is true of data mining?

A) Data quality is enhanced by the presence of duplicate records.
B) Data mining easily differentiates between good and bad data sources.
C) Data mining readily identifies causal relationships or depth and strength of connections.
D) Privacy advocates argue that data mining violates various constitutional rights.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
39
Presence of duplicate records can affect the quality of data in data mining.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
40
In the absence of Multi-Lingual Assistance Treaties (MLATs), international legal assistance is governed by domestic mutual legal assistance laws and practices.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
41
Member countries have been slow to react to international mandates for digital evidence preservation, citing ________ and American imperialism.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
42
Analyze the factors that necessitate the establishment of a standard of accreditation or expertise for computer forensics.Also list the issues to be addressed by such standardization.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
43
________ is a data hiding practice that fragments the data and places it on various servers.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
44
Federal authorities should develop ________ with enforcement components of other nations in the absence of Multi-Lingual Assistance Treaties.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
45
In the context of developing intradepartmental cooperation for computer-related crime, duplication of effort dramatically ________ the efficacy of dedicated efforts.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
46
FCC regulations instruct cellular providers to have the capability of locating phones within a ________ radius for longitude, latitude, and altitude.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
47
Legislation that mandates accountability of ________ servers should be developed to reduce the number of DOS attacks.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
48
The three operational modes of a model law enforcement agency are incident response, ________ management, and prevention.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
49
According to privacy advocates the practice of data mining, due to its limitations, violates ________.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
50
The effectiveness of data mining will be ________ by cleaning up data that has been compromised.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
51
Summarize the various types of data hiding practices that present unique challenges to law enforcement agencies.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
52
Internet downloads, Bluetooth wireless connection, and ________ are the ways by which cell phone viruses are spread via smart phones with connection and data capabilities.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
53
________ is the analysis of large data sets aimed at discovering patterns and relationships.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
54
A ________ is software that captures every action undertaken by an individual user of a suspect machine.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
55
Data mining practices have also been criticized for ________, as there appears to be a tendency to use mined data for things other than that which it was intended.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
56
Evaluate the role of data mining as an analysis tool in government agencies.Also include a note on limitations of data mining and ways to improve its effectiveness.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
57
________ statutes require businesses to assure the identity of their customers.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
58
Assess the benefits obtained by the relationship of the law enforcement community with the private sector in investigating and prosecuting computer-related crime.
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
59
Match between columns
Department of Defense
compares its databases with those of the FBI to verify identities in Project Strikeback
Department of Defense
promotes awareness of best practices of cybersecurity
Department of Defense
employs software to analyze phone records and other voluminous data
Department of Defense
mines the intelligence community and the Internet to identify terrorists through the Verity K2 Enterprise program
National Infrastructure Advisory Council
compares its databases with those of the FBI to verify identities in Project Strikeback
National Infrastructure Advisory Council
promotes awareness of best practices of cybersecurity
National Infrastructure Advisory Council
employs software to analyze phone records and other voluminous data
National Infrastructure Advisory Council
mines the intelligence community and the Internet to identify terrorists through the Verity K2 Enterprise program
National Security Agency
compares its databases with those of the FBI to verify identities in Project Strikeback
National Security Agency
promotes awareness of best practices of cybersecurity
National Security Agency
employs software to analyze phone records and other voluminous data
National Security Agency
mines the intelligence community and the Internet to identify terrorists through the Verity K2 Enterprise program
Department of Education
compares its databases with those of the FBI to verify identities in Project Strikeback
Department of Education
promotes awareness of best practices of cybersecurity
Department of Education
employs software to analyze phone records and other voluminous data
Department of Education
mines the intelligence community and the Internet to identify terrorists through the Verity K2 Enterprise program
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
60
Match between columns
E-chip blocking software
filters information, though unable to distinguish between legitimate and indecent information
E-chip blocking software
provides privacy and security for consumers by protecting data
E-chip blocking software
fragments data and places on various server's
Data encryption
filters information, though unable to distinguish between legitimate and indecent information
Data encryption
provides privacy and security for consumers by protecting data
Data encryption
fragments data and places on various server's
Data stripping
filters information, though unable to distinguish between legitimate and indecent information
Data stripping
provides privacy and security for consumers by protecting data
Data stripping
fragments data and places on various server's
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
61
Match between columns
The Electronic Commerce and Consumer Protection Group
aims at the retention of data to identify online predator's
The Electronic Commerce and Consumer Protection Group
requests judicial assistance from another countivy
The Electronic Commerce and Consumer Protection Group
provides mechanism for communication in emergency situations
Letter rogatory
aims at the retention of data to identify online predator's
Letter rogatory
requests judicial assistance from another countivy
Letter rogatory
provides mechanism for communication in emergency situations
Departmental Web page
aims at the retention of data to identify online predator's
Departmental Web page
requests judicial assistance from another countivy
Departmental Web page
provides mechanism for communication in emergency situations
Unlock Deck
Unlock for access to all 61 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 61 flashcards in this deck.