Deck 14: Political Cybercrime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
Play
Full screen (f)
Deck 14: Political Cybercrime
1
Which of the following cybercrimes can be classified as political cybercrime?
A) Hacktivism
B) Cyberterrorism
C) Cyberwarfare
D) Both B and C
E) All of the above
A) Hacktivism
B) Cyberterrorism
C) Cyberwarfare
D) Both B and C
E) All of the above
E
2
Political cybercriminals engage in ___________.
A) hacking
B) malware distribution
C) denial of service (DoS) attacks
D) distributed denial of service (DDoS) attacks
E) all of the above
A) hacking
B) malware distribution
C) denial of service (DoS) attacks
D) distributed denial of service (DDoS) attacks
E) all of the above
E
3
Which of the following cybercrimes have hacktivists equated with online civil disobedience?
A) Website defacement
B) Malware distribution
C) Redirecting websites
D) Data theft and disclosure
E) All of the above
A) Website defacement
B) Malware distribution
C) Redirecting websites
D) Data theft and disclosure
E) All of the above
E
4
_________ refers to the use of coercive tactics to provoke fear and cause harm or damage with the intention of replacing a capitalist regime with a socialist or communist regime.
A) Religious terrorism
B) Left-wing terrorism
C) Right-wing terrorism
D) Nationalist-separatist terrorism
E) Special-interest terrorism
A) Religious terrorism
B) Left-wing terrorism
C) Right-wing terrorism
D) Nationalist-separatist terrorism
E) Special-interest terrorism
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
________refers to the use of threats or acts of violence against a particular group that is motivated by notions of racial supremacy or antigovernment and antiregulatory beliefs.
A) Religious terrorism
B) Left-wing terrorism
C) Right-wing terrorism
D) Nationalist-separatist terrorism
E) Special-interest terrorism
A) Religious terrorism
B) Left-wing terrorism
C) Right-wing terrorism
D) Nationalist-separatist terrorism
E) Special-interest terrorism
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
________ refers to the use of coercive tactics to resolve a specific issue that a group believes warrants immediate attention.
A) Religious terrorism
B) Left-wing terrorism
C) Right-wing terrorism
D) Nationalist-separatist terrorism
E) Special-interest terrorism
A) Religious terrorism
B) Left-wing terrorism
C) Right-wing terrorism
D) Nationalist-separatist terrorism
E) Special-interest terrorism
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
________ refers to the use of the Internet to target critical infrastructure with the intention of provoking fear and causing damage, serious bodily harm, or death to effect some form of change in the government or population in furtherance of a political, religious, or ideological goal.
A) Cyberwarfare
B) Cyberterrorism
C) Cyberespionage
D) Hacktivism
E) Wardriving
A) Cyberwarfare
B) Cyberterrorism
C) Cyberespionage
D) Hacktivism
E) Wardriving
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
A _________ is an illegal act conducted by a state to obtain justice for an attack committed against it.
A) reprisal
B) retorsion
C) self-defense
D) precautionary
E) none of the above
A) reprisal
B) retorsion
C) self-defense
D) precautionary
E) none of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
A _______ is a legal act conducted by a harmed country in response to an attack.
A) reprisal
B) retorsion
C) self-defense
D) precautionary
E) none of the above
A) reprisal
B) retorsion
C) self-defense
D) precautionary
E) none of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
_______ holds that the international system creates opportunities for states to both cooperate and engage in self-help and it is up to the state to determine whether to take advantage of these opportunities.
A) Realism
B) Security dilemma
C) Liberalism
D) Brinkmanship
E) None of the above
A) Realism
B) Security dilemma
C) Liberalism
D) Brinkmanship
E) None of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
A _________ engages in cybercrime in furtherance of self-perceived justice to draw attention to his or her cause.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
________ involves actions that constitute a nonviolent intentional breach of law.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
________ is the practice of spying or using spies, typically by a government, to obtain economic, political, or military information.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
________ refer to groups with both the capability and the intent to persistently and effectively target a specific entity.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
_______ refers to engaging in coercive tactics to cause fear, destruction, harm, or death with the intention of effecting some form of change in the government or population in pursuit of a political, ideological, or religious goal.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
_______ involves the use of coercive acts in pursuit of what individuals believe to be divinely commanded purposes, representing extremists' interpretations of their faith.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
________ refers to the use of coercive tactics by an ethnic or religious group that believes it is, or in fact is, persecuted by a majority to create an independent homeland.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
The _______ ultimately holds that countries misinterpret the actions of another nation to improve security as a threat.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
________ is the doctrine of military strategy holding that the full-scale use of force by two opposing sides effectively results in the destruction of both in an attack.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
_______ refers to the process of engaging in continual escalation of actions to the point of a catastrophic outcome with the intention of gaining a favorable outcome.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
The tactics, targets, and even modus operandi of political cybercriminals may be similar in nature.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
One type of cybervigilante is a hacktivist.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
An example of cyberterrorism is terrorists' use of the Internet.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
Cyberwarfare has occurred.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
Hackback is a tactic that can be used by actors that is in accordance with existing laws.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
Collective punishment targets those who are not responsible for the illicit behavior.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
Cyberoffensive tactics are measures that can detect vulnerabilities, patch them, detect attempted cyberattacks, and mitigate their impact with the necessary human and technical resources.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
Cyberdefensive tactics involve proactive responses designed to penetrate enemy systems and cause harm or damage.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
Just war theory focuses on elucidating agents' intentions and strategic decisions with respect to their preferences or the perceived utility and costs of particular actions.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
Speech directed to incite, or which is likely to incite, imminent lawless, violent action is protected under the First Amendment to the U.S. Constitution.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck

