Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Computer Forensics
Quiz 3: Traditional Computer Crime: Early Hackers and Theft of Components
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Essay
Describe the five general categories of cybercriminals in today's society.
Question 42
Short Answer
________ are the most organized groups trafficking in stolen computer components.
Question 43
Short Answer
________ activities may range from snooping around neighbors' computers to searching the recesses of top-secret government databases.
Question 44
Short Answer
The ________ program exploited security holes in the Unix operating system, infecting 10 percent of all computers connected to the Internet.
Question 45
Short Answer
Law enforcement agencies should look to ________ and federal legislation to prosecute computer crimes in the absence of technology-specific legislation.
Question 46
Short Answer
________ is the term use by law enforcement authorities to categorize those involved in vandalism, destructive programs, and general mischief for no economic gain.
Question 47
Short Answer
The promise of anonymity coupled with the dearth of ________ encourages deviant activity.
Question 48
Short Answer
In hacking activities, one computer provides the ________ for the criminal activity, while another serves as the target.
Question 49
Essay
List and describe the primary motivations for computer intrusion or theft of information in contemporary society. The answer should include the following points: National origin, ideology, or demographics aside, there appear to be six primary motivations for computer intrusion or theft of information in contemporary society: -Boredom -Intellectual challenge (mining for knowledge-pure hackers) -Revenge (insiders, disgruntled employees, etc.) -Sexual gratification (stalking, harassment, etc.) -Economic (criminals) -Political (hacktivists, terrorists, spies, etc.)
Question 50
Short Answer
Many members of the ________ were not malicious or criminal minded and proclaimed themselves as public servants, pointing out security flaws in institutional systems so that repairs would be made.