225-C18 - Cybercrime and Cyberdeviance Flashcards

1
Q

Cybercrime

AKA…?

A

Illgeal activities carried out with a computer over a network (e.g. internet)

AKA computer crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name 2 examples of activities that constitute cybercrime:

A
  • phishing
  • ripping
  • hacking
  • luring
  • stalking
  • spamming
  • skimming
  • trafficking
  • software piracy
  • identity theft/fraud
  • cyberterrorism
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing.

A

The use of misleading or counterfeit electronic transmissions, such as emails purportedly from credit card companies or other financial institutions, requesting sensitive personal information or password data, with the intention of compromising the victim’s banking or credit accounts.

e.g. “You are $284 dollars above credit. Please click here to learn more”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ripping

A

The use of specially designed software or other methods of circumventing copyright protection for the purposes of downloading or copying original material from a protected media source (DVD, online video, etc.) to a hard disk, usually for the purpose of resale or redistribution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hacking

A

The attempt to remotely circumvent the security or privacy measures initiated by an Internet website, server, or database, for the purposes of either stealing information or interfering with operations and compromising data through distributed denial-of-service attacks, deployment of viruses, or other malicious actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Luring

A

the act of using an Internet connection to access social media, chat rooms, or other places of electronic assembly to make contact with a child or person under 16 for the purposes of counselling them to commit a sexual act or to meet at a physical location for sexual purposes. This is typically accomplished by the offender posing online as an underage person himself in order to conceal his real identity and intentions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Stalking

A

The use of a computer or other network-enabled device to repeatedly make unwanted contact with a person using any number of means (e-mails, text messages, etc.), and doing so knowing that this behaviour is likely to cause fear or annoyance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spamming

A

The use of one or more computer networks and servers to send unsolicited and unwanted bulk messages to other users, often consisting of vexatious advertisements or pornographic content delivered either by e-mail or by pop-up windows in Internet browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Skimming

A

The use of specific software and hardware to intercept e-transmissions containing sensitive financial data, usually related to credit card purchases. The stolen data enable the cloning or counterfeiting of specific financial instruments (credit cards, bank cards, etc.) for the purposes of theft and fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Trafficking

A

Any use of a computer network to move illicit images (or other media), controlled substances, or people. In the context of cybercrime, trafficking can include examples like distributing child pornography; selling or distributing drugs via the portion of the “Deep Web” known as the “Dark Web”; or making contact with victims to “groom” them for human trafficking operations—essentially another version of luring but with different objectives and victims.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Software piracy

A

Software Piracy is the illegal approach of acquiring, sharing, copying, distributing, modifying, selling, or using the software which is legally protected by means of the Internet. This can also be done online (online software piracy) or offline (face-to-face software piracy). Software piracy is the equivalent of theft and is, therefore, a crime. Examples of both online and offline software piracy: an end-user installing a single-use license on multiple computers, a holidaymaker buying a pirated copy of a piece of software in the Far East where they engage in mass distribution of illegally obtained software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identity theft or identity fraud

A

are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain. In today’s advancements in technology, most of identity theft cases occurs online. Examples include stealing or exploiting personal information—such as your Social Security Number, bank account number, and credit card information etc for economic gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyberterrorism

A

Cyberterrorism is the convergence of cyberspace and terrorism. It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government and the public in furtherance of political or social objectives. Examples include cyberterrorists targeting a water treatment plant, causing a regional power outage or disrupting a pipeline, oil refinery or fracking operation. Cyberterrorism is a type of cyber attack just like cyberespionage in which hackers attempt to gain access to sensitive or confidential data/information of a business or government entity for economic gain, competitive advantage or political reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

who defined cybercrime as “Any criminal offence or series of offences committed through the use of a computer and a computer network or Internet connection”?

A

Moore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Definition of Cyberterrorism according to Baranetsky

A

using a computer to orchestrate large-scale “attacks on information,” including government or critical infrastructure servers or any database of interest to national security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

electronic crime

AKA…

A

Online crimes that are largely analogous to offline crimes of violence and sexual offending

AKA “e-crime”

17
Q

what was the e-crime of Apr 2014 involving the CRA?

A
  • heartbleed security bug got website
18
Q

what was the e-crime of Dec 2013 involving Target?

A

hackers stole credit card info

19
Q

what was the e-crime of may 2014 concerning five chinese military officers?

A

they comprimised the servers of US corporations to steal industrial secrets

20
Q

what was the e-crime related to Feb 2015 with the Kaspesky Lab

A

long-term heist around the world
stole 1 billion dollars

21
Q

critical infrastructure site

A

any location or asset, either physical or virtual, that is vital to the socio-economic and physical security of a nation or region
e.g.:
* treatment facilities
* telecommunications centres
* hospitals and health care facilities
* nuclear and other power-generating facilities
* airports and railway stations
* centres of major economic activity, such as stock and security exchanges.

22
Q

cybercrime vs. cyberterrorism

A

cybercrime is a FORM of cyberterrorism
* more personal
* attacks individuals

23
Q

explain how social media and computer access allows for antisocial online behaviours

A
  • anonymity
  • requires a broad understanding of the tech
24
Q

deviant cybercommunities

A
  • subcultural network
  • people here want to exploit people in websites, social media, and other online tech
25
Q

What are 4 kinds of digital paraphilia

A
  1. erotomania
  2. exhibitionism
  3. scopophilia
  4. scatalogia
26
Q

erotomania in digital spaces

A

cyberstalking

27
Q

exhibitionism in digital spaces

A

sexting

28
Q

scopophilia in digital spaces

A

using smartphone to secretly record/photograph people

29
Q

scatologia in digital spaces

A

cyberbullying, cybermobbing, and internet trolling

30
Q

cyberbullying

definition

A

when people use tech to harass, threaten, or bully others

in KIDS, this is cyberbullying
in ADULTS, this is cyber-harassment

31
Q

what is the difficulting in regulating cyberbullying?

A
  • socially and politically charged ==> not easily defined in legislation
  • need to be balanced with people’s privacy and freedom of expression.
32
Q

name 2 causes of cyberbullying

A
  1. attention (likes, followers)
  2. transition from offline bullying
  3. anonymity
  4. emotional reason
  5. way to deal with boredom and access to tech
33
Q

name 3 examples of cyberbullying

A
  1. abusive/threatening
  2. cyberstalking
  3. harmful rumours/gossips
  4. impersonation
  5. imitation/parodies
  6. harassment
  7. threats
  8. cyberteasing
  9. discriminatory communication
34
Q

what are the four psychological impacts of cyberbullying?

what are some other effect of cyberbullying?

A
  1. suicide
  2. self-harm
  3. depression
  4. anxiety

  • reduced self-worth
  • fear of using online platforms
  • feelings of anger and embarassment
35
Q

how can we apply routine activities theory to online behaviour?

A

look at the routing activity (frequency of online visits), and arrange users in a continuum of risk tolerance by how online they are

36
Q

what are some discriminatory forms of cyberbehaviour?

A
  1. homophobia
  2. sexism/misogyny
  3. religion
  4. race
37
Q

T/F: men are more likely to be targets of cyberbullying/cyberharassment

A

FALSE. girls are more vulnerable to this