Chap 3 - Cyber Crime, Fraud and Ethics Flashcards

1
Q

What is cybercrime?

A

a term that refers to any criminal activity that involves computers or networks (direct attack on computers or networks OR committing a crime using computers or networks)
i.e. stealing identities, harass an individual, uploading a virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is computer fraud?

A

specifically the use of computers or networks to commit a fraudulent act
i.e. = larceny, skimming and financial reporting fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is computer abuse?

A

someone that does not have permission, uses or accesses someone else’s computer or causes damage without intention to harm
i.e. = a data clerk broke a computer screen in a fit of anger when she threw her shoe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the most important legislation involving computers?

A

Computer Fraud and Abuse Act of 1986 - makes it a federal crime to intentionally access a computer for purposes such as

1) obtaining top-secret military info or personal financial or credit info
2) committing a fraud
3) altering or destroying federal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the USA Patriot Act of 2001?

A

Gives federal authorities much wider latitude in monitoring internet usage and expands the way such data is shared among different agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Federal Privacy Act of 1974?

A

takes the Freedom of Information Act of 1970 by requiring that individuals be able to correct federal information about themselves, by requiring that agency information not be used for alternate purposes without the individuals consent and by making the collecting agency responsible for the accuracy and sue of the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Two types of accounting related fraud are:

A

Fraudulent financial reporting (cooking the books)

Misappropriation of assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are 3 examples of computer crimes?

A

Hacking
Denial of Service -
Compromising Valuable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are useful protections against hacking?

A

encryption, ethical hackers testing systems, user education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are useful protections against viruses (denial of service)?

A

firewalls, antivirus software, antivirus control procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are other preventative measures against cybercrime and fraud?

A
  • enlist top-management support
  • increase employee awareness and education
  • assess security policies and protect passwords
  • implement controls
  • maintain physical security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some symptoms of employee fraud?

A
  • behavioral changes
  • lifestyle changes
  • anomalies
  • accounting irregularities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some ethical issues relating to computer usage?

A
  • honesty (expectation of honest work)
  • protecting computer systems (
  • protecting confidential information (unauthorized individuals viewing private info)
  • social responsibility (a superior telling an employee to ignore an error found)
  • acceptable use (using company/entity computer/software for uses other than intended)
  • rights of privacy (employers can monitor employee email)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Company policies should cover issues such as with respect to privacy:

A
  • who owns the computer and the data stored on it
  • how may the computer be used
  • what uses are unauthorized and unacceptable uses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is identity theft?

A

an act in which someone wrongfully obtains and uses another person’s personal data for fraud or deception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some ways criminals obtain personal info?

A

dumpster diving, phishing, smishing, key logging software, spam, shoulder surfing