Chapter 1 Flashcards

1
Q

what are the three schemes

A

cater- 1
Anderson -2
Gordon and Ford-3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the four categories of caters scheme

A

computer as target
computer as instrument
computer as incidental to crime
crime associated with the prevalence of computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

computer as target

A

target the computer and includes denial of service attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

computer as instrument

A

these are crimes where the computer is the tool to gain a criminal objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

computer as incidental to crime

A

The computer is not the primary instrument of crime it just facilities the crime
example money laundering and vice crimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

crimes associated with the prevalence

A

these are crimes that arise in part because we have so many computers
examples-theft of computers, counterfeiting(reproduce) , and intellectual property crimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the four parts of Andersons

A

-traditional crimes
-transitional crime that change with the internet
-new crimes
-crimes that facilitate other crimes through the misuse of a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

traditional crimes

A

conducted primarily on-line
examples- tax fraud & money laundering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

transitional crimes

A

fundamentally changed with the internet
example payment card fraud and e-commerce theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

New Crimes

A

originated with the internet
examples computer hacking, malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

crimes that facilitate other crime through the misuse of computer

A

any computer crime that doesn’t fit into these three categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Gordon and Ford

A

Has two categoires: type 1 and type 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

type 1

A

crime is single discreet events from the pov of the victim and uses malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

type 2

A

doesn’t involve malware not a technology crime. involves repeated contacts from the pov of the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T/F Is it possible to calculate cost and problems of computer crimes

A

false = difficult and impossible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Four reasons it is difficult of calculate computer crime

A

-Wide scope and variety of crime
-they are global
-there are different method of calculating
-there are incentives to ether over report or under report crime

17
Q

Who under reports computer crime

A

the cooperate victims they don’t want you to know about them being victims

18
Q

who over reports computer crime

A

the law enforcement system because they get more money from tax payers

19
Q

T/F Computer crime victimization will increase for the foreseeable future

20
Q

What are the two reasons for the increased rate of computer crimes

A
  1. the opportunities for computer crime with new tech or advancements to existing
  2. the availability of information on how to commit these crimes is constantly spreading on-line
21
Q

computers can be instruments of two things

A

crime and war

22
Q

Stuxnet Purpose

A

specific purpose introduced by a thumb drive. it would search and search for a specific type of computer in Iran.

23
Q

stuxnet definition

A

malware (computer worm) designed to infiltrate and destroy nuclear capabilities of Iran.

24
Q

goal of stuxnet

A

that reproduces itself scores a computer network to speed up nuclear centuries and prevent the enrichment of uranium

25
why is stuxnet important to the study of cyber terrorism and war
it changes the way of war and it's a new weapon. It's also a landmark of change.
26
what are potential problems with stuxnet
other bad actors can use this type of software
27
it student a good idea or a bad idea
personally I thinks its a good idea. I think that the value of a human life is way more value than other people using the weapon.
28
define malware
refers to any sort of malicious software including computer viruses, spyware, computer worms and adware
29
Cyber Crime, computer crime and digital crime
refer to forms of crime and deviance that involves computer technologies