Chapter 1 Flashcards

1
Q

what are the three schemes

A

cater- 1
Anderson -2
Gordon and Ford-3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the four categories of caters scheme

A

computer as target
computer as instrument
computer as incidental to crime
crime associated with the prevalence of computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

computer as target

A

target the computer and includes denial of service attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

computer as instrument

A

these are crimes where the computer is the tool to gain a criminal objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

computer as incidental to crime

A

The computer is not the primary instrument of crime it just facilities the crime
example money laundering and vice crimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

crimes associated with the prevalence

A

these are crimes that arise in part because we have so many computers
examples-theft of computers, counterfeiting(reproduce) , and intellectual property crimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the four parts of Andersons

A

-traditional crimes
-transitional crime that change with the internet
-new crimes
-crimes that facilitate other crimes through the misuse of a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

traditional crimes

A

conducted primarily on-line
examples- tax fraud & money laundering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

transitional crimes

A

fundamentally changed with the internet
example payment card fraud and e-commerce theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

New Crimes

A

originated with the internet
examples computer hacking, malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

crimes that facilitate other crime through the misuse of computer

A

any computer crime that doesn’t fit into these three categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Gordon and Ford

A

Has two categoires: type 1 and type 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

type 1

A

crime is single discreet events from the pov of the victim and uses malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

type 2

A

doesn’t involve malware not a technology crime. involves repeated contacts from the pov of the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T/F Is it possible to calculate cost and problems of computer crimes

A

false = difficult and impossible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Four reasons it is difficult of calculate computer crime

A

-Wide scope and variety of crime
-they are global
-there are different method of calculating
-there are incentives to ether over report or under report crime

17
Q

Who under reports computer crime

A

the cooperate victims they don’t want you to know about them being victims

18
Q

who over reports computer crime

A

the law enforcement system because they get more money from tax payers

19
Q

T/F Computer crime victimization will increase for the foreseeable future

A

True

20
Q

What are the two reasons for the increased rate of computer crimes

A
  1. the opportunities for computer crime with new tech or advancements to existing
  2. the availability of information on how to commit these crimes is constantly spreading on-line
21
Q

computers can be instruments of two things

A

crime and war

22
Q

Stuxnet Purpose

A

specific purpose introduced by a thumb drive. it would search and search for a specific type of computer in Iran.

23
Q

stuxnet definition

A

malware (computer worm) designed to infiltrate and destroy nuclear capabilities of Iran.

24
Q

goal of stuxnet

A

that reproduces itself scores a computer network to speed up nuclear centuries and prevent the enrichment of uranium

25
Q

why is stuxnet important to the study of cyber terrorism and war

A

it changes the way of war and it’s a new weapon. It’s also a landmark of change.

26
Q

what are potential problems with stuxnet

A

other bad actors can use this type of software

27
Q

it student a good idea or a bad idea

A

personally I thinks its a good idea. I think that the value of a human life is way more value than other people using the weapon.

28
Q

define malware

A

refers to any sort of malicious software including computer viruses, spyware, computer worms and adware

29
Q

Cyber Crime, computer crime and digital crime

A

refer to forms of crime and deviance that involves computer technologies