Criminology Final Flashcards

1
Q

Critical criminologists

A

Researchers who view crime as a function of the capitalist mode of production and not the social conflict that might occur in any society regardless of its economic system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Critical criminology

A

The view that capitalism produces haves and have-nots, each engaging in a particular branch of criminality. The mode of production shapes social life. Because economic competiveness is the essence of capitalism, conflict increases and eventually destabilized social institutions and the individuals within them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Communist Manifesto

A

In this document, Marx focused his attention of the economic conditions perpetuated by the capitalist system. He stated that its development had turned workers into a dehumanized mass who lived an existence that was at the mercy of their capitalist employers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Productive forces

A

Technology, energy sources, and material resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Productive relations

A

the relationship that exist among the people producing goods and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Capitalist bourgeoisie

A

The owners of the means of production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Proletariat

A

A term used by Marx to refer to the working class members of society who produce goods and services but who do not own the means of production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lumpen proletariat

A

The fringe members at the bottom of society who produce nothing and live, parasitically, off the work of others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

dialect method

A

For every idea, or thesis, there exists an opposing argument, or antithesis. Because neither position can ever be truly accepted, the results is a merger of the two ideas, a synthesis. Marx adapted this analytic method for his study of class struggle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Thesis

A

In the philosophy of Hegel, an original idea or though.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

antithesis

A

an opposing argument

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

synthesis

A

a merger of two opposing ideas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

supranational criminology

A

The study of war crimes, crimes against humanity, and the supranational penal system in which such crimes are prosecuted and tried.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Surplus value

A

The Marxist view that the laboring classes produce wealth that fa exceeds their wages and goes to the capitalist class as profits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Marginalization

A

Displacement of workers, pushing them outside the economic and social mainstream.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dropout factories

A

High schools in which the completion rate is consistently 40 percent or less

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

globalization

A

The process of creating transnational markets, politics, and legal systems in an effort to form and sustain a global economy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

state-organized crime

A

Acts defined by law as criminal and committed by state officials, either elected or appointed, in pursuit of their jobs as government representatives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Instrumental theory

A

The view that criminal law and the criminal justice system are capitalist instruments for controlling the lower class.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Structural theory

A

The view that criminal law and the criminal justice system are means of defending and preserving the capitalist system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

demystify

A

To unmask the true purpose of law, justice, or other social institutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

left realism

A

A approach that views crime as a function of relative deprivation under capitalism and that favors pragmatic, community-based crime prevention and control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Preemptive deterrence

A

Efforts to prevent crime through community organization and youth involvement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

critical feminism

A

An area of scholarship whose focus is on the effects of gender inequality and the unequal power of men and women in a capitalist society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Patriarchy

A

A society in which men dominate public, social, economic, and political affairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Paternalistic families

A

Traditional family model in which fathers assume the role of breadwinners, while mothers tend to have menial jobs or remain at home to supervise domestic matters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Role exit behaviors

A

In order to escape from a stifling life in male dominated families, girls may try to break away by running away or even attempting suicide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

egalitarian families

A

Families in which spouses share similar positions of power at home and in the workplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

power-control theory

A

The view that gender differences in crime are a function of economic power (class position, one-earner versus two-earner families) and parental control (egalitarian families)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Peacemaking

A

An approach that considers punitive crime control strategies to be counterproductive and favors the use of humanistic conflict resolution to prevent and control crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Restorative justice

A

Using humanistic, nonpunitive strategies to right wrongs and restore social harmony

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

shame

A

the feeling we get when we don’t meet the standards we have set for ourselves or that significant others have set for us.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

reintegrative shaming

A

A method of correction that encourages offenders to confront their misdeeds, experience shame because of the harm they caused, and then be reincluded in society.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

sentencing circle

A

A peacemaking technique in which offenders, victims, and other community members are brought together in an effort formulate a sanction that addresses the needs of all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

developmental criminology

A

A view of criminal behavior that places emphasis on the changes people go through over the life course. It presents a criminal career as a dynamic process involving onset, continuity, persistence, acceleration, and eventual desistance from criminal behavior, controlled by individual level traits and conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Life course theories

A

Theoretical views studying changes in criminal offending patterns over a person’s entire life.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Latent trait theories

A

Theoretical views that criminal behavior is controlled by a master trait, present at birth or soon after, that remains stable and unchanging throughout a person’s lifetime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Trajectory theory

A

A view of criminal career formation that holds there are multiple paths to crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Population heterogeneity

A

The view that the propensity of an individual to participate in antisocial behavior is relatively stable trait, unchanging over their life course.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

State dependent

A

The propensity to commit crime profoundly and permanently disrupts normal socialization. Early rule breaking strengthens criminal motivation and increases the probability of future rule breaking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Problem behavior syndrome (PBS)

A

A cluster of antisocial behaviors that may include family dysfunction, substance abuse, smoking, precocious sexuality and early pregnancy, educational underachieving, suicide attempts, sensation seeking, and unemployment, as well as crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Integrated theories

A

Models of crime causation that weave social and individual variables into a complex explanatiory chain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Age-graded theory

A

A developmental theory that posits that traits and experiences matter to criminal disposition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Turning points

A

According to Laub and Sampson, the life events that alter the development of a criminal career.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Cumulative disadvantage

A

A condition in which repeated negative experiences in adolescence undermine life chances and reduce employability and social relations. People who increase their cumulative disadvantage risk continued offending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Social Capital

A

Positive relations with individuals and institutions that are life sustaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Social schemas

A

Cognitive frameworks that help people quickly process and sort through information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Criminogenic knowledge structure (CKS)

A

The view that negative life events are connected and produce a hostile view of people and relationships, preference for immediate rewards, and a cynical view of conventional norms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Propensity

A

An inclination or tendency to behave in a particular way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

latent trait

A

A stable feature, characteristic, property, or condition, present at birth or soon after, that makes some people crime prone over the life course

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

General Theory of Crime (GTC)

A

According to Gottfredson and Hirschi, a developmental theory that modifies social control theory by integrating concepts from biosocial, psychological, routine activities, and rational choice theories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Self-control

A

A strong moral sense that renders a person incapable of hurting others or violating social norms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Self-control theory

A

According to Gottfredson and Hirschi, the view that the cause of delinquent behavior is an impulsive personality. Kids who are impulsive may find that their bond to society is weak.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Authority conflict pathway

A

The path to a criminal career that begins with early stubborn behavior and defiance of parents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Covert pathway

A

A path to a criminal career that begins with minor underhanded behavior and progresses to fire starting and theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Overt pathway

A

Pathway to a criminal career that begins with minor aggression, leads to physical fighting, and eventually escalates to violent crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Adolescent-limited offender

A

Offender who follows the most common criminal trajectory, in which antisocial behavior peaks in adolescence and then diminishes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Life course persister

A

One of the small group of offenders whose criminal career continues well into adulthood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Instrumental violence

A

Violence used in an attempt to improve the financial or social position

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Expressive violence

A

Violence that is designed not for profit or gain but to vent rage, anger, or frustrations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Cycle of violence

A

A hypothesis that suggests that a childhood history of physical abuse predisposes survivors to becoming violent themselves in later years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Violentization process

A

According to Lonnie Athens, the process by which abused children are turned into aggressive adults. This process takes violent youths full circle from being the victims of aggression to being its initiators; they are now the same person they grew up despising, ready to begin the process with their own children.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

crusted over

A

Children who have been victims of r witnesses to violence ad do not let people inside, nor do they express their feelings. They exploit others and in turn and exploited by those older and stronger; as a result, they develop a sense of hopelessness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Subculture of violence

A

Norms and customs that, in contrast o society’s dominant values system, legitimize and expect the use of violence to resolve social conflicts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Disputatiousness

A

Behavior within culturally defined conflict situations in which an individual who has been offended by a negative outcome in a dispute seeks reparations through violent means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Gang rape

A

Forcible sex involving multiple attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Serial rape

A

Multiple rapes committed by one person over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Acquaintance rape

A

Forcible sex which offender and victim are acquainted with each other

69
Q

Date rape

A

Forcible sex during a courting relationship

70
Q

statutory rape

A

Sexual relations between an underage individual and an adult; though not coerced an underage partner is considered incapable of giving informed consent

71
Q

Marital rape

A

Forcible sex between people who are legally married to each other

72
Q

Marital exemption

A

The practice of prohibiting the prosecution of husbands for the rape of their wives.

73
Q

Consent

A

In prosecuting rape cases, it is essential to prove that the attack was forced and that the victim did not give voluntary consent to her attacker. In a sense, the burden of proof is on the Vitim to show that her character is beyond question and that she in no way encouraged, enticed, or misled the accused rapist. Proving victim dissent is not a requirement in any other violent crime.

74
Q

Aggravated rape

A

Rape involving multiple offenders, weapons, and victim injuries

75
Q

Shield law

A

Laws designed to protect rape victims by prohibiting the defense attorney from inquiring about their previous sexual relationships

76
Q

Murder

A

The unlawful killing of a human being (homicide) with malicious intent

77
Q

Infanticide

A

The murder of a newborn or very young baby

78
Q

fillicide

A

The murder of one’s own child

79
Q

eldercide

A

The murder of a senior citizen

80
Q

Mass murder

A

The killing of a large number of people in a single incident by an offender who typically does not seek concealment or escape

81
Q

Active shooter incident

A

A term used by law enforcement to describe a situation in which a mass shooting is in progress when police and law enforcement agents arrive at the scene.

82
Q

Child abuse

A

Any physical, emotional, or sexual trauma to a child for which no reasonable explanation, such as an accident, can be fund. Child abuse can also be a function of neglecting to give proper are and attention to a young child

83
Q

Neglect

A

Not providing a child with the care and shelter to which he or she is entitled

84
Q

Sexual abuse

A

Exploitation of a child through rape, incest, or molestation by a parent or other adult

85
Q

Relational aggression

A

Psychological and emotional abuse that involves the spreading of smears, rumors, and private information in order to harm a person’s partner

86
Q

Acquaintance robbery

A

Robber who focus their thefts on people they know

87
Q

Hate crime

A

Acts of violence or intimidation designed to terrorize or frighten people considered undesirable because of their race, religion, ethnic origin, or sexual orientation

88
Q

Thrill-seeking hate crimes

A

Acts by hatemongers who join forces to have fun by bashing minorities or destroying property; inflicting pain on others give them a sadistic thrill

89
Q

Reactive (defensive) hate crimes

A

Perpetrators believe they are taking a defensive stand against outsiders whom they believe threaten their community or way of life .

90
Q

Mission hate crimes

A

Violent crimes committed by distributed individuals who see it as their duty to rid the world of evil.

91
Q

Retaliatory hate crimes

A

A hate crime motivated by revenge for another hate crime, either real or imaginary, which may spark further retaliation.

92
Q

Workplace violence

A

Irate employees or former employees attack coworkers or sabotage machinery and production lines; now considered the third leading cause of occupational injury or death

93
Q

Sufferance

A

The aggrieved party does nothing to rectify a conflict situation; over time, the unresolved conflict may be compounded by other events that cause an eventual eruption.

94
Q

Stalking

A

A pattern of behavior directed at a specific person that includes repeated physical or visual proximity, unwanted communications, and/or threats sufficient to cause fear in a reasonable person

95
Q

Economic crime

A

An act in violation of the criminal law that is designed to bring financial gain to the offender

96
Q

Fence

A

A buyer and seller of stolen merchandise

97
Q

Skilled thieves

A

Thieves who typically work in the larger cities, such as London and Paris. This group includes pickpockets, forgers, and counterfeiters who operate freely

98
Q

Flash houses

A

Public meeting places in England, often taverns, that served as headquarters for gangs.

99
Q

Smugglers

A

Thieves who move freely in sparsely populated areas and transport goods, such as spirits, gems, gold, and spices, without bothering to pay tax or duty

100
Q

Poachers

A

Early English thieves who typically lived in the country and supplemented their diet and income with game that belonged to a landlord

101
Q

Occasional criminals

A

Offenders who do not define themselves y a criminal role or view themselves as committed career criminals

102
Q

Professional criminals

A

Offenders who make a significant portion of their income from crime

103
Q

Situational inducement

A

Short-time influence on a person’s behavior, such as financial problems or peer pressure, that increases risk taking

104
Q

Constructive possession

A

In the crime of larceny, willingly giving up temporary physical possession of property but retaining legal ownership

105
Q

Petit (petty) larceny

A

Theft of a small amount of money or property, punished as a misdemeanor

106
Q

Grand larceny

A

Theft of money or property of substantial value, punished as a felony

107
Q

Shoplifting

A

The taking of goods from retail stores

108
Q

Snitches

A

Amateur shoplifters who do not self-identify as thieves but who systematically steal merchandise for personal use

109
Q

Booster box

A

Device with a false bottom that can be opened and closed by a professional shoplifter, lined with metal or some other substance to prevent security tags from setting off alarms, placed over merchandise

110
Q

Booster box

A

Device with a false bottom that can be opened and closed by a professional shoplifter, lined with metal or some other substance to prevent security tags from setting off alarms, placed over merchandise

111
Q

Target removal strategies

A

Displaying dummy or disabled dummy or disabled goods as a means of preventing shoplifting.

112
Q

Target handling strategies

A

Making one’s home or business crime proof through the use of locks, bars, alarms, and other devices.

113
Q

Naive check forgers

A

Amateurs who cash bad checks because of some financial crisis but have little identifications with a criminal subculture

114
Q

Closure

A

A term used by Lement to describe a condition in which people from a middle-class background who have little identification with a criminal subculture cash bad checks because of a financial crisis that demands an immediate resolution

115
Q

Systematic forgers

A

Professionals who make a living by passing bad checks

116
Q

Carjacking

A

Theft of a car by force or threat of force

117
Q

False pretenses (fraud)

A

Misrepresenting a fact in a way that causes a deceived victim to give money or property to the offender.

118
Q

Mark

A

The target of a con man or woman

119
Q

Confidence (con) game

A

A swindle, usually involving a get-rich-quick scheme, often with illegal overtones, so that the victims will be afraid or embarrassed to call the police

120
Q

Pigeon drop

A

A con game in which a package or wallet containing money is found by a con man or woman, and the victims are bilked out of money they are asked to put up as collateral

121
Q

Embezzlement

A

A type of larceny that involves taking the possessions of anther that have been placed in the thief’s lawful possession for safekeeping, such as a bank teller misappropriating deposits or a stockbroker making off with a customer’s account

122
Q

Good burglar

A

Professional burglars use this title to characterize colleagues who have distinguished themselves as burglars. Characteristic of the good burglar include technical competence, maintenance of personal integrity, specialization in burglar, financial success, and the ability to avoid prison sentences

123
Q

Arson for profit

A

People looking to collect insurance money but who are afraid or unable to set the fire themselves, hire professional arsonists. These professionals have acquired the skills to set fires and make the cause seem accidental

124
Q

Arson fraud

A

A business owner burns his or her property, or hires someone to do it, to escape financial problems

125
Q

Public order crimes

A

Acts that are considered illegal because they threaten the general well-being of society and challenge its accepted moral principles. Prostitution, drug use, and the sale of pornography are considered public order crime.

126
Q

Victimless crime

A

Violations of the criminal law without any identifiable evidence of an individual victim who has suffered damage from the crime

127
Q

Social harm

A

A view that behaviors harmful to other people and society in general must be controlled. These acts are usually outlawed, but some acts that cause enormous amounts of social harm are perfectly legal, such as the consumption of tobacco and alcohol.

128
Q

Vigilantes

A

Individuals who go on moral crusades without any authorization from legal authorities. The assumption is that it is okay to take matters into your own hands, if the cause is right and the target is immortal.

129
Q

Moral crusaders

A

People who strive to stamp out behavior they find objectionable. Typically, moral crusaders are directed at public order crimes, such as drug abuse pornography.

130
Q

Moral entrepreneurs

A

Interest groups that attempt to control social life and the legal order in such a way as to promote their own personal set of moral values. People who use their influence to shape the legal process in ways they see fit.

131
Q

Paraphilias

A

Bizarre or abnormal sexual practices that may involve recurrent sexual urges focused on objects, humiliation or children.

132
Q

Pedophilia

A

A psychosexual disorder in which a adult has sexual fantasies about or engages in sexual acts with an underage minor children

133
Q

Prostitution

A

The granting of nonmarital sexual access for remuneration

134
Q

Brothel

A

A house of prostitution, typically run by a madam who sets prices and handles business arrangements

135
Q

Madam

A

Women who employs prostitutes, supervises their behavior, and receives a fee for her services.

136
Q

Call girls

A

Prostitutes who make dates via the phone and then service customers in hotel rooms or apartments. Call girls typically have a steady clientele who are repeat customers.

137
Q

Skeezers

A

Prostitutes who trade sex for drugs, usually crack.

138
Q

Pornography

A

Sexually explicit books, magazine, films, or other media intended to provide sexual titillation and excitement for paying customers.

139
Q

Obscenity

A

According to current legal theory, sexually explicit material hat lacks a serious purpose and appeals solely to the prurient interest of the viewer. While nudity per se is not usually considered obscene, open sexual behavior, masturbation, and exhibition of the genitals is banned in most communities.

140
Q

Temperance movement

A

An effort to prohibit the sale of liquor in the United States that resulted in the passage of the Eighteenth Amendment to the Constitution in 1919, which prohibited the sale of alcoholic beverages.

141
Q

Binge drinking

A

Having five or more drinks on the same occasion (that is, at the same time or within a couple of hours each other) on at least 1 day in the past 30 days.

142
Q

Gateway model

A

An explanation of drug abuse that posits that users begin with a more benign drug (alcohol or marijuana) and progress to more potent drugs.

143
Q

Cybercrime

A

The use of modern technology for criminals purpose

144
Q

Information technology (IT)

A

All forms of technology used to create, store, retrieve, and exchange data in all its various forms, including electronic, voice, and still image.

145
Q

Globalization

A

The process of creating transnational markets, politics, and legal systems in an effort to form and sustain a global economy

146
Q

Cyber theft

A

Use of computer networks for criminal profits, illegal copyright infringement, identity theft, and internet security is fraud are examples of cybertheft.

147
Q

Cyberdeviance

A

The sale and distribution of morally tainted material and product over the Net

148
Q

Cybervandalism

A

Malicious attacks aimed at disrupting, defacing, and destroying technology

149
Q

Cyberwar

A

Using cyberspace for acts of war, including spying and disrupting an enemy’s computer network

150
Q

Cyberterrorism

A

Internet attacks against an enemy nation’s technological infrastructure.

151
Q

ATM skimming

A

Using al electronic device on an ATM that copies information from a bank card’s magnetic strip whenever a customer uses the machine

152
Q

Rasomware

A

Malicious software, usually attached to an email, designed to block access to a computer system until a sum of money is paid.

153
Q

Warez

A

A term computer hackers and software pirates use to describe a game, media, or application that is made available for use on the internet in violation of its copyright protection

154
Q

Identity theft

A

Using the internet to steal someone’s identity and/or impersonate the victim in order to conduct illicit transactions such as committing fraud using the victims name and identity

155
Q

Phishing

A

Sometimes called carding or spoofing, phishing is a scam where the perpetrator send out emails appearing to come from legitimate web enterprises such as eBay, Amazon, and PayPal in an effort to get the recipient to reveal personal and financial information

156
Q

Spear-phishing

A

targeting specific victims, sending them emails that contain accurate information about their lives obtained from social networking sites, and asking them to open an email attachment where malware harvests details such as the victims’ usernames and passwords, bank account details, credit card numbers, and other personal information.

157
Q

Money mule

A

Someone who collects and transfers money or goods acquired illegally and then transfers them to a third party

158
Q

Etailing fraud

A

Illegally buying and/or selling merchandise on the internet

159
Q

Darknet

A

Computer network that can only be accessed using nonstandard communications protocols nd ports, with restricted access that can only be opened with specific software configurations

160
Q

ehooking

A

Using the internet to advertise sexual services and make contact with clients

161
Q

Malware

A

A malicious software program

162
Q

Computer worms

A

Programs that attack computer networks by self-replicating ad sending themselves to other users, generally via email, without the aid of the operator

163
Q

Trojan horse

A

A computer program that looks like a benign application but contains illicit codes that can damage the system operations. Though Trojan horses to don’t replicate themselves like viruses, they can be just as destructive

164
Q

Logic bomb

A

A program that is secretly attached to a computer system, monitors the network’s work output, and waits for a particular signal such as a date to appear. Also called a slag code, it is a type of delayed-action virus that may e set off when a program user makes certain input that sets it in motion. A logic bomb may cause a variety of problems ranging from displaying or printing a spurious message to deleting or corrupting data.

165
Q

Website deffacement

A

A type of cybervandalism that occurs when a computer hacker intrudes on another person’s website by inserting or substituting codes that expose visitors to the site to misleading or provocative information . Defacement can range from installing humorous graffiti to sabotaging or corrupting the sight.

166
Q

Cyberstalking

A

Use of internet, email, or other electronic communications devices to stalk another person. Some cyberstalkers pursue minors through online chat rooms; others harass their victims electronically.

167
Q

Distributed denial-of-service attack (DDoS)

A

A type of DoS attack where multiple compromised systems, which are often infected with a virus, are used o target a single system, causing a denial-of-service (DoS) attack

168
Q

Cyberspying

A

Illegally using the Internet to gather information that is considered private and confidential

169
Q

Cyberspionage

A

Efforts by intelligence agencies to penetrate computer networks of a enemy nation in order to steal important data