Exam 4 - Cyberdeviance Flashcards

1
Q

What are the types of computer crimes?

A

DDoS
Hacktivism
Harassment/Threats of Violence
Identity Theft/Account Takeovers
Investment Crimes
Lottery/Sweepstakes crimes
Malware/Scamware crimes
Phishing
Ransomware attacks
Social Media Fraud
Tech Support fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What country ranks first in cybercrime?

A

America

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the four broad types of cybercrime?

A
  1. Computer as the target
  2. Computer as the instrument of crime
  3. Computer as incidental to other crimes
  4. Crime associated with the prevalence of computers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computers as the Target

A
  • Someone makes use of a computer to obtain info or damage operating programs
  • Ex. Altering, theft or sabotage of intellectual property, theft of marketing info, blackmail based on stolen info.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two forms of ‘computer as target’ offenses?

A
  • Technovandalism - Involved malicious intent but is often motivated by the offender’s need to show they are capable of doing it (ego)
  • Technotrespass - Unlawful exploration of computer files just to look at contents, not damage, steal or alter any information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Computers as Instruments of Crime

A
  • Instrumentality - The use of an instrument, legally in one’s possession, to commit a crime

Ex. Theft from bank accounts, credit card fraud, fraud stock market trans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Computers as Incidental to Other Crimes

A
  • Computer is not necessary to commit a crime but facilitates its commission
  • May accelerate the commission of certain offenses
  • Examples. Bookmaking, money laundering, altering records, unlawful bank trans.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Crimes Associated with the Prevalence of Computers

A
  • Proliferation of counterfeit equipment and software
    -Ex. copyright violations, duplication of programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of ‘Crimes Associated with the Prevalence of Computers’

A
  • Unauthorized computer use (Computer voyeurism, changing data, deleting data)
  • Malicious Computer Programs (Viruses, worms, trojans)
  • Harassment and Stalking (Threats of injury, sexual innuendo, hate messages)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Trap Doors?

A
  • Backdoor access points in software to allow programmer to make changes easily
  • If left in program after installation, intentionally or unintentionally, can lead to offender gaining ready access to system programs and files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are trojan horses?

A

Method for infiltrating computer systems with the intent to disable.
- Carries instructions that are disguised as authorized and useful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Viruses?

A
  • Computer programs with the ability to reproduce themselves
  • Alters a computer program by adding commands that will activate the virus
  • May alter or destroy data, render disk space or memory unstable
  • May infect computers through email or infected file download
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are worms?

A
  • Computer programs that exist independently of other programs and can replicate
  • Typically more powerful than a virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are logic bombs?

A
  • Instructs computer to execute a certain function under certain conditions, usually on a given date and time
  • Often planted on a system using a trojan horse.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the types of Cyberdeviance?

A
  • Hackers
  • Crackers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are hackers?

A
  • Attempt to gain access to unauthorized computer systems
  • Typically motivated by the challenge
17
Q

What are crackers?

A
  • Intend to damage, manipulate, or destroy the computer operations of others
  • Bent on demonstrating kinds of confusion and disorder they can create
18
Q

What are Roger’s four types of computer hackers/crackers?

A
  • Old school hackers
  • Script kiddies or cyberpunk
  • Professional criminals or crackers
  • Coders and virus writers
19
Q

What are old-school hackers?

A

Driven to know and crack the codes of computer systems & to explore their contents
- Not necessarily intending to steal anything or to damage the operation of the hacked computer
- Typically motivated by personal curiosity and the desire to learn more about the workings of computer systems

20
Q

What are script kiddies/cyberpunks?

A
  • Often consumed by hacking into computer systems with the intent to do harm
  • Interest in the computer supersedes anything else.
21
Q

What are professional criminals/crackers?

A
  • Derive their livelihood from their illicit activities on the Internet
  • May work independently or may be employed by organized criminal groups, governments, or corporations
22
Q

What are coders and virus writers?

A

Devise codes and viruses that are then used by hackers bent on destruction of computer systems, often around the world

23
Q

What are cyber deviant subcultures characterized by?

A
  • Reliance on technology
  • Secrecy and Fluidity
  • Common ethnical standards/beliefs
24
Q

What are the common ethical standards/beliefs among cyber deviant subcultures?

A
  1. All information should be free
  2. Mistrust authority and promote decentralization
  3. Hackers should be judged by their hacking, not by bogus criteria such as degrees, age, race, or position
  4. You can create art and beauty on a computer
  5. Computers can change life for the better
25
Q

How does Seduction of Crime theory explain cyberdeviance?

A
  • The greater the thrill of the experience, the more likely an individual is to engage in cyberdeviance
  • Cyberdeviance is a “sneaky thrill”
26
Q

How does Social Learning thoery explain cyberdeviance?

A
  • Sharing of information and technique takes place in cyber subcultures
  • Cyberdeivants typically value associations w/each other than those irl
  • Learn the “motives, drives, rationalization, and attitudes” necessary to engage in computer-related illicit activity
  • Also learn the techniques that may be used to commit various computer-related offenses
27
Q

How does Differential Reinforcement theory explain cyberdeviance?

A
  • When sufficiently socialized into the culture, acts of illicit computer ingenuity become widely known and admired
  • Individual is granted considerable recognition within cyber deviant subcultures
28
Q

How does rational choice theory explain cyberdeviance?

A
  • Cybercrime tends to be deliberate, rational process
  • Offender must acquire highly sophisticated computer expertise
  • Find target
  • Weigh rewards and possible recognition against costs of apprehension
29
Q

How do Techniques of Neutralization apply to cyberdeviance?

A
  • Those who engage in what they view to be innocuous cyber exploration may deny that injury has occurred or that there is real victim involved in their crimes
  • May argue that if computer technology can potentially benefit world at large, no person or corpo can have exclusive rights to it