IS4670 CHAPTER 2 TERMS & DEFINITIONS Flashcards

1
Q

A collection of software robots that create and send out spam extremely quickly.

A

Botnet -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The mental state of mind of a defendant in committing a crime.

A

Criminal intent -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A part of U.S. Immigration and Customs Enforcement (ICE) that identifies and apprehends Internet child pornographers.

A

Cyber Crimes Center (C3) -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An individual who uses a computer or network technology to plan or perpetrate a violation of the law.

A

Cybercriminal -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A crime that involves using the Internet, e-mail, or other electronic communications devices to repeatedly harass or threaten another person.

A

Cyberstalking -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attacker or a group of attackers that use a target country’s computers and information, usually through the Internet, to cause physical harm, severely disrupt the country’s infrastructure, or create panic.

A

Cyberterrorist -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The use of computers and the Internet to conduct warfare in cyberspace.

A

Cyberwarfare -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An attack in which an attacker deprives people of the services they are entitled to access or provide.

A

Denial of service (DoS)/Distributed denial of service (DDoS) attack -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An attempt to gain money or something else of value by threatening, coercing, or intimidating a victim.

A

Extortion -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A crime that involves intentional deception for personal gain or to cause other damage to an individual or a company.

A

Fraud -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Illegal intrusion into a computer system without the permission of the computer owner or user.

A

Hacking -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A crime in which someone wrong- fully obtains and uses another person’s personal data in some way that involves fraud or deception. Criminals typically commit identity theft for economic gain.

A

Identity theft -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A crime that involves stealing trade secrets, material that is copyrighted, or other information to which an individual or a company has a right.

A

Intellectual property theft -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malicious software that is designed to infiltrate a computer system without the user’s consent. This includes computer viruses, worms, Trojan horses, spyware, some types of adware, and other malicious and unwanted software.

A

Malware -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The ability to commit a crime.

A

Means -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A reason a suspect commits a crime.

A

Motive -

17
Q

The chance to commit a crime.

A

Opportunity -

18
Q

A crime that involves using e-mail or Web sites to get confidential information by deceptive means.

A

Phishing -

19
Q

Theft of material that is copyrighted through the illegal copying of genuine programs or counterfeiting of products that are intended to pass as originals.

A

Piracy -

20
Q

A rather unsophisticated hacker who uses a point-and-click tool rather than program software.

A

Script kiddy -

21
Q

Unsolicited or undesired electronic messages.

A

Spam -

22
Q

A plan, method, technology, or other sensitive information that is owned by an individual or a company. Theft of these secrets damages a busi- ness’s competitive edge.

A

Trade secret -