Section 1.2 Flashcards
Spam prior to the internet cost stamps but now spam can be free after you purchase the device to send it. This makes cybercrime attractive because of what?
Lower costs
Spam by USPS would be able to reach a few thousand but with the internet you can have thousands of targets. This makes cybercrime attractive because of what?
Force Multiplier
It is really hard for law enforcement to figure out who you are and get arrested. This makes cybercrime attractive because of what?
Low risk of detection
Three ways that help the low risk of detection and makes cybercrime attractive?
Proxy
Lack of Reporting
Lack of Laws
If I connect my computer to the victim, the victim can see the IP address of who is attacking them or the service can see the IP address. True or False
True
If you use a proxy service can you see the IP address?
no
The proxy service can give out the IP address but if proxies are out of the country or you use multiple proxies it is harder to follow. True or False
True
Most cybercrime victims doesn’t even know they are a victim or say it is not a big deal and don’t report it to law enforcement. This is caused because of lack of what?
Reporting
Early 2000 virus that was transmitted by email with the subject line saying “___________”. You install the virus on your computer by accident and send it to everyone on your list. This was created by a 16 year old boy in the ________. It wasn’t illegal there and nothing can be done about it./
I love you
Philippines
Laws are lagging behind technology.
True
Four types of cybercrime 1. 2. 3. 4.
Cyber trespass
Cyber deception and theft
Cyber porn and obscenity
Cyber violence
Who says that cybercrime falls into one of these four categories Cyber trespass, cyber deception and theft, cyber porn and obscenity, and cyber violence?
David Wall in 2001
Breaking into someone’s computer system ,using WIFI you’re not legally allowed to use and gaining access to digital something that you are not supposed to have access to is called what?
Crossing Boundaries
If your neighbor has an unsecured wireless system and you get on are you crossing a boundary and trespassing?
Yes
It is easy to commit cyber trespass. True or False
True
Illegally acquiring resources phishing fraud piracy These are all examples of what?
Cyber deception and theft
Illegally acquiring resources could include what?
information
money
products
Getting information out of people by using fake information.
Phishing
Ebay auction
email
These are examples of what?
Fraud
Downloading music or movies that you didn’t obtain legally is known as what?
Piracy
What is highly dependent on local law?
Cyber porn and obscenity
No federal law against but some states have passed laws. Naked pictures without expressed permission. This is known as what?
Revenge Porn
What type of porn is illegal in the US and most other countries?
Bestiality
What amendment allows people to look at some porn?
1st amendment
Injurious, hurtful, or dangerous Bullying Stalking Harassment Terrorism These are all examples of what?
Cyber violence