Section 1.2 Flashcards

1
Q

Spam prior to the internet cost stamps but now spam can be free after you purchase the device to send it. This makes cybercrime attractive because of what?

A

Lower costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Spam by USPS would be able to reach a few thousand but with the internet you can have thousands of targets. This makes cybercrime attractive because of what?

A

Force Multiplier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is really hard for law enforcement to figure out who you are and get arrested. This makes cybercrime attractive because of what?

A

Low risk of detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three ways that help the low risk of detection and makes cybercrime attractive?

A

Proxy
Lack of Reporting
Lack of Laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If I connect my computer to the victim, the victim can see the IP address of who is attacking them or the service can see the IP address. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If you use a proxy service can you see the IP address?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The proxy service can give out the IP address but if proxies are out of the country or you use multiple proxies it is harder to follow. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Most cybercrime victims doesn’t even know they are a victim or say it is not a big deal and don’t report it to law enforcement. This is caused because of lack of what?

A

Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Early 2000 virus that was transmitted by email with the subject line saying “___________”. You install the virus on your computer by accident and send it to everyone on your list. This was created by a 16 year old boy in the ________. It wasn’t illegal there and nothing can be done about it./

A

I love you

Philippines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Laws are lagging behind technology.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Four types of cybercrime 
1.
2.
3.
4.
A

Cyber trespass
Cyber deception and theft
Cyber porn and obscenity
Cyber violence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who says that cybercrime falls into one of these four categories Cyber trespass, cyber deception and theft, cyber porn and obscenity, and cyber violence?

A

David Wall in 2001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Breaking into someone’s computer system ,using WIFI you’re not legally allowed to use and gaining access to digital something that you are not supposed to have access to is called what?

A

Crossing Boundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If your neighbor has an unsecured wireless system and you get on are you crossing a boundary and trespassing?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is easy to commit cyber trespass. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Illegally acquiring resources 
phishing 
fraud 
piracy 
These are all examples of what?
A

Cyber deception and theft

17
Q

Illegally acquiring resources could include what?

A

information
money
products

18
Q

Getting information out of people by using fake information.

A

Phishing

19
Q

Ebay auction
email
These are examples of what?

A

Fraud

20
Q

Downloading music or movies that you didn’t obtain legally is known as what?

A

Piracy

21
Q

What is highly dependent on local law?

A

Cyber porn and obscenity

22
Q

No federal law against but some states have passed laws. Naked pictures without expressed permission. This is known as what?

A

Revenge Porn

23
Q

What type of porn is illegal in the US and most other countries?

A

Bestiality

24
Q

What amendment allows people to look at some porn?

A

1st amendment

25
Q
Injurious, hurtful, or dangerous
Bullying 
Stalking 
Harassment 
Terrorism 
These are all examples of what?
A

Cyber violence