Shared Flashcard Set

Details

Chapters 1-3
chapters 1-3
32
Criminal Justice
Undergraduate 4
09/12/2012

Additional Criminal Justice Flashcards

 


 

Cards

Term

 

List four primary ways identity theft can be accomplished.

 

Definition

 

a.     phishing

 

b.    Hacking or spyware

 

c.     Unauthorized access of data

 

d.    Discarded information

 

Term

Spyware is software that monitors activity on a computer. T/F

 

Definition
True
Term

1.    Cyber stalking only refers to threats sent by email T/F

 

Definition
False
Term

1.     What are the four criteria used to examine in reference to cyber stalking?

 

Definition

a.     harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property

 

Term

1.    All four must be present in order to consider this a serious threat T/F

 

Definition

a.    Credibility

 

b.    Frequency

 

c.     Specificity

 

d.    Intensity

 

Term

1.     List four types of computer related fraud.

 

Definition

a.     Investment Offers

 

b.    Auction Fraud

 

c.     Check/Money Order Fraud

 

d.    Data piracy

 

Term

1.     Gangs tend to be disorganized and not to use the internet as a tool T/F

 

Definition
False
Term

1.     The internet can be a tool for terrorists to communicate T/F

 

Definition
True
Term

1.     The internet is a good starting place for law enforcement to get background intelligence on a group T/F

 

Definition
True
Term

1.     An attack that prevents legitimate users from accessing a site, without the attacker actually accessing the site, is still a computer crime T/F

 

Definition
True
Term

1.    A packet is basically a unit of data T/F

 

Definition
True
Term

 

1.     How did the internet begin?

 

Definition

 

a.     research project called ARPANet (ARPA was the Advanced Research Projects Agency, part of the defense department). In 1969 the network consisted of just four nodes: the University of Utah, the University of California at Santa Barbara, the University of California at Los Angeles, and Stanford University. Twelve years later, in 1981, this network had grown to only 213 nodes.

 

Term

1.     One of the first viruses found “in the wild” was found where and for what operating system?

 

Definition

a.     the Apple 1, 2, and 3 viruses

 

Term

1.     What is the significance of ‘the 414s?

 

Definition

a.     breaking into the Sloan Kettering Cancer Center and the Los Alamos National Laboratories

 

Term

1.     What was the first widely recognized incident of cyber spying?

 

Definition

a.     In June of 2002, Russian authorities arrested a man they accused of being a cyber spy for the CIA. They accused him of hacking into systems of the Russian Domestic Security Service (FSB) and gathering secrets which he then passed on to the CIA.

 

Term

1.     What was operation ‘Sun Devil’?

 

Definition

a.     In 1990, the Secret Service launched ‘Operation Sun Devil’. While this operation involved local law enforcement along with 150 secret service agents, and resulted in raids in 15 states as well as the seizure of a great deal of computer equipment, it only culminated in three arrests.

 

Term

1.     Who was ‘data stream’?

 

Definition

a.     In 1994, a 16 year old boy in the United Kingdom who used the screen name ‘data stream’ broke into several sensitive systems including Griffith Air Force Base, NASA, and the Korean Atomic Research Institute.

 

Term

1.     What is ‘Innocent Images National Initiative’?

 

Definition

a.     Online child porn investigation

 

Term

1.    List at least three modern attack techniques

 

Definition

a.                Privilege escalation

 

b.                Malware (Trojan horse, virus, worm, logic bomb, root kits etc.)

 

c.                 Phishing

 

d.                Social Engineering

 

e.                 Session Hijacking

 

f.                  Password Cracking

 

g.                 Denial of Service

 

Term

1.     What are the two common types of privilege escalation?

 

Definition

a.       Horizontal and Vertical

 

Term

1.     What is horizontal privilege escalation?

 

Definition

a.     Horizontal privilege escalation is a scenario where an account is used to access resources reserved for a different account of the same level. For example one user attempts to access another user’s documents.

 

Term

1.     What is a Logic Bomb?

 

1.     What is a Worm?

 

 

Definition

a.     A virus, malware

 

Term

1.     What was the first proposal for Federal computer crime legislation in the United States that would specifically prohibit misuse of computers?

 

Definition

a.     The Ribicoff Bill

 

Term

1.     What law addressed breaking into computers used by the federal government, financial institutions, and computers involved in foreign commerce?

 

Definition
The Computer Fraud and Abuse Act of 1986
Term

1.     The Patriot Act further expanded the Computer Fraud and Abuse Act of 1984 changing the maximum prison term from five years to 10 years for the first offense. T/F

 

Definition
True
Term

1.     Who was the first person to be convicted under the Computer Fraud and Abuse Act?

 

Definition
Robert Tappan Morris
Term

1.     What law extended federal wiretap laws into the domain of the newer electronic communications medium?

 

Definition
The Electronic Communications Privacy Act of 1986
Term

1.     The Identity Theft Enforcement and Restitution Act further expanded the Computer Fraud and Abuse Act in what way?

 

Definition

a.     was allowing prosecution of computer fraud offenses for conduct not involving an interstate or foreign communication.

 

Term

1.     What was the first legislative attempt to curtail internet pornography?

 

Definition

a.     The Communications Decency Act of 1996

 

Term

What law expressly targeted theft of intellectual property?

 

Definition
SOPA
Term

1.     What law made it illegal to attempt to circumvent copy protection technologies?

 

Definition
Digital Millenium Copyright Act
Term

1.     What law required libraries and schools to filter content that children have access to.

 

Definition
Children's Internet Protection Act
Supporting users have an ad free experience!