Term
List four primary ways identity theft can be accomplished.
|
|
Definition
a. phishing
b. Hacking or spyware
c. Unauthorized access of data
d. Discarded information
|
|
|
Term
Spyware is software that monitors activity on a computer. T/F
|
|
Definition
|
|
Term
1. Cyber stalking only refers to threats sent by email T/F
|
|
Definition
|
|
Term
1. What are the four criteria used to examine in reference to cyber stalking?
|
|
Definition
a. harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property
|
|
|
Term
1. All four must be present in order to consider this a serious threat T/F
|
|
Definition
a. Credibility
b. Frequency
c. Specificity
d. Intensity
|
|
|
Term
1. List four types of computer related fraud.
|
|
Definition
a. Investment Offers
b. Auction Fraud
c. Check/Money Order Fraud
d. Data piracy
|
|
|
Term
1. Gangs tend to be disorganized and not to use the internet as a tool T/F
|
|
Definition
|
|
Term
1. The internet can be a tool for terrorists to communicate T/F
|
|
Definition
|
|
Term
1. The internet is a good starting place for law enforcement to get background intelligence on a group T/F
|
|
Definition
|
|
Term
1. An attack that prevents legitimate users from accessing a site, without the attacker actually accessing the site, is still a computer crime T/F
|
|
Definition
|
|
Term
1. A packet is basically a unit of data T/F
|
|
Definition
|
|
Term
1. How did the internet begin?
|
|
Definition
a. research project called ARPANet (ARPA was the Advanced Research Projects Agency, part of the defense department). In 1969 the network consisted of just four nodes: the University of Utah, the University of California at Santa Barbara, the University of California at Los Angeles, and Stanford University. Twelve years later, in 1981, this network had grown to only 213 nodes.
|
|
|
Term
1. One of the first viruses found “in the wild” was found where and for what operating system?
|
|
Definition
a. the Apple 1, 2, and 3 viruses
|
|
|
Term
1. What is the significance of ‘the 414s?
|
|
Definition
a. breaking into the Sloan Kettering Cancer Center and the Los Alamos National Laboratories
|
|
|
Term
1. What was the first widely recognized incident of cyber spying?
|
|
Definition
a. In June of 2002, Russian authorities arrested a man they accused of being a cyber spy for the CIA. They accused him of hacking into systems of the Russian Domestic Security Service (FSB) and gathering secrets which he then passed on to the CIA.
|
|
|
Term
1. What was operation ‘Sun Devil’?
|
|
Definition
a. In 1990, the Secret Service launched ‘Operation Sun Devil’. While this operation involved local law enforcement along with 150 secret service agents, and resulted in raids in 15 states as well as the seizure of a great deal of computer equipment, it only culminated in three arrests.
|
|
|
Term
1. Who was ‘data stream’?
|
|
Definition
a. In 1994, a 16 year old boy in the United Kingdom who used the screen name ‘data stream’ broke into several sensitive systems including Griffith Air Force Base, NASA, and the Korean Atomic Research Institute.
|
|
|
Term
1. What is ‘Innocent Images National Initiative’?
|
|
Definition
a. Online child porn investigation
|
|
|
Term
1. List at least three modern attack techniques
|
|
Definition
a. Privilege escalation
b. Malware (Trojan horse, virus, worm, logic bomb, root kits etc.)
c. Phishing
d. Social Engineering
e. Session Hijacking
f. Password Cracking
g. Denial of Service
|
|
|
Term
1. What are the two common types of privilege escalation?
|
|
Definition
a. Horizontal and Vertical
|
|
|
Term
1. What is horizontal privilege escalation?
|
|
Definition
a. Horizontal privilege escalation is a scenario where an account is used to access resources reserved for a different account of the same level. For example one user attempts to access another user’s documents.
|
|
|
Term
1. What is a Logic Bomb?
1. What is a Worm?
|
|
Definition
|
|
Term
1. What was the first proposal for Federal computer crime legislation in the United States that would specifically prohibit misuse of computers?
|
|
Definition
|
|
Term
1. What law addressed breaking into computers used by the federal government, financial institutions, and computers involved in foreign commerce?
|
|
Definition
The Computer Fraud and Abuse Act of 1986 |
|
|
Term
1. The Patriot Act further expanded the Computer Fraud and Abuse Act of 1984 changing the maximum prison term from five years to 10 years for the first offense. T/F
|
|
Definition
|
|
Term
1. Who was the first person to be convicted under the Computer Fraud and Abuse Act?
|
|
Definition
|
|
Term
1. What law extended federal wiretap laws into the domain of the newer electronic communications medium?
|
|
Definition
The Electronic Communications Privacy Act of 1986 |
|
|
Term
1. The Identity Theft Enforcement and Restitution Act further expanded the Computer Fraud and Abuse Act in what way?
|
|
Definition
a. was allowing prosecution of computer fraud offenses for conduct not involving an interstate or foreign communication.
|
|
|
Term
1. What was the first legislative attempt to curtail internet pornography?
|
|
Definition
a. The Communications Decency Act of 1996
|
|
|
Term
What law expressly targeted theft of intellectual property?
|
|
Definition
|
|
Term
1. What law made it illegal to attempt to circumvent copy protection technologies?
|
|
Definition
Digital Millenium Copyright Act |
|
|
Term
1. What law required libraries and schools to filter content that children have access to.
|
|
Definition
Children's Internet Protection Act |
|
|