Deck 1: Introduction and Overview of Computer Forensics and Cybercrime

ملء الشاشة (f)
exit full mode
سؤال
Traditionally, trial and appellate courts evaluated the constitutionality of computer crime statutes, searches, and investigations through the lens of the ________.

A) First and Fourth Amendments
B) First and Second Amendments
C) Second and Third Amendments
D) Third and Fourth Amendments
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is NOT a problem in the investigation of cybercrime?

A) perceived insignificance of cybercrime
B) prosecutorial reluctance to pursue cyber criminals
C) untrained investigators
D) a widespread perception of cybercrime as worse than "traditional" crime
سؤال
________ has traditionally encompassed abuses and misuses of computer systems or computers connected to the Internet, resulting in direct and concomitant losses.

A) Digital crime
B) Computer-related crime
C) Cybercrime
D) Computer crime
سؤال
Which of the following is NOT a payment mechanism that poses a problem for law enforcement?

A) prepaid cards
B) banker's drafts
C) mobile payments
D) electronic purses
سؤال
Which of the following is true of the Digital Revolution?

A) It has prompted private citizens to embrace sophisticated measures of cyberprotection.
B) It has eliminated vulnerabilities of government institutions and personal residences.
C) It has resulted in decreased interconnectivity.
D) It has created a new forum for both terrorist activity and criminal behavior.
سؤال
Expenditures on which area represent a nonrecurring expense for a computer crime unit?

A) staffing
B) training
C) acquiring and updating equipment
D) establishing a computer laboratory
سؤال
What did the Fifth Circuit Court of Appeals rule in U.S.v.Finley?

A) The post-arrest search of a suspect's cell phone was unconstitutional.
B) The post-arrest search of a suspect's cell phone was constitutional.
C) The pre-arrest search of a suspect's cell phone was unconstitutional.
D) The pre-arrest search of a suspect's cell phone was constitutional.
سؤال
The Electronic Frontier Foundation (EFF) was created by _______.

A) John Edward Robinson and William Gibson
B) John Barlow and John Gilmore
C) John Barlow and William Gibson
D) John Gilmore and John Edward Robinson
سؤال
Which of the following is a valid reason why a corporation might welcome federal assistance to help catch a cyber criminal?

A) Government investigations of corporate cybercrime can boost consumer/client confidence.
B) Criminals access different services to disguise their location.
C) The U.S. judicial system lets corporations hide the results of law enforcement investigations.
D) Government agencies have the advantage of being able to ignore the chain of custody.
سؤال
Corporations and private entities that offer discounts on software or training to law enforcement agencies are called ________.

A) nerds or geeks
B) forensic predators
C) friendly vendors
D) electronic purses
سؤال
Which of the following has been characterized as "a social networking site on steroids"?

A) Second Life
B) Love Bug
C) CERT
D) Electronic Frontier Foundation
سؤال
All the following are categories into which computer crimes are traditionally divided EXCEPT ________.

A) computer as an instrument
B) computer as a target
C) computer as an incidental
D) computer as a weapon
سؤال
Which is one of the earliest computer crimes to have been committed?

A) software piracy
B) DDoS attack
C) phishing
D) hacking
سؤال
One of the earliest examples of computer crime is ________, which consists of an activity in which telecommunications systems are manipulated and ultimately compromised.

A) phreaking
B) spamming
C) hacking
D) cracking
سؤال
Which of the following is NOT a reason why many businesses and corporations underreport computer crimes?

A) consumers don't care about confidentiality
B) exposure to financial losses
C) data breach liabilities
D) damage to brand
سؤال
Which of the following involves payments that rely on a bank account and a web-based transfer of funds to or from an established financial account?

A) closed system cards
B) digital precious metals
C) Internet payment services
D) stored value cards
سؤال
Which of the following is an example of computer-initiated criminal activity?

A) spreading viruses
B) stealing home addresses
C) wire transfers
D) spamming
سؤال
Which of the following, according to a study conducted by the Department of Justice, were perceived as the number one target for computer crime?

A) financial institutions
B) individuals
C) businesses
D) educational institutions
سؤال
Which of the following allows perpetrators to commit multinational cybercrime with little fear of judicial sanctions?

A) the presence of traditional jurisdictional demarcations
B) the lack of physical boundaries
C) an extensive array of equipment or tools
D) the widespread acceptance of world passports
سؤال
________ includes any criminal activity which involves the unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data.

A) Cybercrime
B) Computer related crime
C) Computer crime
D) Digital crime
سؤال
Law enforcement has been threatened and weakened by the advent of the Internet and has not been able to benefit from it.
سؤال
The quality of information found on the Internet is often questionable.
سؤال
Which of the following e-payment methods stores funds on an integrated circuit chip in the card?

A) mobile payment
B) prepaid card
C) stored value card
D) Internet payment
سؤال
PayPal is an example of a(n) ________.

A) digital precious metal
B) prepaid card
C) stored value card
D) Internet payment service
سؤال
The Supreme Court has displayed a keen interest in deciding matters of law in the newly emerging sphere of cyberspace.
سؤال
Which of the following characteristics of new payment methods has facilitated money laundering and terrorist financing?

A) anonymity in transactions
B) increased competition
C) lower cost
D) lower interest rates
سؤال
Which payment method is typically associated with a card payment network such as Visa or MasterCard?

A) digital precious metals
B) mobile payment
C) electronic purse
D) prepaid card
سؤال
Increasing dependence on cyber information is one of the disadvantages of the Internet.
سؤال
The Information or Digital Revolution has exacerbated the vulnerabilities of government institutions and personal residences alike.
سؤال
Cyberspace is the indefinite place where individuals transact and communicate.
سؤال
The lack of physical boundaries and the removal of traditional jurisdictional demarcations allow perpetrators to commit multinational crime with little fear of judicial sanctions.
سؤال
Spamming cannot be considered a computer crime.
سؤال
Phreaking is an activity in which telecommunications systems are manipulated and ultimately compromised.
سؤال
Closed system cards and open system cards are two primary types of ________.

A) stored value cards
B) prepaid cards
C) digital precious metals
D) mobile payments
سؤال
Much computer-related crime involves specialist users.
سؤال
Cybercrime has been defined as any criminal act in which a computer is involved, even peripherally.
سؤال
Expenditures on a computer laboratory represent a recurring expense for an agency's budget.
سؤال
Electronic purses come in two primary types: limited or closed, and multipurpose or open.
سؤال
Investigators and administrators have displayed a zealous commitment to pursuing computer criminals.
سؤال
Corporations may underreport cybercrimes because of concerns about data breach liabilities, damage to brand, regulatory issues, and loss of consumer confidence.
سؤال
Stealing home addresses, maps, or family information is classified as ________ criminal activity.
سؤال
Evaluate some of the innovative payment mechanisms that can be targeted by cyber criminals.
سؤال
________, an activity in which telecommunications systems are manipulated and ultimately compromised, was the precursor to today's hacking.
سؤال
The introduction of the ________ has created unparalleled opportunities for commerce, research, education, entertainment, and public discourse.
سؤال
________ have historically been divided into three categories: computer as a target, computer as an instrument, and computer as an incidental.
سؤال
________ includes any criminal activity that involves the unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data.
سؤال
The Supreme Court has refused to determine appropriate levels of ________ protections of individuals and computer equipment.
سؤال
The most disconcerting of all computer crime involves the sexual exploitation of ________.
سؤال
What is cyberspace? Discuss various terms that pertain to criminal behavior involving computers.
سؤال
Unlike magnetic strips, which store only account information, a ________ stores funds on an integrated circuit chip.
سؤال
Discuss how the Internet has revolutionized law enforcement in society.What are the advantages and disadvantages of the Internet?
سؤال
The lack of ________ and the removal of traditional jurisdictional demarcations allow perpetrators to commit multinational crime with little fear.
سؤال
In addition to costs associated with training, administrators must consider three additional areas in support of computer crime investigations: ________.
سؤال
The Internet has monumentally increased the ________ of the virtual world, outpaced only by the exponential growth in the number of users.
سؤال
Barlow and Gilmore created the ________ to demonstrate that the Secret Service had conducted itself in an arbitrary, oppressive, and unconstitutional manner.
سؤال
The rationale for ________ involves the avoidance of currency fluctuation and foreign exchange.
سؤال
One of the first examples of the international havoc that malware could wreak involved the ________ virus.
سؤال
________ purpose cards may be used only for a finite number of purposes, and are issued by a particular merchant, telecommunications provider, or transit company.
سؤال
Discuss whether the law enforcement community has been able to handle computer crimes effectively in society.Briefly describe some of the problems faced by the police in the enforcement and prosecution of computer crimes.
سؤال
Assess the problem of lack of resources for the law enforcement community.How, in your opinion, should they respond to this problem?
سؤال
Match between columns
Open system cards
They are used only for a finite number of purposes, and are issued by a particular merchant, telecommunications provider, or transit company.
Open system cards
Their value is stored electronically on the device via an integrated circuit chip.
Open system cards
They involve payments that rely on a bank account and use the Internet as a means of transferring funds to or from an established financial account.
Open system cards
They are attached to an account and they provide access to monetary funds that are paid in advance by the cardholder.
Open system cards
They are used for a wide range of purposes, may cross geographic boundaries, and may be used by any user.
Internet payment services
They are used only for a finite number of purposes, and are issued by a particular merchant, telecommunications provider, or transit company.
Internet payment services
Their value is stored electronically on the device via an integrated circuit chip.
Internet payment services
They involve payments that rely on a bank account and use the Internet as a means of transferring funds to or from an established financial account.
Internet payment services
They are attached to an account and they provide access to monetary funds that are paid in advance by the cardholder.
Internet payment services
They are used for a wide range of purposes, may cross geographic boundaries, and may be used by any user.
Prepaid cards
They are used only for a finite number of purposes, and are issued by a particular merchant, telecommunications provider, or transit company.
Prepaid cards
Their value is stored electronically on the device via an integrated circuit chip.
Prepaid cards
They involve payments that rely on a bank account and use the Internet as a means of transferring funds to or from an established financial account.
Prepaid cards
They are attached to an account and they provide access to monetary funds that are paid in advance by the cardholder.
Prepaid cards
They are used for a wide range of purposes, may cross geographic boundaries, and may be used by any user.
Limited purpose cards
They are used only for a finite number of purposes, and are issued by a particular merchant, telecommunications provider, or transit company.
Limited purpose cards
Their value is stored electronically on the device via an integrated circuit chip.
Limited purpose cards
They involve payments that rely on a bank account and use the Internet as a means of transferring funds to or from an established financial account.
Limited purpose cards
They are attached to an account and they provide access to monetary funds that are paid in advance by the cardholder.
Limited purpose cards
They are used for a wide range of purposes, may cross geographic boundaries, and may be used by any user.
Storedvalue cards
They are used only for a finite number of purposes, and are issued by a particular merchant, telecommunications provider, or transit company.
Storedvalue cards
Their value is stored electronically on the device via an integrated circuit chip.
Storedvalue cards
They involve payments that rely on a bank account and use the Internet as a means of transferring funds to or from an established financial account.
Storedvalue cards
They are attached to an account and they provide access to monetary funds that are paid in advance by the cardholder.
Storedvalue cards
They are used for a wide range of purposes, may cross geographic boundaries, and may be used by any user.
سؤال
Match between columns
Phreaking
A generic term that denotes any criminal act, both Internet and non-Internet activity, which has been facilitated by computer use, and includes theft of components, counterfeiting, digital piracy or copyright infringement, hacking, and child pornography.
Phreaking
It encompasses abuses and misuses of computer systems or computers connected to the Internet that result in direct and/or concomitant losses.
Phreaking
It includes any criminal activity that involves the unauthorized access,dissemination, manipulation, destruction, or corruption of electronically stored data.
Phreaking
It is a criminal activity in which telecommunications systems are manipulated and ultimately compromised.
Phreaking
It is defined as any criminal act in which a computer is involved, even peripherally.
Computer-related crime
A generic term that denotes any criminal act, both Internet and non-Internet activity, which has been facilitated by computer use, and includes theft of components, counterfeiting, digital piracy or copyright infringement, hacking, and child pornography.
Computer-related crime
It encompasses abuses and misuses of computer systems or computers connected to the Internet that result in direct and/or concomitant losses.
Computer-related crime
It includes any criminal activity that involves the unauthorized access,dissemination, manipulation, destruction, or corruption of electronically stored data.
Computer-related crime
It is a criminal activity in which telecommunications systems are manipulated and ultimately compromised.
Computer-related crime
It is defined as any criminal act in which a computer is involved, even peripherally.
Cyber crime
A generic term that denotes any criminal act, both Internet and non-Internet activity, which has been facilitated by computer use, and includes theft of components, counterfeiting, digital piracy or copyright infringement, hacking, and child pornography.
Cyber crime
It encompasses abuses and misuses of computer systems or computers connected to the Internet that result in direct and/or concomitant losses.
Cyber crime
It includes any criminal activity that involves the unauthorized access,dissemination, manipulation, destruction, or corruption of electronically stored data.
Cyber crime
It is a criminal activity in which telecommunications systems are manipulated and ultimately compromised.
Cyber crime
It is defined as any criminal act in which a computer is involved, even peripherally.
Digital crime
A generic term that denotes any criminal act, both Internet and non-Internet activity, which has been facilitated by computer use, and includes theft of components, counterfeiting, digital piracy or copyright infringement, hacking, and child pornography.
Digital crime
It encompasses abuses and misuses of computer systems or computers connected to the Internet that result in direct and/or concomitant losses.
Digital crime
It includes any criminal activity that involves the unauthorized access,dissemination, manipulation, destruction, or corruption of electronically stored data.
Digital crime
It is a criminal activity in which telecommunications systems are manipulated and ultimately compromised.
Digital crime
It is defined as any criminal act in which a computer is involved, even peripherally.
Computer crime
A generic term that denotes any criminal act, both Internet and non-Internet activity, which has been facilitated by computer use, and includes theft of components, counterfeiting, digital piracy or copyright infringement, hacking, and child pornography.
Computer crime
It encompasses abuses and misuses of computer systems or computers connected to the Internet that result in direct and/or concomitant losses.
Computer crime
It includes any criminal activity that involves the unauthorized access,dissemination, manipulation, destruction, or corruption of electronically stored data.
Computer crime
It is a criminal activity in which telecommunications systems are manipulated and ultimately compromised.
Computer crime
It is defined as any criminal act in which a computer is involved, even peripherally.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/62
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Introduction and Overview of Computer Forensics and Cybercrime
1
Traditionally, trial and appellate courts evaluated the constitutionality of computer crime statutes, searches, and investigations through the lens of the ________.

A) First and Fourth Amendments
B) First and Second Amendments
C) Second and Third Amendments
D) Third and Fourth Amendments
A
2
Which of the following is NOT a problem in the investigation of cybercrime?

A) perceived insignificance of cybercrime
B) prosecutorial reluctance to pursue cyber criminals
C) untrained investigators
D) a widespread perception of cybercrime as worse than "traditional" crime
D
3
________ has traditionally encompassed abuses and misuses of computer systems or computers connected to the Internet, resulting in direct and concomitant losses.

A) Digital crime
B) Computer-related crime
C) Cybercrime
D) Computer crime
C
4
Which of the following is NOT a payment mechanism that poses a problem for law enforcement?

A) prepaid cards
B) banker's drafts
C) mobile payments
D) electronic purses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is true of the Digital Revolution?

A) It has prompted private citizens to embrace sophisticated measures of cyberprotection.
B) It has eliminated vulnerabilities of government institutions and personal residences.
C) It has resulted in decreased interconnectivity.
D) It has created a new forum for both terrorist activity and criminal behavior.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
6
Expenditures on which area represent a nonrecurring expense for a computer crime unit?

A) staffing
B) training
C) acquiring and updating equipment
D) establishing a computer laboratory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
7
What did the Fifth Circuit Court of Appeals rule in U.S.v.Finley?

A) The post-arrest search of a suspect's cell phone was unconstitutional.
B) The post-arrest search of a suspect's cell phone was constitutional.
C) The pre-arrest search of a suspect's cell phone was unconstitutional.
D) The pre-arrest search of a suspect's cell phone was constitutional.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
8
The Electronic Frontier Foundation (EFF) was created by _______.

A) John Edward Robinson and William Gibson
B) John Barlow and John Gilmore
C) John Barlow and William Gibson
D) John Gilmore and John Edward Robinson
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is a valid reason why a corporation might welcome federal assistance to help catch a cyber criminal?

A) Government investigations of corporate cybercrime can boost consumer/client confidence.
B) Criminals access different services to disguise their location.
C) The U.S. judicial system lets corporations hide the results of law enforcement investigations.
D) Government agencies have the advantage of being able to ignore the chain of custody.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
10
Corporations and private entities that offer discounts on software or training to law enforcement agencies are called ________.

A) nerds or geeks
B) forensic predators
C) friendly vendors
D) electronic purses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following has been characterized as "a social networking site on steroids"?

A) Second Life
B) Love Bug
C) CERT
D) Electronic Frontier Foundation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
12
All the following are categories into which computer crimes are traditionally divided EXCEPT ________.

A) computer as an instrument
B) computer as a target
C) computer as an incidental
D) computer as a weapon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which is one of the earliest computer crimes to have been committed?

A) software piracy
B) DDoS attack
C) phishing
D) hacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
14
One of the earliest examples of computer crime is ________, which consists of an activity in which telecommunications systems are manipulated and ultimately compromised.

A) phreaking
B) spamming
C) hacking
D) cracking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is NOT a reason why many businesses and corporations underreport computer crimes?

A) consumers don't care about confidentiality
B) exposure to financial losses
C) data breach liabilities
D) damage to brand
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following involves payments that rely on a bank account and a web-based transfer of funds to or from an established financial account?

A) closed system cards
B) digital precious metals
C) Internet payment services
D) stored value cards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is an example of computer-initiated criminal activity?

A) spreading viruses
B) stealing home addresses
C) wire transfers
D) spamming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following, according to a study conducted by the Department of Justice, were perceived as the number one target for computer crime?

A) financial institutions
B) individuals
C) businesses
D) educational institutions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following allows perpetrators to commit multinational cybercrime with little fear of judicial sanctions?

A) the presence of traditional jurisdictional demarcations
B) the lack of physical boundaries
C) an extensive array of equipment or tools
D) the widespread acceptance of world passports
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
20
________ includes any criminal activity which involves the unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data.

A) Cybercrime
B) Computer related crime
C) Computer crime
D) Digital crime
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
21
Law enforcement has been threatened and weakened by the advent of the Internet and has not been able to benefit from it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
22
The quality of information found on the Internet is often questionable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following e-payment methods stores funds on an integrated circuit chip in the card?

A) mobile payment
B) prepaid card
C) stored value card
D) Internet payment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
24
PayPal is an example of a(n) ________.

A) digital precious metal
B) prepaid card
C) stored value card
D) Internet payment service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
25
The Supreme Court has displayed a keen interest in deciding matters of law in the newly emerging sphere of cyberspace.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following characteristics of new payment methods has facilitated money laundering and terrorist financing?

A) anonymity in transactions
B) increased competition
C) lower cost
D) lower interest rates
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which payment method is typically associated with a card payment network such as Visa or MasterCard?

A) digital precious metals
B) mobile payment
C) electronic purse
D) prepaid card
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
28
Increasing dependence on cyber information is one of the disadvantages of the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
29
The Information or Digital Revolution has exacerbated the vulnerabilities of government institutions and personal residences alike.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
30
Cyberspace is the indefinite place where individuals transact and communicate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
31
The lack of physical boundaries and the removal of traditional jurisdictional demarcations allow perpetrators to commit multinational crime with little fear of judicial sanctions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
32
Spamming cannot be considered a computer crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
33
Phreaking is an activity in which telecommunications systems are manipulated and ultimately compromised.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
34
Closed system cards and open system cards are two primary types of ________.

A) stored value cards
B) prepaid cards
C) digital precious metals
D) mobile payments
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
35
Much computer-related crime involves specialist users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
36
Cybercrime has been defined as any criminal act in which a computer is involved, even peripherally.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
37
Expenditures on a computer laboratory represent a recurring expense for an agency's budget.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
38
Electronic purses come in two primary types: limited or closed, and multipurpose or open.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
39
Investigators and administrators have displayed a zealous commitment to pursuing computer criminals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
40
Corporations may underreport cybercrimes because of concerns about data breach liabilities, damage to brand, regulatory issues, and loss of consumer confidence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
41
Stealing home addresses, maps, or family information is classified as ________ criminal activity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
42
Evaluate some of the innovative payment mechanisms that can be targeted by cyber criminals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
43
________, an activity in which telecommunications systems are manipulated and ultimately compromised, was the precursor to today's hacking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
44
The introduction of the ________ has created unparalleled opportunities for commerce, research, education, entertainment, and public discourse.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
45
________ have historically been divided into three categories: computer as a target, computer as an instrument, and computer as an incidental.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
46
________ includes any criminal activity that involves the unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
47
The Supreme Court has refused to determine appropriate levels of ________ protections of individuals and computer equipment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
48
The most disconcerting of all computer crime involves the sexual exploitation of ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
49
What is cyberspace? Discuss various terms that pertain to criminal behavior involving computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
50
Unlike magnetic strips, which store only account information, a ________ stores funds on an integrated circuit chip.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
51
Discuss how the Internet has revolutionized law enforcement in society.What are the advantages and disadvantages of the Internet?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
52
The lack of ________ and the removal of traditional jurisdictional demarcations allow perpetrators to commit multinational crime with little fear.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
53
In addition to costs associated with training, administrators must consider three additional areas in support of computer crime investigations: ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
54
The Internet has monumentally increased the ________ of the virtual world, outpaced only by the exponential growth in the number of users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
55
Barlow and Gilmore created the ________ to demonstrate that the Secret Service had conducted itself in an arbitrary, oppressive, and unconstitutional manner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
56
The rationale for ________ involves the avoidance of currency fluctuation and foreign exchange.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
57
One of the first examples of the international havoc that malware could wreak involved the ________ virus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
58
________ purpose cards may be used only for a finite number of purposes, and are issued by a particular merchant, telecommunications provider, or transit company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
59
Discuss whether the law enforcement community has been able to handle computer crimes effectively in society.Briefly describe some of the problems faced by the police in the enforcement and prosecution of computer crimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
60
Assess the problem of lack of resources for the law enforcement community.How, in your opinion, should they respond to this problem?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
61
Match between columns
Open system cards
They are used only for a finite number of purposes, and are issued by a particular merchant, telecommunications provider, or transit company.
Open system cards
Their value is stored electronically on the device via an integrated circuit chip.
Open system cards
They involve payments that rely on a bank account and use the Internet as a means of transferring funds to or from an established financial account.
Open system cards
They are attached to an account and they provide access to monetary funds that are paid in advance by the cardholder.
Open system cards
They are used for a wide range of purposes, may cross geographic boundaries, and may be used by any user.
Internet payment services
They are used only for a finite number of purposes, and are issued by a particular merchant, telecommunications provider, or transit company.
Internet payment services
Their value is stored electronically on the device via an integrated circuit chip.
Internet payment services
They involve payments that rely on a bank account and use the Internet as a means of transferring funds to or from an established financial account.
Internet payment services
They are attached to an account and they provide access to monetary funds that are paid in advance by the cardholder.
Internet payment services
They are used for a wide range of purposes, may cross geographic boundaries, and may be used by any user.
Prepaid cards
They are used only for a finite number of purposes, and are issued by a particular merchant, telecommunications provider, or transit company.
Prepaid cards
Their value is stored electronically on the device via an integrated circuit chip.
Prepaid cards
They involve payments that rely on a bank account and use the Internet as a means of transferring funds to or from an established financial account.
Prepaid cards
They are attached to an account and they provide access to monetary funds that are paid in advance by the cardholder.
Prepaid cards
They are used for a wide range of purposes, may cross geographic boundaries, and may be used by any user.
Limited purpose cards
They are used only for a finite number of purposes, and are issued by a particular merchant, telecommunications provider, or transit company.
Limited purpose cards
Their value is stored electronically on the device via an integrated circuit chip.
Limited purpose cards
They involve payments that rely on a bank account and use the Internet as a means of transferring funds to or from an established financial account.
Limited purpose cards
They are attached to an account and they provide access to monetary funds that are paid in advance by the cardholder.
Limited purpose cards
They are used for a wide range of purposes, may cross geographic boundaries, and may be used by any user.
Storedvalue cards
They are used only for a finite number of purposes, and are issued by a particular merchant, telecommunications provider, or transit company.
Storedvalue cards
Their value is stored electronically on the device via an integrated circuit chip.
Storedvalue cards
They involve payments that rely on a bank account and use the Internet as a means of transferring funds to or from an established financial account.
Storedvalue cards
They are attached to an account and they provide access to monetary funds that are paid in advance by the cardholder.
Storedvalue cards
They are used for a wide range of purposes, may cross geographic boundaries, and may be used by any user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
62
Match between columns
Phreaking
A generic term that denotes any criminal act, both Internet and non-Internet activity, which has been facilitated by computer use, and includes theft of components, counterfeiting, digital piracy or copyright infringement, hacking, and child pornography.
Phreaking
It encompasses abuses and misuses of computer systems or computers connected to the Internet that result in direct and/or concomitant losses.
Phreaking
It includes any criminal activity that involves the unauthorized access,dissemination, manipulation, destruction, or corruption of electronically stored data.
Phreaking
It is a criminal activity in which telecommunications systems are manipulated and ultimately compromised.
Phreaking
It is defined as any criminal act in which a computer is involved, even peripherally.
Computer-related crime
A generic term that denotes any criminal act, both Internet and non-Internet activity, which has been facilitated by computer use, and includes theft of components, counterfeiting, digital piracy or copyright infringement, hacking, and child pornography.
Computer-related crime
It encompasses abuses and misuses of computer systems or computers connected to the Internet that result in direct and/or concomitant losses.
Computer-related crime
It includes any criminal activity that involves the unauthorized access,dissemination, manipulation, destruction, or corruption of electronically stored data.
Computer-related crime
It is a criminal activity in which telecommunications systems are manipulated and ultimately compromised.
Computer-related crime
It is defined as any criminal act in which a computer is involved, even peripherally.
Cyber crime
A generic term that denotes any criminal act, both Internet and non-Internet activity, which has been facilitated by computer use, and includes theft of components, counterfeiting, digital piracy or copyright infringement, hacking, and child pornography.
Cyber crime
It encompasses abuses and misuses of computer systems or computers connected to the Internet that result in direct and/or concomitant losses.
Cyber crime
It includes any criminal activity that involves the unauthorized access,dissemination, manipulation, destruction, or corruption of electronically stored data.
Cyber crime
It is a criminal activity in which telecommunications systems are manipulated and ultimately compromised.
Cyber crime
It is defined as any criminal act in which a computer is involved, even peripherally.
Digital crime
A generic term that denotes any criminal act, both Internet and non-Internet activity, which has been facilitated by computer use, and includes theft of components, counterfeiting, digital piracy or copyright infringement, hacking, and child pornography.
Digital crime
It encompasses abuses and misuses of computer systems or computers connected to the Internet that result in direct and/or concomitant losses.
Digital crime
It includes any criminal activity that involves the unauthorized access,dissemination, manipulation, destruction, or corruption of electronically stored data.
Digital crime
It is a criminal activity in which telecommunications systems are manipulated and ultimately compromised.
Digital crime
It is defined as any criminal act in which a computer is involved, even peripherally.
Computer crime
A generic term that denotes any criminal act, both Internet and non-Internet activity, which has been facilitated by computer use, and includes theft of components, counterfeiting, digital piracy or copyright infringement, hacking, and child pornography.
Computer crime
It encompasses abuses and misuses of computer systems or computers connected to the Internet that result in direct and/or concomitant losses.
Computer crime
It includes any criminal activity that involves the unauthorized access,dissemination, manipulation, destruction, or corruption of electronically stored data.
Computer crime
It is a criminal activity in which telecommunications systems are manipulated and ultimately compromised.
Computer crime
It is defined as any criminal act in which a computer is involved, even peripherally.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.