Cyber Crimes
CYBER CRIMES
Encryption
Corporate espionage
Money laundering
Payload trigger
Worm
Resident Virus
Non-Resident Virus
Worm
Phishing
Smurfing
Theft
Degree of Exposure
Level of Vulnerability
Embezzlement
Trade Secrets
Proprietary Information
1.____________________________________
The theft of proprietary business information by spying
or deception.
2.____________________________________
This refers to customer lists, research and development
data and pricing lists used by a company.
3.____________________________________
Concealing the source of assets that have been illegally
obtained.
4.____________________________________
This is luring a person to fraudulent websites to gather
sensitive information.
5.____________________________________
This is the unlawful misappropriation of assets under
the offender’s care, custody and control.
6.____________________________________
This refers to proprietary information with value to a
commercial enterprise because it provides and
advantage over competitors.
7.____________________________________
The method of scrambling or encoding data to prevent
development of tampering.
8.____________________________________
This type of virus stays in the computer memory and is
active until the computer is powered down or reboot.
9.____________________________________
This type of virus is particular to an operating system
and would widely infect files.
10.____________________________________
This is a stand-alone piece of code.
11.
True
False
The Bank Secrecy Act of 1970 requires identification for anyone
depositing
more than $10,000.
12.
True
False
Money laundering is a new crime, directly related to the expansion of
technology.
13.
True
False
The crime of identity theft has increased due to computer technology.
14.
True
False
“Smurfing” in money laundering refers to transforming money into property.
15.
True
False
“Insider” corporate spies have no legitimate access and are frequently hired by
competitors.
16.
True
False
Victims of corporate espionage and request an FBI investigation.
17.
True
False
A computer-assisted crime refers to a crime previously committed without
computers but made more efficient by the cyber technology.
18.
True
False
Hackers and those who use viruses and malicious codes against computer
systems are considered opportunistic criminals.
19.
True
False
A “mutation engine” refers to a change in code each time it infects a new
computer.
20.
True
False
Viruses and malware are usually designed for a specific function and can be
non-criminal or criminally related.
21. Define Child Pornography.
What are the four primary reasons that pedophiles use the internet?
22.
23.
24.
25.
26.
What does it mean when a person who possess child pornography is labeled as a “dual offender”?
27. What is cyberbullying?
28. What is the difference between cyberbullying and cyberstalking?
Generally, what are the four ways someone can be cyber stalked bullied or harassed?
29.
30.
31.
32.
What are the main traits of these types of stalkers:
33.
Simple Obsessional Stalker:
34.
Love Obsession Stalker:
35.
Erotomaniacs:
35.
Vengeance Stalker:
36. Define “hate crime”.
Describe four ways hate groups use the internet.
37.
38.
39.
40.