Finals 2 Flashcards

1
Q

Alternatively known as cyber crime, e-crime, electronic crime, or hi-tech crime.

A

Computer Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is an act performed by an educated computer user, sometimes called a “hacker,” that wrongfully browses or takes an organization’s or a person’s confidential data.

A

Computer Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sometimes, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or data files.

A

Computer Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In most cases, someone commits a computer crime to obtain…

A

goods or money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

are strong inspirations for certain individuals to try stealing through computer crimes.

A

Greed and desperation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Certain individuals may likewise commit a computer wrongdoing since they are ___, to do so by someone else

A

pressured, or forced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Certain individuals commit computer crimes to demonstrate they can ___.

A

make it happen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An individual who can effectively execute a computer crime might track down incredible ___.

A

individual satisfaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These sorts of individuals, called ___ like to create chaos and unleash devastation on others and organizations.

A

black hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Another explanation computer crimes are sometimes committed is because they are ___. They want something to do and do not care if they commit a crime.

A

bored (exhausted)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Making, distributing, storing, or viewing child pornography.

A

Child pornography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fraudulent clicks on Internet advertisements.

A

Click fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stealing or using another person’s Copyrighted material without permission.

A

Copyright violation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Breaking or deciphering codes designed to protect data.

A

Cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Computer fraud involving the intentional falsification of numbers in data entry.

A

Data diddling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Releasing another person’s personal information without their permission.

A

Doxing

17
Q

A type of graffiti that uses projectors or lasers to project an image or message onto a building.

A

Green Graffiti

18
Q

Collect account or account-related information on other people.

A

Harvesting

19
Q

An intellectual property rights violation is any infringement of another’s Copyright, patent, or trademark.

A

IPR violation

20
Q

SMS scam to get people to invest into a crypto currency scam.

A

Pig butchering

21
Q

Stealing tiny amounts of money from each transaction.

A

Salami slicing

22
Q

The act of calling in a false police report to someone else’s home.

A

Swatting

23
Q

Setting up a domain that is a misspelling of another domain.

A

Typo-squatting

24
Q

Connecting a device to a phone line to listen to conversations.

A

Wiretapping