CYBER CRIMES
Encryption Corporate espionage Money laundering Payload trigger
Worm Resident Virus Non-Resident Virus Worm Phishing
Smurfing Theft Degree of Exposure Level of Vulnerability
Embezzlement Trade Secrets Proprietary Information
1.____________________________________ The theft of proprietary business information by spying or deception.
2.____________________________________ This refers to customer lists, research and development data and pricing lists used by a company.
3.____________________________________ Concealing the source of assets that have been illegally obtained.
4.____________________________________ This is luring a person to fraudulent websites to gather sensitive information.
5.____________________________________ This is the unlawful misappropriation of assets under the offender’s care, custody and control.
6.____________________________________ This refers to proprietary information with value to a commercial enterprise because it provides and advantage over competitors.
7.____________________________________ The method of scrambling or encoding data to prevent development of tampering.
8.____________________________________ This type of virus stays in the computer memory and is active until the computer is powered down or reboot.
9.____________________________________ This type of virus is particular to an operating system and would widely infect files.
10.____________________________________ This is a stand-alone piece of code.
11. True False The Bank Secrecy Act of 1970 requires identification for anyone depositing more than $10,000.
12. True False Money laundering is a new crime, directly related to the expansion of technology.
13. True False The crime of identity theft has increased due to computer technology.
14. True False “Smurfing” in money laundering refers to transforming money into property.
15. True False “Insider” corporate spies have no legitimate access and are frequently hired by competitors.
16. True False Victims of corporate espionage and request an FBI investigation.
17. True False A computer-assisted crime refers to a crime previously committed without computers but made more efficient by the cyber technology.
18. True False Hackers and those who use viruses and malicious codes against computer systems are considered opportunistic criminals.
19. True False A “mutation engine” refers to a change in code each time it infects a new computer.
20. True False Viruses and malware are usually designed for a specific function and can be non-criminal or criminally related.
21. Define Child Pornography.
What are the four primary reasons that pedophiles use the internet?
22.
23.
24.
25.
26. What does it mean when a person who possess child pornography is labeled as a “dual offender”?
27. What is cyberbullying?
28. What is the difference between cyberbullying and cyberstalking?
Generally, what are the four ways someone can be cyber stalked bullied or harassed?
29.
30.
31.
32.
What are the main traits of these types of stalkers:
33. Simple Obsessional Stalker:
34. Love Obsession Stalker:
35. Erotomaniacs:
35. Vengeance Stalker:
36. Define “hate crime”.
Describe four ways hate groups use the internet.
37.
38.
39.
40.