CYBER CRIMES

Encryption                    Corporate espionage                Money laundering                     Payload trigger

Worm              Resident Virus              Non-Resident Virus                  Worm                      Phishing

Smurfing                       Theft                            Degree of Exposure                  Level of Vulnerability

            Embezzlement               Trade Secrets               Proprietary Information

1.____________________________________         The theft of proprietary business information by spying                                                                           or deception.

2.____________________________________         This refers to customer lists, research and development                                                                         data and pricing lists used by a company.

3.____________________________________         Concealing the source of assets that have been illegally                                                                         obtained.

4.____________________________________         This is luring a person to fraudulent websites to gather                                                                            sensitive information.

5.____________________________________         This is the unlawful misappropriation of assets under                                                                              the offender’s care, custody and control.

6.____________________________________         This refers to proprietary information with value to a                                                                              commercial enterprise because it provides and                                                                                       advantage over competitors.

7.____________________________________         The method of scrambling or encoding data to prevent                                                                           development of tampering.

8.____________________________________         This type of virus stays in the computer memory and is                                                                           active until the computer is powered down or reboot.

9.____________________________________         This type of virus is particular to an operating system                                                                             and would widely infect files.

10.____________________________________       This is a stand-alone piece of code.

11.       True     False    The Bank Secrecy Act of 1970 requires identification for anyone           depositing                                             more than $10,000.

12.       True     False    Money laundering is a new crime, directly related to the expansion of                                                     technology.

13.       True     False    The crime of identity theft has increased due to computer technology.

14.       True     False    “Smurfing” in money laundering refers to transforming money into property.

15.       True     False    “Insider” corporate spies have no legitimate access and are frequently hired by                                       competitors.

16.       True     False    Victims of corporate espionage and request an FBI investigation.

17.       True     False    A computer-assisted crime refers to a crime previously committed without                                             computers but made more efficient by the cyber technology.

18.       True     False    Hackers and those who use viruses and malicious codes against computer                                             systems are considered opportunistic criminals.

19.       True     False    A “mutation engine” refers to a change in code each time it infects a new                                                computer.

20.       True     False    Viruses and malware are usually designed for a specific function and can be                                           non-criminal or criminally related.

21. Define Child Pornography.

What are the four primary reasons that pedophiles use the internet?

22.

23.

24.

25.

26.       What does it mean when a person who possess child pornography is labeled as a “dual offender”?

27. What is cyberbullying?

28. What is the difference between cyberbullying and cyberstalking?

Generally, what are the four ways someone can be cyber stalked bullied or harassed?

29.

30.

31.

32.

What are the main traits of these types of stalkers:

33.       Simple Obsessional Stalker:

34.       Love Obsession Stalker:

35.       Erotomaniacs:

35.       Vengeance Stalker:

36. Define “hate crime”.

Describe four ways hate groups use the internet.

37.

38.

39.

40.