Siegel_CrimTPT_12e_TB_Ch15

Points 1 references cybertheft cybercrimes for profit

Info icon This preview shows pages 24–27. Sign up to view the full content.

View Full Document Right Arrow Icon
POINTS: 1 REFERENCES: Cybertheft: Cybercrimes for Profit LEARNING OBJECTIVES: CTPT.SIEG.16.15.05 - Distinguish between the different forms of stealing intellectual property KEYWORDS: Bloom's: Remember
Image of page 24

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
89. Define what is meant by phishing and identity theft . ANSWER: Identity theft occurs when a person uses the Internet to steal someone’s identity and/or impersonate the victim to open a new credit card account or conduct some other financial transaction. Identity theft can destroy a person’s life by manipulating credit records or stealing from their bank accounts. Phishing involves the creation of false e-mails and/or Web sites that look legitimate but are designed to gain illegal access to a victim’s personal information. Vishing is a form of phishing utilizing Internet phone protocols. POINTS: 1 REFERENCES: Cybertheft: Cybercrimes for Profit LEARNING OBJECTIVES: CTPT.SIEG.16.15.06 - Define the terms identity theft and phishing KEYWORDS: Bloom's: Understand 90. Worms, viruses, Trojan horses, logic bombs, and spam are types of cybervandalism. Define each and discuss the differences among these forms of cybervandalism. ANSWER: Cybervandalism ranges from sending destructive viruses and worms to hacker attacks designed to destroy important computer networks. A computer virus is one type of malicious software program that disrupts or destroys existing programs and networks, causing them to perform the task for which the virus was designed. Computer worms are similar to viruses but use computer networks or the Internet to self-replicate and send themselves to other users, generally via e- mail, without the aid of the operator. A Trojan horse looks like a benign application but contains illicit codes that can damage the system operations. A logic bomb is a program that is secretly attached to a computer system, monitors the network’s work output, and waits for a particular signal such as a date to appear. POINTS: 1 REFERENCES: Cybervandalism: Cybercrime with Malicious Intent LEARNING OBJECTIVES: CTPT.SIEG.16.15.07 - Be familiar with the different types of cybervandalism KEYWORDS: Bloom's: Understand
Image of page 25
91. What is meant by cyberbullying , and how do cyberbullies "attack" their victims? ANSWER: Cyberbullying is defined as willful and repeated harm inflicted through the medium of electronic text. Like their real-world counterparts, cyberbullies are malicious aggressors who seek implicit or explicit pleasure or profit through the mistreatment of other individuals. Although power in traditional bullying might be physical (stature) or social (competency or popularity), online power may simply stem from Internet proficiency. Cyberbullies are able to navigate the Net
Image of page 26

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 27
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern