SlideShare a Scribd company logo
1 of 4
1.
List four primary ways identity theft can be accomplished.
2.
What are the four criteria used to examine in reference to cyber
stalking?
3.
List four types of computer related fraud.
4.
What law addressed breaking into computers used by the federal
government, financial institutions, and computers involved in
foreign commerce?
5.
What was operation ‘Sun Devil’?
6.
Who was ‘data stream’?
7.
What is ‘Innocent Images National Initiative’?
8.
What was the significance of ‘The Sovereign Equity
Management Corp’?
9.
List at least three modern attack techniques.
10.
What are the two common types of privilege escalation?
11.
What is horizontal privilege escalation?
12.
What is a Worm?
13.
What is a Logic Bomb?
14.
What was the first proposal for Federal computer crime
legislation in the United States that would specifically prohibit
misuse of computers?
15.
What law extended federal wiretap laws into the domain of the
newer electronic communications medium?
16.
What law extended federal wiretap laws into the domain of the
newer electronic communications medium?
17.
The Identity Theft Enforcement and Restitution Act further
expanded the Computer Fraud and Abuse Act in what way?
18.
What was the first legislative attempt to curtail internet
pornography?
19.
What law expressly targeted theft of intellectual property?
20.
What law made it illegal to attempt to circumvent copy
protection technologies?
21.
What law required libraries and schools to filter content that
children have access to.
22.
Which is more common with identity theft: targets of
opportunity or specific individuals being targeted?
23.
Is it legal for state drivers’ licenses to display social security
numbers?
24.
Someone must physically have access to your credit or debit
card to steal the data.
25.
What is shill bidding?
26.
What is a pump and dump?
27.
What is foot printing?
28.
What is a brute force attack?
29.
What is SQL injection?
30.
What is a sniffer?
31.
How can sites like craigslist and eBay be used by criminals?
32.
Describe one way in which cyber extortion might be done.
33.
What is cyber terrorism?
34.
What is information warfare?
35.
What is one common way the internet can be used in
information warfare?
36.
What is industrial espionage?
37.
What is a simple formula for calculating the value of
information?
38.
When is a warrant not required?
39.
What is one of the first steps in a computer forensic
investigation, according to the FBI?
40.
What is a CRC or MD5?
41.
Can law enforcement officers conduct a search without probable
cause or a warrant?
42.
What is the first step in any forensics investigation?
43.
What should be documented?
44.
What is the most important rule in forensically examining
digital images?

More Related Content

Similar to 1. List four primary ways identity theft can be accomplished.2. .docx

Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)
Kim Moore
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docx
ursabrooks36447
 
1.What do you consider to be the essential steps in developing inf.docx
1.What do you consider to be the essential steps in developing inf.docx1.What do you consider to be the essential steps in developing inf.docx
1.What do you consider to be the essential steps in developing inf.docx
AlyciaGold776
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
nivi55
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
Chande Kasita
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
Yogendra Wagh
 

Similar to 1. List four primary ways identity theft can be accomplished.2. .docx (16)

Cyber Crimes.pdf
Cyber Crimes.pdfCyber Crimes.pdf
Cyber Crimes.pdf
 
Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)Computer Fraud And Abuse Act Of 1986 (CFA)
Computer Fraud And Abuse Act Of 1986 (CFA)
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docx
 
1.What do you consider to be the essential steps in developing inf.docx
1.What do you consider to be the essential steps in developing inf.docx1.What do you consider to be the essential steps in developing inf.docx
1.What do you consider to be the essential steps in developing inf.docx
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docxDiscussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
The 3 Secrets of Online Privacy
The 3 Secrets of Online Privacy The 3 Secrets of Online Privacy
The 3 Secrets of Online Privacy
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
Cis 552 final exam solution
Cis 552 final exam solutionCis 552 final exam solution
Cis 552 final exam solution
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 

More from sandibabcock

2. What information could not be told from this map3. After revie.docx
2. What information could not be told from this map3. After revie.docx2. What information could not be told from this map3. After revie.docx
2. What information could not be told from this map3. After revie.docx
sandibabcock
 
2-13CreatingaSolutionofKnownMolarityIn this a.docx
2-13CreatingaSolutionofKnownMolarityIn this a.docx2-13CreatingaSolutionofKnownMolarityIn this a.docx
2-13CreatingaSolutionofKnownMolarityIn this a.docx
sandibabcock
 
2 part task APA FormatPart 1The role of the nurse educator requ.docx
2 part task APA FormatPart 1The role of the nurse educator requ.docx2 part task APA FormatPart 1The role of the nurse educator requ.docx
2 part task APA FormatPart 1The role of the nurse educator requ.docx
sandibabcock
 
2 points Question 2 The EPAs Superfund Trust was establis.docx
2 points Question 2 The EPAs Superfund Trust was establis.docx2 points Question 2 The EPAs Superfund Trust was establis.docx
2 points Question 2 The EPAs Superfund Trust was establis.docx
sandibabcock
 

More from sandibabcock (20)

2. Session 11 contains the Final Prezi Presentation.  There are diff.docx
2. Session 11 contains the Final Prezi Presentation.  There are diff.docx2. Session 11 contains the Final Prezi Presentation.  There are diff.docx
2. Session 11 contains the Final Prezi Presentation.  There are diff.docx
 
2. In generaI, how do the gods and goddesses described in the myth.docx
2. In generaI, how do the gods and goddesses described in the myth.docx2. In generaI, how do the gods and goddesses described in the myth.docx
2. In generaI, how do the gods and goddesses described in the myth.docx
 
2-3 pages APA Style APA Journal citationBlount, R L, Drabman, R S.docx
2-3 pages APA Style APA Journal citationBlount, R L, Drabman, R S.docx2-3 pages APA Style APA Journal citationBlount, R L, Drabman, R S.docx
2-3 pages APA Style APA Journal citationBlount, R L, Drabman, R S.docx
 
2. What are the components of the communication process Describe a .docx
2. What are the components of the communication process Describe a .docx2. What are the components of the communication process Describe a .docx
2. What are the components of the communication process Describe a .docx
 
2. Supply of InsuranceSuppose there are two risk averse individual.docx
2. Supply of InsuranceSuppose there are two risk averse individual.docx2. Supply of InsuranceSuppose there are two risk averse individual.docx
2. Supply of InsuranceSuppose there are two risk averse individual.docx
 
2-4 double-spaced typewritten pages for each.Topic 1.docx
2-4 double-spaced typewritten pages for each.Topic 1.docx2-4 double-spaced typewritten pages for each.Topic 1.docx
2-4 double-spaced typewritten pages for each.Topic 1.docx
 
2. Charismatic Leadership It is true that charisma has no g.docx
2. Charismatic Leadership It is true that charisma has no g.docx2. Charismatic Leadership It is true that charisma has no g.docx
2. Charismatic Leadership It is true that charisma has no g.docx
 
2. What information could not be told from this map3. After revie.docx
2. What information could not be told from this map3. After revie.docx2. What information could not be told from this map3. After revie.docx
2. What information could not be told from this map3. After revie.docx
 
2-13CreatingaSolutionofKnownMolarityIn this a.docx
2-13CreatingaSolutionofKnownMolarityIn this a.docx2-13CreatingaSolutionofKnownMolarityIn this a.docx
2-13CreatingaSolutionofKnownMolarityIn this a.docx
 
2-3 page APA with 3-4 cites Prepare a 2-3 page paper using APA f.docx
2-3 page APA with 3-4 cites Prepare a 2-3 page paper using APA f.docx2-3 page APA with 3-4 cites Prepare a 2-3 page paper using APA f.docx
2-3 page APA with 3-4 cites Prepare a 2-3 page paper using APA f.docx
 
2-3 page essay question selected from one out of three possible .docx
2-3 page essay question selected from one out of three possible .docx2-3 page essay question selected from one out of three possible .docx
2-3 page essay question selected from one out of three possible .docx
 
2) CompareContrast the life of an indentured servant with that of a.docx
2) CompareContrast the life of an indentured servant with that of a.docx2) CompareContrast the life of an indentured servant with that of a.docx
2) CompareContrast the life of an indentured servant with that of a.docx
 
2 part task APA FormatPart 1The role of the nurse educator requ.docx
2 part task APA FormatPart 1The role of the nurse educator requ.docx2 part task APA FormatPart 1The role of the nurse educator requ.docx
2 part task APA FormatPart 1The role of the nurse educator requ.docx
 
2 pages Comparison and Contrast and one page for sourcesPage No .docx
2 pages Comparison and Contrast and one page for sourcesPage No .docx2 pages Comparison and Contrast and one page for sourcesPage No .docx
2 pages Comparison and Contrast and one page for sourcesPage No .docx
 
2 PagesAPA StyleYou have been promoted to a member of the mana.docx
2 PagesAPA StyleYou have been promoted to a member of the mana.docx2 PagesAPA StyleYou have been promoted to a member of the mana.docx
2 PagesAPA StyleYou have been promoted to a member of the mana.docx
 
2 points Question 2 The EPAs Superfund Trust was establis.docx
2 points Question 2 The EPAs Superfund Trust was establis.docx2 points Question 2 The EPAs Superfund Trust was establis.docx
2 points Question 2 The EPAs Superfund Trust was establis.docx
 
2 parts 1st. part is answer this QACompared to other countries.docx
2 parts 1st. part is answer this QACompared to other countries.docx2 parts 1st. part is answer this QACompared to other countries.docx
2 parts 1st. part is answer this QACompared to other countries.docx
 
2 parts 1st. part is answer this QAGive an example from someth.docx
2 parts 1st. part is answer this QAGive an example from someth.docx2 parts 1st. part is answer this QAGive an example from someth.docx
2 parts 1st. part is answer this QAGive an example from someth.docx
 
2 pagesOne of the functions of HR is to develop and manage employe.docx
2 pagesOne of the functions of HR is to develop and manage employe.docx2 pagesOne of the functions of HR is to develop and manage employe.docx
2 pagesOne of the functions of HR is to develop and manage employe.docx
 
2 POwer Point slides with at least 200 words of speaker notes .docx
2 POwer Point slides with at least 200 words of speaker notes .docx2 POwer Point slides with at least 200 words of speaker notes .docx
2 POwer Point slides with at least 200 words of speaker notes .docx
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 

1. List four primary ways identity theft can be accomplished.2. .docx

  • 1. 1. List four primary ways identity theft can be accomplished. 2. What are the four criteria used to examine in reference to cyber stalking? 3. List four types of computer related fraud. 4. What law addressed breaking into computers used by the federal government, financial institutions, and computers involved in foreign commerce? 5. What was operation ‘Sun Devil’? 6. Who was ‘data stream’? 7. What is ‘Innocent Images National Initiative’? 8. What was the significance of ‘The Sovereign Equity Management Corp’? 9. List at least three modern attack techniques. 10. What are the two common types of privilege escalation? 11. What is horizontal privilege escalation? 12. What is a Worm? 13. What is a Logic Bomb? 14. What was the first proposal for Federal computer crime legislation in the United States that would specifically prohibit misuse of computers? 15.
  • 2. What law extended federal wiretap laws into the domain of the newer electronic communications medium? 16. What law extended federal wiretap laws into the domain of the newer electronic communications medium? 17. The Identity Theft Enforcement and Restitution Act further expanded the Computer Fraud and Abuse Act in what way? 18. What was the first legislative attempt to curtail internet pornography? 19. What law expressly targeted theft of intellectual property? 20. What law made it illegal to attempt to circumvent copy protection technologies? 21. What law required libraries and schools to filter content that children have access to. 22. Which is more common with identity theft: targets of opportunity or specific individuals being targeted? 23. Is it legal for state drivers’ licenses to display social security numbers? 24. Someone must physically have access to your credit or debit card to steal the data. 25. What is shill bidding? 26. What is a pump and dump? 27. What is foot printing? 28. What is a brute force attack?
  • 3. 29. What is SQL injection? 30. What is a sniffer? 31. How can sites like craigslist and eBay be used by criminals? 32. Describe one way in which cyber extortion might be done. 33. What is cyber terrorism? 34. What is information warfare? 35. What is one common way the internet can be used in information warfare? 36. What is industrial espionage? 37. What is a simple formula for calculating the value of information? 38. When is a warrant not required? 39. What is one of the first steps in a computer forensic investigation, according to the FBI? 40. What is a CRC or MD5? 41. Can law enforcement officers conduct a search without probable cause or a warrant? 42. What is the first step in any forensics investigation? 43. What should be documented? 44. What is the most important rule in forensically examining