Who Are You?
Argg!
Law & Disorder
Follow
“The Code”?
100
One of the fastest growing “information crimes”, this term describes the stealing of another person’s information for the purpose of buying merchandise or borrowing money without paying the debt.
What is Identity Theft.
100
Digital “blank” are used to prevent the counterfeiting and piracy of digital content.
What are Watermarks.
100
The FBI’s first software application to monitor an individual’s communication over an ISP.
What is Carnivore.
100
Information privacy, accuracy, property, and accessibility are the biggest concerns when dealing with what issue?
What is Computer ethics.
200
This is one of the four major steps that you as a consumer can take to maintain your privacy.
What is Choose web sites that are monitored by independent organizations, Avoid having Cookies left on your machine, Visit sites anonymously, or Use caution when requesting confirmation e-mail.
200
A small text file on your computer that stores information about your web browsing activity.
What is a Cookie.
200
This broad term includes; Targeting a computer while committing an offense, Using a computer to commit an offense, and Using computers to support a criminal activity.
What is Computer Crime.
200
These often lag behind technology, creating instances where people act unethically, but do not get into trouble for it.
What are Laws.
300
This term focuses on who owns information about individuals and how that information can be shared.
What is Information property.
300
Typically used for advertising, this technology collects information about a person or organization without their knowledge to be transmitted to another party.
What is Spyware.
300
Computer criminals generally fall into one of four groups. This group commits the most crimes.
What are Current or former employees that steal or do damage to employers.
300
Nearly every business where employees have access to the Internet now publishes a code of conduct to manage “blank” on work computers.
What is Personal Use.
400
Misrepresenting yourself in order to steal equipment or to trick others into revealing sensitive information.
What is Social Engineering or Masquerading.
400
Offering stolen proprietary software for free over the Internet.
What is Warez peddling.
400
A computer or network site that is designed to be enticing to computer criminals, so as to detect and counter illegal activity.
What is a Honeypot.
400
An extremely controversial topic, this site acts as a whistleblower website with the stated purpose of creating open governments.
What is WikiLeaks.
500
This 2002 movie was based on the life of Frank Abagnale Jr, who, before the age of 19, conned millions of dollars by posing as different professionals such as a pilot and doctor.
What is Catch Me If You Can.
500
This peer-to-peer protocol has spawned the catchwords “leechers” and “seeders” to the computer lexicon.
What is BitTorrent.
500
This law made it harder to eavesdrop on phone conversations, but was very limiting in regards to e-mail privacy.
What is the Electronic Communications Privacy Act.
500
This organization has published guidelines for the ethical use of computers; these guidelines prohibit the use of a computer to steal, using other people’s intellectual output without permission, and interfering with other people’s work, among others.
What is The Computer Ethics Institute.
M
e
n
u