What is the act of illegally copying or distributing software called?
Software Piracy
Someone makes a very realistic video of a celebrity saying/doing something really bad that could defame them.
Deepfake/ Impersonation
Name a hacker group thats famous that we talked about
Anonymous , Lizzard Squad
What law requires law enforcement to get a warrant before accessing the content of private electronic communications?
Electronic Communications Privacy Act ECPA
What type of cybercrime involves shutting down or damaging a computer's system or network
Computer Sabotage
You download a free game on your phone, but then your computer starts to spread malicious code to you and your friends
WORM
What does DDOS stand for?
Distributed Denial of Service
This 1986 law makes it illegal to access a computer system without authorization or to exceed authorized access?
CFAA Computer Fraud and Abuse Act
Attempts to access sensitive data for economic gain, competitive advantage or political reasons.
Electronic Break-IN
You are playing video games when out of no where your internet crashes and doesn't want to turn back on. What type of attack is this?
DDOS
When does hacktivism cross the line into cyberterrorism?
When it causes harm, fear, or risk to civilians or governments
In Van Buren v. United States (2021), the Supreme Court ruled that using authorized access for an unauthorized reason did not violate what law?
CFAA The Computer Fraud and Abuse ACt
A ransomware gang steals data then encrypts it and then continues to leak parts of the data as a way of pressuring the company. What type of cybercrime is this?
ALL THREE , theft , sabotage, breaking in
You get an email from what looks like your boss, asking you to fill out an “End of Quarter Survey.” Once you open it, your computer starts acting strangely and files begin vanishing.
Which type of malicious program have you just unleashed?
Trojan Horse
What type of civil liberty was the Church of Scientology infringing on when trying to censor Tom Cruise's interview?
Freedom Of Speech
When international Hackers attack the US, who should be held responsible - the individuals, the state that they live in, or global organizations?
Everyone Answers This: Best Answer will be chosen
OPEN ENDED