Criminal Opportunity
Extent of Cybercrime
Cybercrime and the law
Characteristics of Hackers
Misc.
100

Any crime that involves the use of computers or the manipulation of digital data, as well as any violation of a federal or state cybercrime statute.

What is Cybercrime?

100

The unauthorized and illegal copying of software programs.

What is software piracy?

100

An illegal act using computer technology in its perpetration, investigation, or prosecution.

What is computer-related crime?

100

Hackers with a sense of fun, with no intention to harm.

What are Scamps?

100

The use of biological residue found at a crime scene for genetic comparisons in aiding the identification of criminal suspects.

What is DNA profiling?

200

A person who uses computers for exploration and exploitation.

What is a hacker?

200

Happy Friday! You just earned 200 free points!

Pick again.

200

An unlawful incident associated with computer technology in which a victim suffers loss or a perpetrator reaps benefits.

What is computer abuse?

200

Enjoy defeating software or system copy protection and may seek to illegally access computer systems with games to play.

What are game players?

200

A complete and thorough assessment of the kinds of perils facing an organization.

What is threat analysis?

300

Viruses are an example of ___________.

What is internal cybercrimes?

300

An internet-based scam to steal valuable information such as credit card numbers, social security numbers, user IDs and passwords.

What is phishing?

300

A federal law found in the Homeland Security Act of 2002 tat directs the U.S. Sentencing Commission to take specific factors into account in creating new sentence guidelines for cybercriminals. 

What is the Cyber Security Enhancement Act (CSEA)?

300

Hackers motivated by their delight in discoveries associated with breaking into new computer systems.

What are explorers?

300

Guarantee that each person has freedom of speech and security in his or her "persons, houses, papers, and effects, against unreasonable searches and seizures."

What are the First and Fourth Amendments?

400

Embezzlement is an example of __________.

What is computer-manipulation crimes?

400

A set of computer instructions that propagates copies or versions of itself into computer programs or data when it is executed.

What is a computer virus?

400

A 2015 federal law that is designed to facilitate the sharing of information about cybersecurity threats between the U.S. government and technology companies.

What is the Cybersecurity Information Sharing Act (CISA)?

400

Individuals who are fascinated by the evolving technology of telecommunications and explore it without knowing exactly what they are going to find.

What are pioneers?

400

A person who uses switched, dialed-access telephone services for exploration and exploitation.

What is phone phreak?