Cyber Crime Final Exam Graded A+
Cyber Stalking - Answers-Repeated use of the internet to annoy, alarm, or threaten an
individual (i.e., email, chat rooms, instant messaging)
Dark Web - Answers-Sites that are intentionally hidden from search engines; Can only
be accessed through special browsers with a masked IP address to create anonymity
Deep Web - Answers-Hidden from conventional search engines; Contains unindexed
websites; Personal info (i.e., medical records, payroll) or corporations private data
Digilantism/Online Vigilantes - Answers-Digital vigilantes that take actions to punish or
hold accountable individuals for crimes online
Digital/Data Exhaust - Answers-Every bit of data or activity used online; data left behind
(i.e., mouse clicks and keystrokes, visited websites, internet searches, downloaded
material, etc.)
Distributive Denial of Service - Answers-An attack on a networked computer that
disrupts normal operations that legitimate users can no longer access their services
Doxing/Leaking - Answers-The collection and leaking of private information on an
individual (i.e., addresses, emails, phone numbers)
Encryption - Answers-Techniques and tools associated with encoding data with a key
that is needed to decipher the data into the original legible form
Example of Dogpiling - Answers-Bobby Orr; a hockey player who was very well-loved
and voted for Trump so he was harassed
False Representation - Answers-Someone that pretends to be in a trusting role in order
to gain off the victim
Faraday Bags/Shields - Answers-Protects against remote wiping or alteration of
wireless devices
Fencing - Answers-Taking stolen goods and selling them somewhere else
Fraud - Answers-The deliberate deception to gain financially or make someone lose
something; a false representation by means of a statement or conduct made knowingly
or recklessly in order to gain material advantage
Gendertrolling - Answers-A persistent and intensely misogynistic form of harassment
Cyber Stalking - Answers-Repeated use of the internet to annoy, alarm, or threaten an
individual (i.e., email, chat rooms, instant messaging)
Dark Web - Answers-Sites that are intentionally hidden from search engines; Can only
be accessed through special browsers with a masked IP address to create anonymity
Deep Web - Answers-Hidden from conventional search engines; Contains unindexed
websites; Personal info (i.e., medical records, payroll) or corporations private data
Digilantism/Online Vigilantes - Answers-Digital vigilantes that take actions to punish or
hold accountable individuals for crimes online
Digital/Data Exhaust - Answers-Every bit of data or activity used online; data left behind
(i.e., mouse clicks and keystrokes, visited websites, internet searches, downloaded
material, etc.)
Distributive Denial of Service - Answers-An attack on a networked computer that
disrupts normal operations that legitimate users can no longer access their services
Doxing/Leaking - Answers-The collection and leaking of private information on an
individual (i.e., addresses, emails, phone numbers)
Encryption - Answers-Techniques and tools associated with encoding data with a key
that is needed to decipher the data into the original legible form
Example of Dogpiling - Answers-Bobby Orr; a hockey player who was very well-loved
and voted for Trump so he was harassed
False Representation - Answers-Someone that pretends to be in a trusting role in order
to gain off the victim
Faraday Bags/Shields - Answers-Protects against remote wiping or alteration of
wireless devices
Fencing - Answers-Taking stolen goods and selling them somewhere else
Fraud - Answers-The deliberate deception to gain financially or make someone lose
something; a false representation by means of a statement or conduct made knowingly
or recklessly in order to gain material advantage
Gendertrolling - Answers-A persistent and intensely misogynistic form of harassment