A strong answer will include the following: It cuts across national boundaries. It ignores bureaucracy. It targets critical infrastructures controlled by public and private entities.
a. botnet
b. phishing email
c. worm
d. Trojan horse
a. botnet
You might also like to view...
One feature of community-based correctional agencies is nonsecure housing for offenders
Indicate whether the statement is true or false
Marvin Wolfgang's 1958 study Patterns in Criminal Homicide is an example of which subarea of the criminological enterprise?
A. Developing theories of crime causation B. Understanding and describing criminal behavior C. Criminal statistics/crime measurement D. Sociology of law
Each of the following is a type of victim service offered in America EXCEPT?
a. Victim compensation
b. Free legal representation to sue those who victimize them
c. Shelters and safe houses
d. Crisis counseling
Which one of the following is an example of “accident and misfortune” as a defense to a criminal charge?
a. Justifiable homicide by a police office. b. Justifiable homicide in self-defense. c. Excusable homicide in driving a motor vehicle. d. Accidental death while assisting another to administer illegal drugs.