In reference to cybercrime, which term is used when the computer itself is a target of the criminal act?
a. Phishing
b. Cyber theft
c. Cyber attack
d. Advanced Persistent Threats (APTs)
c. Cyber attack
You might also like to view...
John Fuller has designed a pyramid of concepts that he believes constitutes peacemaking criminology; and the crucial concept that makes up the foundation of the pyramid is:
a. Nonviolence b. Inclusion c. Ascertainable criteria d. Correct means
Social disorganization theory grew out of Durkheim's theory of anomie and the early social conditions in the city of Chicago at the beginning of the twentieth century
Indicate whether the statement is true or false
All of the following are legitimate reasons to conduct psychological testing of police recruits EXCEPT:
a. Reduce potential liability b. Identify those who will likely be promoted during their careers c. Screen out psychopathology d. Minimize corruption
The burden of proof in the American criminal court system is ___________
Fill in the blank(s) with correct word