Search Header Logo
Forensics CyberCrimes Part 3

Forensics CyberCrimes Part 3

Assessment

Presentation

Science

10th - 12th Grade

Practice Problem

Easy

NGSS
HS-PS4-2

Standards-aligned

Created by

Penny Dunning

Used 25+ times

FREE Resource

22 Slides • 12 Questions

1

Forensics CyberCrimes Part 3

Slide image

2

Slide image

3

Slide image

4

Slide image

5

Multiple Choice

Technology provides criminals with new opportunities. Many existing laws still struggle to adequately address the use of computers in crimes. What is the #1 major issue?

1

jurisdiction

2

absence of evidence

3

too technical for most detectives

4

power outages

6

Slide image

7

Slide image

8

Multiple Choice

If the cybercrime attacker lacks awareness of negative consequences of his act, he has ___________ committed the act

1

purposely

2

willfully

3

recklessly

4

negligently

9

Multiple Choice

If the cybercrime attacker commits the crime, and is aware of the substantial and unjustifiable risk of harm to others, but shows disregard for the risk of harm, he has ___________ committed the act

1

purposely

2

willfully

3

recklessly

4

negligently

10

Slide image

11

Slide image

12

Slide image

13

Multiple Choice

CCIPS stands for

1

Central Column Increased Public Sector

2

Computer Crime and Intellectual Property Section

3

Computer Crisis Internet Problems Social team

4

Closed Captioned Into Public Service

14

Slide image

15

Slide image

16

Multiple Choice

Can computers outside the United States still violate the law in the United States?

1

Yes

2

No

17

Slide image

18

Multiple Choice

Digital Forensics is a branch of forensic science that focuses on criminal procedure law and evidence as applied to computers and related devices like smartphones, gaming consoles, and any other internet-enabled device.

1

true

2

false

19

Slide image

20

Slide image

21

Slide image

22

Slide image

23

Slide image

24

Multiple Choice

Can information from devices, such as Amazon's Alexa or Echo be used in a court of law?

1

Yes, several cases have used this type of digital evidence

2

No, it violates privacy laws

3

No, there is no way to retrieve that information

25

Slide image

26

Slide image

27

Multiple Choice

Locard's Exchange Principle says that when objects come in contact there is a transfer of material. Is this true in the world of digital forensics? Are digital traces left behind as a result of an individual's use of information and communication technology?

1

Yes

2

No

28

Multiple Choice

Digital footprints are the data left behind by users that reveal information abou them like age, gender, race, ethnicity, nationality, thoughts, opinions, medical history, employment, and more. There are two types of digital footprints, active and passive. Which one is data that is unintentionally left behind by the user, like internet browsing history.

1

active digital footprint

2

passive digital footprint

29

Multiple Choice

Digital footprints are the data left behind by users that reveal information abou them like age, gender, race, ethnicity, nationality, thoughts, opinions, medical history, employment, and more. There are two types of digital footprints, active and passive. Which one is data that is provided by the user, like your facebook profile.

1

active digital footprint

2

passive digital footprint

30

Slide image

31

Slide image

32

Multiple Choice

Is it possible for IP addresses to be randomly generated in some attacks?

1

Yes

2

No

33

Multiple Choice

Is it possible for someone to clone your email and emails be sent to others looking like they came from you?

1

Yes

2

No

34

Slide image

Forensics CyberCrimes Part 3

Slide image

Show answer

Auto Play

Slide 1 / 34

SLIDE