Cyber Terrorism Quiz 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

Terrorist groups use cyber technology and the internet as a means of funding their activities. Which of the following is not one of the ways terrorist groups use cyber technology to raise funds?

Advertising

Cyber technology has played a critical role in the emergence of networked terrorist groups. Which of the following are some of the ways cyber technology has enhanced the capabilities of these terrorist groups?

All the above

The information infrastructure is composed of which of the following components?

All the above

Which of the following involve digital crime and digital terrorism?

All the above

A distributed denial of service attack involves which of the following?

An attempt by a cyber attacker to prevent legitimate usage of service

Which of the following is not one of the categories of attacks that encompass cyberterrorism and/or information warfare?

Component thefts

Which of the following is not an example of an information attack?

Fake news dissemination

A drawback to information warfare is that it is limited to only those things that can be done with computers and information passed over the internet. Information warfare is only effective in cyber space.

False

A virus is a program that reproduces itself over a computer network by breaking into computers much like a virtual hacker. A virus does not need the assistance of an unwitting computer user to be unleashed. A worm is a piece of code that attaches itself to other instructions within a computer and when a user takes an action to make these host instructions run the worm starts to run as well.

False

Crimes where the computer itself is the target include theft of services, fraud, and exploitation.

False

Cyber technology has also facilitated the activities of terrorist groups through data hiding and cryptography. Data hiding is a method used to secure and protect information from unwanted eyes or unauthorized use; while cryptography includes an assortment of methods that can conceal the fact that message even exists at all.

False

Cybercrime can loosely be defined as activity designed to protest or otherwise emphasize a particular belief or political viewpoint without intentional harm to human life.

False

Data alteration and denial of services directly target the computer by attacking the useful information stored or processed by the computer. Although an employee of the affected company may alter critical data, the most common source of such damage is malicious network intruders.

False

Denial of service attacks have not often been used by terrorist groups and others conducting information warfare. Additionally, unauthorized intrusions are not seen as serious threats to critical infrastructure and computer networking systems.

False

Many experts believe the true level of computer crime is accurately reported, because companies desire to project an image of transparency and diligence to the public.

False

Several studies have settled the ongoing debate that organizational "insiders" pose a larger threat and danger to potential victims than "outsiders". These studies have concluded insiders pose the greatest danger to computer security.

False

The dynamics and processes involved in the production of digital crime are distinctly different and significantly more dangerous than the dynamics and processes of digital terrorism. As a result, digital crime poses a much graver threat than digital terrorism.

False

Unauthorized intrusions involve instances wherein attackers break and enter into a facility or premises in order to obtain information and other valuable assets without the authorization of the proprietor of that information or asset.

False

Several trends have driven the increase in cybervictimization. Which of the following is not among those trends?

Individuals being exposed to computers and developing skills at a younger age

Using the computer as an instrument of a crime means the computer is used to gain some other criminal objective. Which of the following would not be considered one of those other criminal objectives?

Notoriety

Which of the following is not a crime associated with the prevalence of computers?

Perjury

The category of the computer as incidental to a crime involves using a computer simply to make other criminal transactions easier and more efficient. Which of the following would not be a criminal transaction that is made easier and more efficient through the use of computer?

Robbery

Which of the following has not been identified as one of the areas of infrastructure within the United States which constitutes a virtual national life support system?

Sports and theater

Several components make up information warfare. Which of the following is not one of those components?

Tactical planning

The United States is at a particular risk for cyberattacks, whether related to information warfare or cyberterrorism. Which of the following factors is not among those that place the United States at high risk?

The United States is viewed as a leader in the entertainment industry, with significant sums of money at its disposal

Which of the following is not one of categories of computer crimes?

The computer as an impediment to the commission of the crime

Computers are currently used to perform many traditional criminal acts, most prominently the production and distribution of child pornography, financial crimes, information and corporate espionage, stalking, and identity theft.

True

Computers are used incidental to criminal enterprises/businesses for many of the same reasons they appeal to legitimate enterprises/business. Such reasons include computers are quick, reliable, very accurate, and perform many business related tasks far faster than if done manually.

True

Cyber technology plays an important role in facilitating the propaganda and recruitment of terrorist organizations. The fact that the internet remains largely unregulated makes it the perfect tool for propaganda, promotion, and mobilization by terrorist groups.

True

Efforts to determine the costs of cybercrimes have resulted in estimates that vary considerably because of the difficulties with calculating these costs across different categories of crimes. The broad range of estimates show that not only is it difficult to identify and document these crimes, it is even more difficult to place a monetary value on the loss of intellectual property wherein the actual value may not be known for months or years.

True

Information attacks are focused on destroying or altering content within a system. While information is corrupted and temporarily lost during these attacks, physical and virtual systems are still preserved. Information attacks can major economic damage and loss.

True

Information warfare has generally been defined as the gathering or using of information to gain an advantage over another party. A more specific definition of information warfare includes those actions intended to protect, exploit, corrupt, deny, or destroy information or information resources in order to achieve a significant advantage, objective, or victory over an adversary.

True

Terrorism is defined as the actual or threatened use of violence by an individual or group motivated by ideological or political objectives. Cyberterrorism is specifically a premeditated, politically, or ideologically motivated attack or threat of attack against information, computer systems, computer programs and data that can result in violence against civilian targets.

True

The greatest threat posed by a potential cyberattack occurs when the cyberattack is executed in conjunction with a conventional terrorist attack. Cyberattacks can be used as a force multiplier with a conventional attack, in that a cyberattack can significantly compound and enhance the impact of a conventional terrorist attack.

True

Viruses and worms are part of a much larger group of cyber programs known as malicious software (malware). Malicious software includes any program or script that attempts to disrupt normal computer operations, steal private data, or illegally enter a private computer or computer system.

True

While few Americans have considered a situation involving a cyberattack on United States' infrastructure, in reality cyberattacks against American businesses and governments are common place, with an estimated 100 million attempts each day.

True


Conjuntos de estudio relacionados

Uworld - P/S - Sensation, Perception, & Consciousness

View Set

Parts of A Sentence: Clauses, Phrases and Sentences

View Set

California Hunter Safety - Unit 9 Quiz

View Set

Cognitive Psych Quiz 2: Chapter 4

View Set

Quiz 8: Visual Communication, Film/Video, and Digital Art

View Set