Intro to CyberSecurity

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What differs cyber terrorism from other computer crimes?

It is organized.

An Advanced Persistent Threat (APT) can best be described as which of the following?

A highly organized, continuous process of computer hacking, often orchestrated by a nation-state or highly-sophisticated criminal entity for the purpose of targeting a specific type of information or person for exploitation

According to Nye's "Cyber Power" article, which of the following is not a reason that smaller actors have more capacity to exercise hard and soft power in cyberspace than in many more traditional domains of world politics?

Access to a highly trained technological workforce

What is the most likely damage from an act of cyberterrorism?

Economic loss

What is one of the primary benefits of a defense-in-depth strategy?

Even if a single control (such as a firewall or IPS) fails, other controls can still protect your environment and assets.

China and Russia would argue that the Westphalian system of state sovereignty allows for information on the World Wide Web to flow unimpeded into their countries.

False

Cyber crime and cyber terrorism are mutually exclusive activities.

False

Russia's desire for land and concept of the "Near abroad" was mostly a result of its greedy, insatiable leaders.

False

The Energy Sector is uniquely critical because:

It provides an "enabling function" across all critical infrastructure sectors.

List the nation-states considered among the most formidable adversaries of the U.S.

Russia China Iran North Korea

A recommended principle in security design is:

Simplicity

What is malware?

Software that has some malicious purpose

What is a SCADA system?

Supervisory Control and Data Acquisition

What is TOR and who uses it?

TOR is also known as an Onion Router is a network that optimizes privacy on the internet and allows for unrestricted access, It's used by privacy advocates but also by criminals and terrorists.

Which of the following is NOT an example of a SCADA system?

The internet

Which of the following is a likely use of Internet newsgroups in information warfare?

To spread propaganda

Technology can facilitate cyber terrorism by providing such tools as encryption, steganography, fundraising, recruitment, and training.

True

The Russians used propaganda to influence the 2016 election.

True

Think like an adversary means

put yourself in the mind of an attacker to anticipate and understand potential attacks


Ensembles d'études connexes

Nervous System Basic Structure and function

View Set

SAP S/4HANA - Scope and Business Processes

View Set

exam 2: ch. 9 international business

View Set

Programming 2 Chapter 7, 8, and 9

View Set

PSYCH 100 - Module 49 -- Mood disorders

View Set