Cyber Security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is true about the Internet of Things? I. The Internet of Things is the network of devices with the ability to connect and exchange data. II. The Internet of Things increases our vulnerability to cyber attacks. III. The Internet of Things is purely positive-there are no negative consequences to increased connectivity

1 and 2

How many cities does the FBI have offices in?

56 cities

Cynthia is working on her college applications online, when the admissions website crashes. She is unable to turn in her college application on time. What part of the CIA Triad has been broken?

Availability has been broken because the website crashing prevents her from submitting her application form.

Which kind of personal information (PII) do people send over the internet? - Credit Card Numbers - Contact Information - Medical Information

All of the above. A lot of personal information is sent over the internet.

Which of the following devices is not connected to the Internet of Things? - An AM/FM radio without any bluetooth or Internet connection capabilities - A wearable device that measures your physical activity and allows you to track your activity through a mobile app - A smart thermostat that allows you to remotely control your home's temperature through a mobile app - A digital baby monitor that allows you to stream video and audio of your nursery from the Internet

An AM/FM radio without any bluetooth or Internet connection capabilities.

What are the risks associated with interconnectivity?

An increased interconnectivity can bring about numerous risks because it becomes easier for hackers to gain access to personal data and breach it just as easily.

How do we benefit from this increased interconnectivity?

An increased interconnectivity means that more ordinary objects are being connected to the internet, making life a lot more efficient as the objects do most of the work.

In cybersecurity, what does CIA stand for? - Confidentiality, Integrity, Availability - Central Intelligence Agency - Cybersecurity Investigation Agency - Cybersecurity, Internet, Accessibility

Confidentiality, Integrity, Availability

Explain each aspect of the CIA Triad.

Confidentiality: Is the protection of information from people who are not authorized. Confidentiality has to do with keeping an organization's data private. Once broken, unauthorized people can see personal information. Integrity: ensures that information cannot be altered by unauthorized. Once broken, an unauthorized person has the ability to alter personal information. Availability: that authorized users have access to information when they need it. Once broken, the person no longer has access to information they need.

What information do cyber criminals steal?

Cyber Criminals steal data and personal information of people who have inputted specific information onto a database.

Which of the following is not true about cybersecurity: - Recent data breaches have released personal information of hundreds of millions of people. - Cyber attacks can devastate large organizations, but individuals are largely unaffected. - Cybersecurity is the protection of computer systems, networks, and data from digital attacks. - As we rely more on computing devices to store and send data, we increase our vulnerability to cyber attacks.

Cyber attacks can devastate large organizations, but individuals are largely unaffected. This statement is not true because individuals and small businesses need to take necessary precautions to protect their data as well.

True/False: Learning computer science or coding is only useful if you want to become a professional programmer.

False. Programming and computer science has many applications outside of being a professional programmer.

What is the best way to avoid phishing attempts?

It is to be aware and be able to recognize fake emails.

Alice is buying books from an online retail site, and she finds that she is able to change the price of a book from $19.99 to $1.99. Which part of the CIA triad has been broken?

Integrity because the information is being changed so it cannot be trusted and therefore does not have integrity.

Tony gets his phone bill in the mail. The bill was supposed to be for $80, but the mail person spilled water on the bill, smearing the ink. The bill now asks for $8. What part of the CIA Triad has been broken.

Integrity because the water spilled onto it changing the 80 to an 8 which means that something has been changed.

In September of 2017, Equifax announced a data breach that exposed the personal information of 147 million people. How did this exposure breach the CIA Triad? Explain.

It affected the Confidentiality aspect. This is because millions of people were able to view personal information.

What is Malware?

Malware is software intended to damage a computing system or to take partial control over its operation.

How do we protect ourselves from attacks like WannaCry?

People can protect themselves by downloading they computer's latest software update. This mostly goes for Microsoft Windows users.

An email phishing attack results in ransomware, in which the files and folders on a computer are encrypted. What type of breach is ransomware? Explain.

Ransomware is the breach of Availability. This is because

What is Spear-phishing?

Spear-phishing is when the email is sent to a specific individual to try to trick that one person.

Downloading what appears to be a legitimate app, a user installs malware which contains keylogging software. What type of breach is the downloading of malware? Explain.

The downloading of malware is the breach of Confidentiality. This is because key logging software allows the hacker to view personal information.

What is the motivation for creating an Internet of Things by embedding computing devices in everyday objects?

The motivation is to make life easier and effective. It is also to make life smarter and "safer".

What is the WannaCry Ransomware attack?

The ransom attack by WannaCry was when hackers encrypted computers around the globe. They asked for hundreds of dollars worth of bitcoin.

Which of the following is true about jobs in the field of cybersecurity? There are a lot of unfilled positions in cybersecurity right now, but in the next few years all of those positions will be filled. Right now there aren't many unfilled cybersecurity positions, but there will be more in the next couple of years. There are many unfilled cybersecurity positions right now, and there will be even more unfilled positions in the next couple of years. There are too many qualified cybersecurity professionals. There are no unfilled positions now, and there won't be any unfilled positions in the next few years.

There are many unfilled cybersecurity positions right now, and there will be even more unfilled positions in the next couple of years.

What is one reason the article gives for the FBI including cybersecurity in its responsibilities?

They feel that it is their job to protect people online and maintain their privacy.

What do Cyber Criminals do with stolen information?

They sell the personal information of thousands of people on places like the dark web.


संबंधित स्टडी सेट्स

Visual Studio Code Keyboard Shortcuts

View Set

Flocabulary- Types of Government

View Set

(Chem 2) Quiz 1: Chapter 9 (Chemical Bonding: The Lewis Model)

View Set

Chapter 9 Production and Operation Management

View Set

opl 3 (the last quizlet i will ever make)

View Set

IM5 Assessment and Intervention Practice Questions

View Set