Intro to CyberSecurity
What differs cyber terrorism from other computer crimes?
It is organized.
An Advanced Persistent Threat (APT) can best be described as which of the following?
A highly organized, continuous process of computer hacking, often orchestrated by a nation-state or highly-sophisticated criminal entity for the purpose of targeting a specific type of information or person for exploitation
According to Nye's "Cyber Power" article, which of the following is not a reason that smaller actors have more capacity to exercise hard and soft power in cyberspace than in many more traditional domains of world politics?
Access to a highly trained technological workforce
What is the most likely damage from an act of cyberterrorism?
Economic loss
What is one of the primary benefits of a defense-in-depth strategy?
Even if a single control (such as a firewall or IPS) fails, other controls can still protect your environment and assets.
China and Russia would argue that the Westphalian system of state sovereignty allows for information on the World Wide Web to flow unimpeded into their countries.
False
Cyber crime and cyber terrorism are mutually exclusive activities.
False
Russia's desire for land and concept of the "Near abroad" was mostly a result of its greedy, insatiable leaders.
False
The Energy Sector is uniquely critical because:
It provides an "enabling function" across all critical infrastructure sectors.
List the nation-states considered among the most formidable adversaries of the U.S.
Russia China Iran North Korea
A recommended principle in security design is:
Simplicity
What is malware?
Software that has some malicious purpose
What is a SCADA system?
Supervisory Control and Data Acquisition
What is TOR and who uses it?
TOR is also known as an Onion Router is a network that optimizes privacy on the internet and allows for unrestricted access, It's used by privacy advocates but also by criminals and terrorists.
Which of the following is NOT an example of a SCADA system?
The internet
Which of the following is a likely use of Internet newsgroups in information warfare?
To spread propaganda
Technology can facilitate cyber terrorism by providing such tools as encryption, steganography, fundraising, recruitment, and training.
True
The Russians used propaganda to influence the 2016 election.
True
Think like an adversary means
put yourself in the mind of an attacker to anticipate and understand potential attacks