Cyber Security Chapter 7-11 flash cards
Cell phone providers are by law required to enable GPS tracking on at least ________ of devices in their network
95%
Two of the most popular forms of cryptocurrency are bitcoins and dogecoins
False
According to the text, censorship is mainly used by ______ governments, which have come into power by dint of monarchy, family dynasty, coup d'etat, rigged election, or some combination thereof
authoritarian
On the darknet, prices are listed in ______ and are shipped to remote addresses or P.O boxes
bitcoins
Which of the following types of cryptocurrency claims to improve on bitcoins by offering n enhanced level of security
dash
Protection against unwarranted search and seizure is a constitutional protection given by the ______
fourth amendment
Which of the following was NOT identified as an entity that must collaborate and cooperate in order to enhance cyberterrorism deterrence
hackers
The human brain thinks of life in a
linear fashion
According to the text, one of the latest trends is data _________
mining and brokerage
The conceptual framework that encompasses the definition of cyberterrorism includes all of the following elements except ________
results
Examining trends that are necessary for crime to occur is an element of
routine activity theory
Surface websites use ______ to browse the web in a systematic and automated manner
Crawlers
A new prank that is not only draining law enforcement resources but also creating very dangerous situations for citizens is known as __________
swatting
According to the text, which of the following entities contributes to the misunderstanding of what constitutes cyberterrorism
the media
The __________ is primarily responsible for the protection of civilian computers
Department of Homeland Security
Undocumented, non-malicious, surprises installed on a program by the creator are referred to as _________
Easter eggs
A holistic approach integrates all of the following factors except
Environmental
E-mail spoofing is the least common type of spoofing
Fakse
A cyber cell is defined as an incident, or an attempt to cause an incident, that if successful would deny access to or degrade, disrupt, or destruct such a system or network
False
Cybercrimes operate in a virtual environment, with undefined and specific jurisdictions
False
Cyberspace and cybersecurity are confined within national borders.
False
Google and Twitter are among the biggest data collection agencies
False
Recovery involves efforts to identify threats, determine vulnerabilities, and identify required resources.
False
Spoofing cannot be used to manipulate the stock market.
False
Surface webs make up a small part of the massive deep web and is where the majority of criminal activities on the deep web occur
False
The holistic approach emphasizes that technology and policies can effectively address the myriad of cyberthreats.
False
The idea that people learn to behave in certain ways based on imitating the behavior of those they are close to applies to only conventional behaviors
False
Using social media to recruit supporters has resulted in zero terror attacks in the United States and in the international community
False
When location services are turned on, cell phones are constantly sending signals of location and attach so called "metrotags" to all pictures
False
With increased digitalization of our personal info., the integrity of our data is at low risk
False
public-private partnerships are not necessary for the cybersecurity of our nation
False
In 2016, the European Union passed the _______ establishing the first actual cybersecurity rules
NIS directive
The ________ enables the secretary of homeland security to conduct cybersecurity activities that will defend, mitigate, respond to, or recover from cyber incidents to critical infrastructure
National Cybersecurity and Critical Infrastructure Protection Act of 2014
Although multiple agencies play a role in our nation's cybersecurity, leading the way is the ____________
National Security Agency
Telephonic activities were defined much broader than most people would have expected by the ________
National Security Agency
The ___________ is primarily responsible for intelligence interception and interpretation/decryption
National Security Agency
The terrorist organization Boko Haram, also known as Jama'atu Ahlis Sunna Lidda'awati wal-Jihad, is from _______
Nigeria
The electrical grid is a significant target because it isn't just a U.S. infrastructure. It is also known as the
North American grid
According to the text, it's extremely difficult to do which of the following?
all of these
The IoT are network-connected devices and sensors such as ________
all of these
This difference in _________convictions greatly hampers the development of universal enforcement rules.
all of these
Which of the following companies have fallen victim to cybercriminals in recent years
all of these
Two of the most popular forms of cryptocurrency are ____
bitcoin and dash
In 2016 a massive DOS attack brought down much of the Internet in Europe and the United States. The attack used a _______
botnet
The conceptual framework that encompasses the definition of cyberterrorism includes all of the following elements under target except?
civilian homes
Jeopardizing the security, integrity, confidentiality, or availability of an information system or network or any information stored on, processed on, or transiting such a system is also referred to as a ____________
cyber incident
According to the text, the domain is ________
cyberspace
Asserting that criminal behavior is learned via intimate personal groups is a premise for _________
differential association theory
The forgery of an e-mail header pretending to be a legitimate sender like a business or friend scamming the receiver into opening the e-mail and downloading malicious software or responding to a solicitation is an example of _________
e-mail spoofing
All of the following are components of the impact element except?
economic gain
All of the following countries are on the list of most censored countries in the world except _________
Turkey
Boko Haram has become more active on social media since 2015 when it established a/an _________ account
The __________ prohibited the bulk collection of digital information
US Freedom Act
The ______________ gives government the authority to collect content records related to telephonic activities
USA PATRIOT Act
Which of the following was suggested as a way to avoid becoming a money mule
Utilizing fraud protection companies, such as PayPal
Which of the following was not identified as one of the components of the motivation element
economical
Which of the following critical infrastructures was NOT a focus of the NIS directive
education
Which of the following cyberterror attack targets was NOT identified by the National Association of Regulatory Utility Commissioners?
education
Which of the following was NOT identified as sectors of critical infrastructure?
education sector
Which of the following is not considered one of the responsibilities of the Department of Homeland Security?
ensure a fast, safe, and effective transportation system
In 2010, the Dodd-Frank Act made spoofing a(n) ________, but it has been difficult to prosecute spoofers
felony crime
Which of the following was identified as a sector of critical infrastructures
financial services sector
Europe and the U.S. government also engage in censorship, mainly targeting
hate speech
Assessing critical assets that need to be protected, such as trade secrets to determine what receives the highest priority, is a component of
identifying sensitive information
A holistic approach to cybersecurity involves cooperation between all of the following except
industries, lawmakers, and cybersecurity specialists
Which of the following is not a factor that leads to the deployment of SWAT officers
likelihood of surrender by the criminal
The first responders to most catastrophic events are usually at the _______ level
local
In ______ scams, criminals intercept e-mails between two businesses or a private person and a business and direct the purchasing party to send the payment for the product to a new bank account
man-in-the-midddle
Solving complex mathematical puzzles every 10 minutes is a task usually seen with ________
mining
People who are desperately looking for a job or are looking for a "work from home" job for a variety of reasons are referred to as
money mules
According to the routine activities theory, crime is more likely to occur if there is _________
predetermined location
Efforts to identify threats, determine vulnerabilities, and identify required resources is known as
preparedness
The Cybersecurity Information Sharing Act of 2015 calls for the cooperation of all of the following except the ___________
president
In conjunction with local and tribal agencies, the Department of Homeland Security works to do all of the following except ________
prevent threat warnings from becoming public knowledge
Entities that have resources to put toward security may not be subjected to the scrutiny and restrictions are usually in the
private sector
Examples of proprietary information include all of the following except
public records
Helping people and the community return to normal, if possible, is a part of ______
recovery
The __________ provided the basis for a comprehensive cyber security strategy
Comprehensive National Cybersecurity Initiative
Outsiders in the hacker subculture who do not have the skills and use prewritten programs are referred to as _________
script kiddies
The _____________ has the responsibility to coordinate federal, state, and local governments, laboratories, critical infrastructure owners and operators, and other entities to accomplish goals pertinent to the National Cybersecurity and Critical Infrastructure Protection Act of 2014
secretary of state
The uncontrollable nature of _______ poses great challenges to coordinating effective federal and state law enforcement responses to cyberattacks and terrorist acts.
social media
E-mail spoofing is used for which of the following campaigns?
spam and phishing
Which of the following cyber terror attack targets was NOT identified by the National Association of Regulatory Utility Commissioners
sports arenas
Dash eliminates this security issue by implementing a two-tier security network
True
Due to the simple nature of cyberspace and geopolitical relations, there is international cybersecurity law similar to that of the criminal law in the United States
True
Every nation-state is a sovereign entity; that is, only law enforcement in that nation has the right to enforce the laws
True
In order to access the deep web, special considerations are needed, including private URL addresses or, for some areas, specialized software.
True
In order to examine the threat aspect of risk assessment, it should be understood that risk can come from two sources: natural disasters and man-made disasters.
True
One main element of that terrorism tactic is to create fear in a population
True
One of the latest trends is data mining and data brokerage
True
One such tool used to mainpulate data and people is censorship
True
Taking a computer or device hostage until the owner pays a ransom is referred to as ransomware
True
The U.S. Foreign Intelligence Surveillance Court is a secret court
True
The government of Japan forced Google to reshoot street-level view because the images were enabling viewers to look inside the houses
True
The holistic approach emphasizes that neither technology nor policies in themselves can effectively address the myriad of cyberthreats.
True
The main purpose of national cybersecurity policies is to develop a comprehensive strategy to prevent and mitigate cyberattacks
True
The role of local-level agencies in cybersecurity is constantly evolving
True
The term terrorism refers to a tactic
True
Sites on the ToR network end in _____, but if you were to type the web address into Google, the website would not be found.
.onion
According to Moore's law, the growth in the information technology is exponential, such as ___________
1, 2, 4, 8, 16, 32,
On average, Google accesses _______ percent of the surface web
16
Which of the following differential association theory points was not proposed by Edwin Sutherland?
Behavior is learned the best in larger social groups
The _________ proved to be symbolic legislation that assures the public that the international community is taking steps to combat cybercrime and the threat of a cyberwar
Budapest Convention on Cybersecurity
________ may use ToR for competitions, keeping strategies secret, and internal acccountability
Businesses
In the 1970s, Gordon Moore showed how _______ doubled every two years
Central processing Units
The country with the best known and most discussed censorship is
China
The ________ creates a cybersecurity information sharing system for public and private entities
Cybersecurity Information Sharing Act of 2015
The _______ requires the secretary of homeland security to assess the work of the cybersecurity workforce of the Department of Homeland Security and develop a comprehensive strategy to improve the readiness and quality of the cybersecurity workforce
Cybersecurity Workforce Act 2014
An intentional act, committed via computer or communication system and motivated by political, religious or ideological objectives, against information, data, or computer systems/programs, intended to cause severe harm, death, or destruction to civilians, is referred to as?
Cyberterrorism
A radio frequency transmitter that blocks the communication between cell phones and text messages is referred to as a _________
GPS jammer
Which of the following was identified as one of the main tools used by criminals?
GPS jammer
_______ is known as one of the largest data collectors
The most recent era of local-level policing is known as the _________
Homeland Security Era
Some people have suggested applying the _______ to cybercrimes because they are similar in that there is often no clear jurisdiction
Law of the Sea
Which of the following was NOT identified in the text as an example of a research tool and database located on the deep web?
LexisNexis
A health tracker is an example of a device that can be used in the _______ technique
Main-in-the-IoT
Which of the following sites was not identified as being one of the popular alternatives in the darknet?
Milky Way
The surface web, which is available via regular search engines, is hosted by all of the following browsers except __________
Onion Router
_________ was originally developed by U.S Naval Research Laboratory as a method of anonymous communication
Onion Router (ToR)
On November 6, 2014, law enforcement collaborating together and coordinated via Europol took down multiple darknet drug marketplaces, including Silk Road 2.0, in an operation referred to as _________
Operation Onymous
Which of the following was identified as a tool of attack in the conceptual framework of defining cyberterrorism
Psychological operation
_________ has become one of the most feared threats to cybersecurity
Ransomware
A technology that detects the current geolocation of a target, which may be anything from a vehicle to an item in a manufacturing plant to a person, is referred to as ________
Real Time Location Services
Edward Snowden, who released classified information about the U.S. government, found asylum in ________ which has declined to extradite Snowden
Russia
Which of the following is NOT considered a portal of the darknet?
Safari
A malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver is referred to as _________
Spoofing
Systems utilized by many of the nation's critical infrastructures to provide automated control of the functions of the infrastructure are referred to as ___________
Supervisory control and data acquisition systems
Which of the following was not identified as a warning sign of money mule schemse
The position has a specific job description
A network within a network that is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs is referred to as an anonymous overlay network
True
Attribution is a problem that governments across the globe face when such attacks occur
True
Authoritarian governments are not the only ones that manipulate the facts and block websites
True
Criminals can use GPS spoofing as a tool by creating false GPS signals. This is possible because the real GPS signals are very weak because satellites are far away
True
The role of ________ hackers in the collaborator effort of cybersecurity is vital
White hat
The most famous use of the Internet by Boko Haram was in utilizing which of the following to show the coverage of the kidnapping of the Chibok?
YouTube
Hacker subcultures may consist of various identifying factors. Which of the following is NOT likely to be one of those factors
a dislike for information technology
Cyberterror attacks my be conducted in a variety of ways, including?
creating hardware to prevent intrusions
Existing only in the digital arena, ________ is/are the only way that purchases on the deep web can be made in anonymity
cryptocurrency
Albert K. Cohen's subculture theory propositions are based on ________
delinquent boys
According to the text, some of the most popular products advertised on the hidden wiki are _________
drugs
Which of the following groups was not highlighted in this chapter
People's Liberation Army
______ is often refered to as a peer-to-peer platform for censorship-resistant communication and publishing.
Freenet
The deep web, which is not accessible through traditional search engines, is sometimes referred to as the ________
deep net
According to the text, the surface web only accounts for about ______ percent of all the internet
4
The surface web is often compared to the tip of the iceberg of the internet, as the deep web is _________ bigger than the surface web.
400-500
One of the oldest and largest hacker conventions is known as
DEFCON
Activists may utilize ToR to protect communications, investigations, and intelligence
False
An individual who doesn't have the skills to hack on his or her own so uses prewritten programs to do so is referred to as a dumpster diver
False
As law enforcement is attempting to infiltrate darknet websites, the group Anonymous is working to restore darknet sites that have been taken down.
False
Google, Facebook, and any website you can find via traditional search engines are all located on the darknet
False
There is a universal definition of terrorism in the US and in the international community
False
There is no concern that cyberterrorists will use the electrical grid system to attack critical infrastructure, as they do not have the means to do so.
False
The leading agency for investigating cyberattacks by criminals, overseas adversaries, and terrorists is known as the _______
Federal Bureau of Investigation
Which of the following constitutional Amendments established the right to freedom of speech
First
The Islamic State is also referred to as all of the following except?
Islamic Electronic Army
Heightened inspections, improved surveillance, public health/agriculture testing, immunizations, and law enforcement operations to deter/disrupt illegal activity and apprehend perpetrators are ways to ______
Mitigate
______ may use ToR to protect sources, resources, and report from areas where it is dangerous
People with malicious intent
According to the differential association theory, criminal behavior is acquired through interactions with other persons via communication
True
According to the routine activities theory, guardianship plays a major role in the prevalence of crime
True
Al-Qaeda has been known to recruit individuals with information technology or computer backgrounds.
True
Barry Colin, while working as a research analyst at Palo Alto's Institute for Security and Intelligence in the 1980s, first coined the term cyberterrorism
True
Cyberspace is a place in which computers function and data moves
True
The U.S. government should cooperate not only with national jurisdiction of law enforcement at all levels but the international community and private sector organizations as well
True
The hidden WIKI is a popular way to search the darknets. It acts as a search engine for illicit goods, products, and services
True
There are two main forms of darknets: peer-to-peer nets and large anonymous networks
True
Traditional crimes occur in a specific location/jurisdiction(s) and are thus subjected to the rule of law of that specific jurisdiction
True
Within criminal justice and criminology, subcultures may include the prison subculture, the criminal subculture, the courtroom working group, etc.
True
The Darknet Silk Road runs like a black market ________ site for drugs, drug paraphernalia, and other goods and services.
eBay-type
According to the text, the United States ranks _____ in pro-IS tweets.
fourth
An ethnic, regional, economic, or social group exhibiting characteristic patterns of behavior sufficient to distinguish it from others within an embracing culture or society is referred to as __________
subculture
According to the text, low socioeconomic status is a predominate marker for engaging in crime in _______
subculture theory
According to the conceptual framework of cyberterrorism, the method of action is _______
unlawful means
According to the text, three aspects must be taken into account to determine risk: the threat, the asset, and the _______
vulnerability
Maneuvering around, trying to access unprotected WiFi networks, is referred to as ____________
wardriving
According to the text, deep web sites can include all of the following except
websites that are searchable
In the 1950s and 60s, subculture theories began to examine the prevalence of ______
youth gangs