HSEP 101 Final Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

American computer professional, former Central Intelligence Agency (CIA) employee, and former contractor for the United States government, who copied and leaked classified information from the National Security Agency (NSA) in 2013 without prior authorization

Edward J. Snowden

1997, Team of computer experts from NSA hacked and had access to DOD files, power grids and even 911 communication systems. Showed how badly unprepared we would be for cyber war.

Eligible Receiver

Chertoff said FEMA needs to learn from the military and private companies that were able to keep communication lines open. DHS is setting up _________ that will be deployed to catastrophes to provide up-to-the-minute reports to federal planners, who can then send the appropriate resources.

Emergency Reconnaissance teams

For countering terrorism, the dominant agency under the Department of Justice is the _________________.

FBI

For many years the attorney general could authorize surveillance of foreign powers and agents of foreign powers without any court review, but in 1978 Congress passed the __________________ which provided for court oversight of foreign surveillance.

Foreign Intelligence Surveillance Act

The USA PATRIOT Act significantly expanded law enforcement's investigative powers under the ____________________________________ which had been enacted in response to the inappropriate use of wiretaps by the administration of President Richard Nixon.

Foreign Intelligence Surveillance Act of 1978 (FISA)

To promote information-sharing, in 2014, the Justice Department reactivated its Domestic Terrorism Executive Committee. In an effort to counter sovereign- citizen violence, DHS established 78 state, regional and municipal __________which collect and share intelligence from state and local law enforcement.

Fusion Centers

Who told the 9/11 Commission that, "the system was blinking red", because the FAA warned airlines about an increased threat in hijackings, but the warning focuses on overseas threats.

George Tenet

What grant program provides funding for eligible mitigation activities that reduce disaster losses and protect life and property from future disaster damages?

Hazard Mitigation Assistance Grant

According to The 911 Commission Report; the three priority targets decided upon in a Defense Department paper for the Camp David briefing book on the strategic concept for the war on terrorism included all of the following EXCEPT?

Hezbolla

Which 2003 directive by President George W. Bush sought to institutionalize procedures for securing coordinated incident response protocols?

Homeland Security Presidential Directive (HSPD)-5

Beginning on September 11, ______________ agents working in cooperation with the FBI began arresting individuals for immigration violations whom they encountered while following up leads in the FBI's investigations of the 9/11 attacks.

Immigration and Naturalization Service

a leading industry trade group for information technology companies. The Association's membership contained most of the world's major Information and communications technology (ICT) firms, accounting for over 90% of ICT goods and services sold in North America

Information Technology Association of America

To seize control of the Katrina mission, President Bush would have had to invoke the ________, which allows federal troops to suppress a rebellion and enforce federal laws. Bush's father invoked the law in 1992 during riots in south-central Los Angeles following the acquittal of police officers charged in the beating of Rodney King.

Insurrection Act

According to the 911 Commission Report; there is strong evidence that this country facilitated the transit of Al Qaeda members into and out of Afghanistan before 9/11.

Iran

secret arrangement in the 1980s to provide funds to the Nicaraguan contra rebels from profits gained by selling arms to Iran

Iran-Contra Affair

current Director of National Intelligence (DNI)

James Clapper

Japanese Americans imprisoned due to fear of Japanese invasion shortly after pearl harbor

Japanese Internment

By far the most expensive disaster in the nation's history, _________ is expected to cost at least three times more than the second-costliest U.S. disaster, the 1988 heat wave and drought.

Katrina

Claimed that communist had infiltrated Hollywood and even US government, people were put on trial and some sent to prison

McCarthyism

The insurance company attacks underline another trend: increased hacker interest in information related to _______, especially data that establishes health insurance coverage.

Medical Care

In 1952, Truman created the __________ within the Defense Department. A descendant of the "Black Chamber" of the 1920s, its job was to coordinate the military's signals intelligence operations. It was highly secretive and its existence wasn't officially acknowledged until 1975.

NSA

The application of technologies used by the _____________ such as PRISM and XKeyscore data-mining operations have been criticized by civil libertarians as overly broad and intrusive.

NSA

A day after the hurricane struck, the DHS declared Katrina an "incident of national significance," which under the new _________ should trigger a coordinated federal response.

National Response Plan

______________ mean little or nothing when it comes to cyber attacks and unlike a military attack, determining the source of an attack can be difficult.

National borders

__________ committed against the citizens or holdings of a state generally is not a violation of international law, but rather a violation of the domestic criminal laws of the victim state or the state where the terrorist act occurred. _____________ is a violation of international law that invokes the victimized state's right of self- defense.

Non state sponsored terrorism State sponsored terrorism

President Obama signed an executive order in February instructing the Department of Homeland Security to establish a ________ that would create voluntary standards for sharing information about cyber threats. The order allows participating businesses to receive classified government information.

Nonprofit organization

Leading industry when it comes to dealing with cyber security issues

North American Electric Reliability Council

Security experts warn that governments have moved into cyberspace to spy, steal business and disrupt corporate operations, as _______ is alleged to have done to Sony. China, Russia, Iran and North Korea regularly try to attack U.S. networks.

North Korea

The computer systems of Sony Pictures Entertainment were hacked in 2014. The FBI blamed ___________, though without conclusive evidence. President Obama imposed sanctions citing the country's "destructive, coercive cyber-related actions".

North Korea

The Intelligence Reform and Terrorism Prevention Act created the _______________.

ODNI

What did the Intelligence Reform and Terrorism Prevention Act create?

Office of the Director of National Intelligence.

What is the compendium of reports used to keep the president and other policy makers abreast of emerging intelligence concerns called?

Presidential Daily Briefing

The ______________ is an independent federal body established by Congress in 2004 to balance terrorism prevention with the protection of privacy and civil liberties. It conducted a review of the NSA surveillance program.

Privacy and Civil liberties oversight board

During the Depression, President Franklin D. Roosevelt initiated a more active federal role in disaster response. For instance, he authorized the ________, established by Hoover in 1932 to bolster the banking industry, to make reconstruction loans for public facilities damaged by earthquakes, and later, other disasters.

Reconstruction Finance Corporation

The _______ is the only relief organization chartered by Congress "to maintain a system of domestic and international disaster relief." In fact, the National Response Plan specifically calls on this organization to provide local relief. During Katrina, it provided hurricane survivors with nearly 3.42 million overnight stays in more than 1,000 shelters. And, in coordination with the Southern Baptist Convention, it served nearly 27 million hot meals to victims.

Red Cross

Following 9/11 UN resolution which requires member states to adopt strict regulations against terror and created the counter terrorism committee

Resolution 1376

What were some of the major provisions included in the USA PATRIOT Act?

Roving wiretaps, national search warrants, detention, bioterrorism, monitoring computers, intelligence sharing, money laundering, shell banks, sunset provisions

According to the 911 Commission Report; 12 of the 13 muscle hijackers (excluding Nawaf al Hazmi and Mihdhar) came from ____________________. (tophat)

Saudi Arabia

The prolonged crisis of 1979-1981, when 53 Americans were held hostage at the US embassy in Tehran, ended the ________________ leadership in counter terrorism.

State Department

A computer worm, it was used to attack Iran's nuclear enrichment centrifuges and was found to be a part of a U.S- Israeli operation

Stuxnet

First federal computer crime law, makes it a felony to enter computer systems operated by the gov. or federally insured financial institutions.

The Computer Fraud and Abuse Act

Where did President Bush address the nation after the 9/11 attacks?

The Oval Office

campaign against radicals and left wing orgs. Conducted by Mitchell Palmer and J. Edgar Hoover, was caused by the fear of the spread of communism into the US.

The Palmer Raids

According to The 911 Commission, what is the name of the main mechanism for communicating sensitive intelligence to the President?

The President's Daily Brief

a federation of 16 separate United States government agencies that work separately and together to conduct intelligence activities considered necessary for the conduct of foreign relations and national security of the United States

U.S Intelligence Community

"Give me an organization, and I can find ways to destroy it," he says. He would need only a couple of years for planning and reconnaissance with a small, trusted team and a couple of million dollars to destroy a system, he says. "It's easier to destroy something than create it," he adds. "The _________ is incredibly vulnerable and is getting more so with every passing day."

U.S infrastructure

Counter terrorism act passed in 2001, permits new forms of surveillance and indeterminate periods of imprisonment, without due process of law

USA PATRIOT Act

According to The 911 Commission Report, WTC response operations lacked the kind of integrated communications and _____________________ contemplated in Mayor Giuliani's update directive of July 2001.

Unified Command

Founded in 1945 following World War II, mission is to maintain international peace and security, promote human rights and help member states resolves political, cultural and economic problems

United Nations

The Oklahoma City bombing on April 19, 1995, raised questions about FEMA's role in responding to terrorist attacks. Debates raged among officials at FEMA and the Justice and Defense departments over who should be the first-responder — fire, police, emergency management or emergency medical services? Terrorism was part of FEMA's ___________ approach to emergency management, but it lacked the resources and technologies to address specific terrorism issues such as weapons of mass destruction.

all hazards

Many nations treat terrorism as a _______________, not a political one. Outlawing terrorism implies faith in the legal system, and anti terrorism legislation in democratic countries generally incorporates constitutional rights and judicial review.

criminal act

Government and private-sector computer and security experts agree America's _________ is at risk. Although, most analysts say cyberspace doesn't offer the opportunities terrorists thrive upon: dramatic events that invoke terror, such as suicide bombings and airplane crashes

cyber infrastructure

In 1995-1996, the Defense Department began to invest effort in planning how to handle the possibility of a domestic terrorist incident involving __________________.

cyber security

_________ is a top threat to U.S. security. Potential cyber threats may come from "profit-motivated criminals, ideologically motivated hackers or extremists" and "nation-states like Russia, China, North Korea and Iran". It is estimated that __________ costs the United States about $100 billion annually.

cyber security

The government is engaged in a tug-of-war with cell- phone makers, urging them not to build ____________________ into their devices because it hinders intelligence agencies from intercepting the communications of suspected terrorists.

encryption technology

What was Samuel Hunington's Clash of Civilizations theory?

greatest conflicts will be between the christian nations of the west and the Muslim nations of Africa and Asia

Stolen personal information for ______________ can be 10 to 20 times more valuable than credit card information. (tophat)

health insurance subscribers

The CIA Director is shaking up his agency, creating 10 ________ focusing on specific functional areas, such as economic security or weapons proliferation, and certain geographical areas — such as the Middle East or China — that present particularly complex political, strategic and economic concerns.

mission centers

What are the four steps that make up comprehensive emergency management?

mitigation, preparedness, response, recovery

According to the 911 Commission Report; a terrorist threat advisory distributed in late June 2001 indicated a high probability of _______________ terrorist attacks resulting in numerous casualties.

near-term spectacular

Experts generally agree that the private sector and the ________ are the weakest links in America's cyberinfrastructure. They are also the biggest links. The power industry was considered among the most likely targets, as well as one of the industries most in need of upgraded cybersecurity.

non-federal public sector

Counterterrorism activities within a nation's own borders operate in the context of each nation's laws and policies, history, politics, and culture. In democratic societies, "the _________ is guaranteed by the legitimacy legal norms enjoy from whom such norms apply, on one hand, and by the threat of enforcement from specialized agents of control, on the other".

rule of law

Even if the federal government is unwilling to regulate computer security in all of the private sector, some experts argue that, at a minimum, ___________ are needed for any industry deemed critical to the national infrastructure, as well as requirements that companies report all attacks or compliance with the standards.

security standards

Today, the CIA is conducting what some call _________ using armed drones to conduct strikes in countries with which the United States is not at war but where terrorists are active. Since 2004 the CIA has conducted at least ______ drone strikes in such places as Pakistan, Yemen and Somalia.

shadow wars 500

Following the 9/11 attacks, former President Bush signed an executive order allowing foreigners suspected of international terrorism to be tried in _________. These are formed under the power of the executive branch of government and are independent of the judicial branch.

special military tribunals

In addition to defense and communications systems, much of the nation's civilian infrastructure is hooked up to specialized computers that control other computers through ___________ systems.

supervisory control and data acquisition systems

Permanently blocking vehicular traffic on Pennsylvania Avenue in front of the White House because of the treat from high-yield vehicular bombs in the aftermath of the 1993 World Trade Center and 1995 Oklahoma City bombings is an example of __________________________.

target hardening

Nickname for first case of cyber warfare, conducted by West German hackers, hacked into civilian networks in U.S, Western Europe and Japan. Stole passwords and data, sold info to Soviets

the Cuckoo's Egg

The first major Internet virus, ______________, appeared in 1988. (tophat)

the Morris worm

According to the 911 Commission Report; Hazmi and Mihdhar were ill prepared for a mission in the United States. Their qualifications for this plot included all of the following EXCEPT?

the lack of imagination

During the 1950s, the Border Patrol participated in implementing a massive deportation policy aimed at rounding up and deporting ____________________.

undocumented Mexican immigrants

The ___________ said Congress must be kept "fully informed" of major intelligence activities, but successive administrations have interpreted this to mean disclosing information to only a few key members of Congress. This also created the CIA.

1947 National Security Act

In what year did the US Navy SEALS kill Osama Bin Laden?

2011

In 2005 some $180 million was allocated nationwide for state and local governments to fund emergency management, but it was in the form of _______ grants, which require local governments to supply a dollar for every federal dollar received.

50-50 matching

__________ of Americans say limits on government collection of telephone and Internet data are inadequate, according to a recent poll.

65%

The WTC consisted of ______________ buildings, including one hotel, spread across 16 acres of land. (tophat)

7

Some experts believe cyber intrusions actually occur even more often, because the host often is unaware of an attack, and many organizations are loath to report cyber attacks. The General Accounting Office (GAO) estimates that up to _____ of all computer security incidents may go unreported.

80%

Which 1996 law made some terrorist acts federal crimes punishable by death, thereby avoiding statute of limitation restrictions that apply to non-death penalty crimes?

Antiterrorism and Effective Death Penalty Act of 1996

The emergency response at the Pentagon represented a mix of local, state, and federal jurisdictions and was generally effective. Because of the nature of the event, a plane crash, fire and partial building collapse, the _________________ served as an incident manager.

Arlington County Fire Dept

Under President John F. Kennedy, the covert action program suffered a setback during the failed ________ invasion of Cuba in 1961. A force of Cuban expatriates trained and armed by the CIA invaded the island, aiming to remove communist leader Fidel Castro from power.

Bay of Pigs

Why do many organizations forgo reporting computer hackings to the police? (tophat)

Because they want to avoid negative publicity

U.S. government officials said that hackers working for the ______ government had tapped into computers at the Office of Personnel Management, which maintains records of federal employees and contractors. Data on about 4 million current and former federal workers may have been compromised.

Chinese

In 1987, Congress passed ___________, which shifted responsibility for the security of non-military computers from the National Security Agency (NSA) to the National Institute for Standards and Technology.

Computer Security Act

The _________, considered the first piece of disaster legislation, provided federal assistance to Portsmouth, N.H., following a huge fire.

Congressional Act of 1803

According to the 911 Commission Report; Bin Ladin reportedly thought an attack against the United States would do all of the following EXCEPT? (tophat)

Create a new Caliphate

_____________ is one of the Department of Homeland Security's largest and most complex components, with a priority mission of keeping terrorists and their weapons out of the US.

Customs and Border Protection

According to The 911 Commission Report; the US wanted Pakistan to take seven steps. All of the following are one of those steps except?

Cut off food supplies to the Taliban

an attempt by hackers to damage or destroy a computer network or system

Cyber attacks

the possibility of a malicious attempt to damage or disrupt a computer network or system

Cyber threat

Crime conducted via the Internet or some other computer network

Cybercrime

The use of computer networks to gain illicit access to confidential information, typically that held by a government or other organization

Cyberespionage

The U.S. military established a signals intelligence unit during World War I to decipher enemy codes and provide codes for its own forces. In 1919 the unit was transferred to the State Department, where it became the _________ also known as the "Black Chamber", and focused on diplomatic rather than military communications.

Cypher Bureau

The National Security Act of 1947 created the position of ______________.

Director of Central Intelligence (DCI)

Created by CIA to enhance cyber security and conduct cyber espionage

Directorate of Digital Information

_____________, so-called sovereign citizens who live in the United States but do not recognize the authority of any government, now outrank Islamic extremists on law enforcement's list of concerns, according to a 2013-14 survey on police intelligence processes conducted.

Domestic terrorist

According to The 911 Commission Report; the operation to attack the Taliban and Al Qaeda in Afghanistan was originally code named ________________________, later changed to Enduring Freedom.

"Infinite Justice"

In February 2015, Hackers are revealed to have stolen up to _______ from more than 100 banks in 30 countries since at least late 2013.

$1 billion


Set pelajaran terkait

NUR 302 - Ch 39: Oxygenation and Perfusion (PrepU - EXAM 2)

View Set

Mastering Chemistry Chapter 7 Quiz

View Set

IS113 Topic 1: INTRODUCING EXCEL

View Set

Chapter 32: Serious Mental Illness

View Set

APES Ch 10: Food, Soil, and Pest Management

View Set