answer stringlengths 1 239 ⌀ | question stringlengths 1 25.7k |
|---|---|
secure procedures | What must an operator deviate from to harm the computer? |
cybersecurity or IT security | What is computer security also known as? |
Computer security | What is the protection of information systems? |
intentional, accidental, or due to them being tricked | What are the ways an operator can malpractice? |
Computer security | What is the practice that includes controlling physical access to hardware? |
Denial of service attacks | What are attacks designed to make a machine or network unavailable to its intended users? |
the victim account to be locked | What does deliberately entering the wrong password enough consecutive times cause? |
reflection and amplification attacks | What are attacks where innocent systems are fooled into sending traffic to the victom called? |
Distributed denial of service | What does DDoS stand for? |
by adding a new firewall rule | How can a network attack from a single IP address be blocked? |
a malicious compact disc in a car's stereo system | What were researchers in 2011 able to use as a successful attack vector? |
eavesdropping | In cars with built-in voice recognition features, what can the onboard microphones be used for? |
a potential entry point for malware or an attacker | Wifi, bluetooth, and cell phone networks are examples of what? |
disable the brakes and turn the steering wheel | Assuming access has been gained to the car's internal controller area network, what is it possible to do? |
the cell phone network | What network is used to contact concierge and emergency assitance services as well as getting navigational and entetainment information? |
relatively few | How many organisations are estimated to maintain computer systems with effective detection systems? |
packet capture appliances | What is the basic evidence gathered by that puts criminals behind bars? |
firewalls and other automated "detection" systems | The primary obstacle to the eradication of cyber crime is the excessive reliance on what? |
Reuters | What is the source of the quote? |
physical stealing of assets | Electronic theft of data is causing more loss than what? |
computer security | Technology that is used to implement secure operating systems is one use of what term? |
Evaluation Assurance Levels | What does EAL stand for? |
Methodically Designed, Tested and Reviewed | What is the standard of EAL4? |
Semiformally Verified Design and Tested | What is the standard for EAL6? |
Integrity-178B | What is an example of a system that meets EAL6? |
February 27, 2014 | When was Chine's network security and information technology leadership team established? |
enhanced national security capabilities. | What is the reason for studying the promotion of national network security ad information technology law? |
China | What country has a network security and information technology leadership team?? |
Eavesdropping | What is the act of surreptitiously listening to a private conversation? |
hosts on a network | Conversations that people eavesdrop on are typically between who? |
the FBI and NSA | Who has used programs such as Carnivore and NarusInsight to eavesdrop on the systems of internet service providers? |
TEMPEST | Eavesdropping on a closed system via the faint electro-magnetic trasmissions generated by the hardware has been referred to as what by the NSA? |
a closed system | What are machines that operate with no contact to the outside world called? |
malware | What are desktop computers and laptops commonly infected with? |
malware | Constructing a botnet to attack another target is an example of the activity of what? |
Quantified Self devices | Activity trackers are an example of what? |
attack vectors | What could wifi, bluetooth, and cellphone network on devices be used as? |
sensors | What could be remotely activated after a sucessful breach? |
access control lists | What does ACL stand for? |
enforcing privilege separation | ACLs and capability based security are two security models capable of what? |
the confused deputy problem | A host computer tricked into indirectly allowing access to restricted files is known as what? |
take responsibility to ensure that they do not introduce flaws | What must designers of systems that are ACL based do? |
capabilities | The confused deputy problem and the problem of not guaranteeing only one person has access are resolved by what? |
1994 | In what year did over a hundred intrusions made into the Rome Laboraroty? |
Using trojan horses | How were hackers able to obtain unrestricted access to Rome's networking systems? |
by posing as a trusted Rome center user | How were hackers able to penetrate connected networks? |
the US Air Force's main command and research facility | What is the Rome Laboratory? |
National Aeronautics and Space Administration | Who does the Goddard Space Flight Center belong to? |
July of 2015 | When did The Impact Team successfully breach Ashley Madison? |
Avid Life Media | What is the name of the parent company that created Ashley Madison? |
After the second data dump | When did the Avid Life Media CEO resign? |
emails from the company's CEO | What was in the first data dump? |
Established Men | What website, in addition to Ashley Madison, was Avid Media instructed to take offline? |
a crucial need for regulation | According to goverment officials, what has the failure of the private sector to solve efficiently the cybersecurity problem created? |
San Francisco | Where was the RSA Security Conference held? |
executives from the private sector | Who believes that government intervention would affect innovation? |
R. Clarke | Who said "industry only responds when you threaten regulation"? |
cyberspace | What is a virtual space free of any government intervention? |
October 3, 2010 | When did Public Safety Canada unveil Canada's Cyber Security Strategy? |
The Action Plan 2010–2015 for Canada's Cyber Security Strategy | What outlines the ongoing implementation of the Cyber Security Strategy? |
The Cyber Incident Management Framework for Canada | What outlines the responsibilities and provides a plan for coordination during a cyber incident? |
The Internet | What is a potential attack vector for utilities such as the power grid? |
the Stuxnet worm | What demonstrated equipment controlled by computers not connected to the internet can also be vulnerable? |
2014 | When did the Computer Emergency Readiness Team investigate 79 hacking incidents at energy companies? |
the Department of Homeland Security | What department does the Computer Emergency Readiness Team belong to? |
via removable media | How did the Stuxnet worm infect industrial equipment? |
"preventive" measures | Firewalls and exit procedures are considered what? |
A firewall | What is defined as a way of filtering network data between a host or network and another network? |
a separate machine filtering network traffic | What does a physical firewall consist of? |
permanently connected to the Internet | What type of machines normall have a firewall? |
computer security | What compromises mainly preventative measures? |
security breaches | What has caused serious financial damage? |
the organizations involved | Data made public who is available to estimate the cost of an incident? |
$13 billion | What is the amount of losses estimated from worms and viruses in 2003? |
Several computer security consulting firms | Who produces estimates of worldwide losses attributable to security breaches? |
basically anecdotal | What is the underlying methodology of finding worldwide estimates for losses fur to security breaches? |
during the manufacturing process | Microchips vulnerabilities are introduced when? |
hardware-based or assisted computer security | What offers an alternative to soft-ware only computer security? |
insecurity | What can hardware be a source of? |
physical access (or sophisticated backdoor access) | What is required in order for hardware to be compromised? |
Canadian Cyber Incident Response Centre | What does CCIRC stand for? |
CCIRC | Who is resposible for mitigating and responding to threats to Canada's critical infrastructure? |
on the Public Safety Canada website | Where does the CCIRC post regular cyber security bulletins? |
Canada's Cyber Security Strategy | What functions as a counterpart document to the National Strategy and Action Plan for Critical Infrastructure? |
Jay Cross | Who said "Connectedness begets vulnerability?" |
the Internet Time Group | What organization does Jay Cross belong to? |
increasing efficiency | What is the advantage of more critical infrastructure being controlled via computer programs? |
exposes new vulnerabilities | What is the disadvantage of more critical infrastructure being controlled via computer programs? |
September 27, 2010 | When did Public Safety Canada partner with Stop.Think. Connect? |
February 4, 2014 | When was the Cyber Security Cooperation Program launched by the Government of Canada? |
Public Safety Canada | Who routinely updates the GetCyberSafe portal for Canadian citizens? |
October | What month is Cyber Security Awareness Month? |
$1.5 million | How much does the Cyber Security Cooperation Program cost? |
compromise security | Installing keyloggers and making operating system modifications are examples of ways unauthorized users for what? |
standard security measures | Booting a tool or another operating system from a CD Rom can bypass what? |
attacks | Disk encryption and Trusted Platform Module are designed to prevent what? |
directly download data from it | An unauthorized user with physical access to a computer can likely do what? |
Clickjacking | UI redress attack or User Interface redress attack is also known as what? |
Clickjacking | What is a malicious technique in which an attacker tricks the user into clicking on a button or link? |
some other irrelevant page | Where are the clicks meant for the top level page routed? |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.