answer
stringlengths
1
239
question
stringlengths
1
25.7k
secure procedures
What must an operator deviate from to harm the computer?
cybersecurity or IT security
What is computer security also known as?
Computer security
What is the protection of information systems?
intentional, accidental, or due to them being tricked
What are the ways an operator can malpractice?
Computer security
What is the practice that includes controlling physical access to hardware?
Denial of service attacks
What are attacks designed to make a machine or network unavailable to its intended users?
the victim account to be locked
What does deliberately entering the wrong password enough consecutive times cause?
reflection and amplification attacks
What are attacks where innocent systems are fooled into sending traffic to the victom called?
Distributed denial of service
What does DDoS stand for?
by adding a new firewall rule
How can a network attack from a single IP address be blocked?
a malicious compact disc in a car's stereo system
What were researchers in 2011 able to use as a successful attack vector?
eavesdropping
In cars with built-in voice recognition features, what can the onboard microphones be used for?
a potential entry point for malware or an attacker
Wifi, bluetooth, and cell phone networks are examples of what?
disable the brakes and turn the steering wheel
Assuming access has been gained to the car's internal controller area network, what is it possible to do?
the cell phone network
What network is used to contact concierge and emergency assitance services as well as getting navigational and entetainment information?
relatively few
How many organisations are estimated to maintain computer systems with effective detection systems?
packet capture appliances
What is the basic evidence gathered by that puts criminals behind bars?
firewalls and other automated "detection" systems
The primary obstacle to the eradication of cyber crime is the excessive reliance on what?
Reuters
What is the source of the quote?
physical stealing of assets
Electronic theft of data is causing more loss than what?
computer security
Technology that is used to implement secure operating systems is one use of what term?
Evaluation Assurance Levels
What does EAL stand for?
Methodically Designed, Tested and Reviewed
What is the standard of EAL4?
Semiformally Verified Design and Tested
What is the standard for EAL6?
Integrity-178B
What is an example of a system that meets EAL6?
February 27, 2014
When was Chine's network security and information technology leadership team established?
enhanced national security capabilities.
What is the reason for studying the promotion of national network security ad information technology law?
China
What country has a network security and information technology leadership team??
Eavesdropping
What is the act of surreptitiously listening to a private conversation?
hosts on a network
Conversations that people eavesdrop on are typically between who?
the FBI and NSA
Who has used programs such as Carnivore and NarusInsight to eavesdrop on the systems of internet service providers?
TEMPEST
Eavesdropping on a closed system via the faint electro-magnetic trasmissions generated by the hardware has been referred to as what by the NSA?
a closed system
What are machines that operate with no contact to the outside world called?
malware
What are desktop computers and laptops commonly infected with?
malware
Constructing a botnet to attack another target is an example of the activity of what?
Quantified Self devices
Activity trackers are an example of what?
attack vectors
What could wifi, bluetooth, and cellphone network on devices be used as?
sensors
What could be remotely activated after a sucessful breach?
access control lists
What does ACL stand for?
enforcing privilege separation
ACLs and capability based security are two security models capable of what?
the confused deputy problem
A host computer tricked into indirectly allowing access to restricted files is known as what?
take responsibility to ensure that they do not introduce flaws
What must designers of systems that are ACL based do?
capabilities
The confused deputy problem and the problem of not guaranteeing only one person has access are resolved by what?
1994
In what year did over a hundred intrusions made into the Rome Laboraroty?
Using trojan horses
How were hackers able to obtain unrestricted access to Rome's networking systems?
by posing as a trusted Rome center user
How were hackers able to penetrate connected networks?
the US Air Force's main command and research facility
What is the Rome Laboratory?
National Aeronautics and Space Administration
Who does the Goddard Space Flight Center belong to?
July of 2015
When did The Impact Team successfully breach Ashley Madison?
Avid Life Media
What is the name of the parent company that created Ashley Madison?
After the second data dump
When did the Avid Life Media CEO resign?
emails from the company's CEO
What was in the first data dump?
Established Men
What website, in addition to Ashley Madison, was Avid Media instructed to take offline?
a crucial need for regulation
According to goverment officials, what has the failure of the private sector to solve efficiently the cybersecurity problem created?
San Francisco
Where was the RSA Security Conference held?
executives from the private sector
Who believes that government intervention would affect innovation?
R. Clarke
Who said "industry only responds when you threaten regulation"?
cyberspace
What is a virtual space free of any government intervention?
October 3, 2010
When did Public Safety Canada unveil Canada's Cyber Security Strategy?
The Action Plan 2010–2015 for Canada's Cyber Security Strategy
What outlines the ongoing implementation of the Cyber Security Strategy?
The Cyber Incident Management Framework for Canada
What outlines the responsibilities and provides a plan for coordination during a cyber incident?
The Internet
What is a potential attack vector for utilities such as the power grid?
the Stuxnet worm
What demonstrated equipment controlled by computers not connected to the internet can also be vulnerable?
2014
When did the Computer Emergency Readiness Team investigate 79 hacking incidents at energy companies?
the Department of Homeland Security
What department does the Computer Emergency Readiness Team belong to?
via removable media
How did the Stuxnet worm infect industrial equipment?
"preventive" measures
Firewalls and exit procedures are considered what?
A firewall
What is defined as a way of filtering network data between a host or network and another network?
a separate machine filtering network traffic
What does a physical firewall consist of?
permanently connected to the Internet
What type of machines normall have a firewall?
computer security
What compromises mainly preventative measures?
security breaches
What has caused serious financial damage?
the organizations involved
Data made public who is available to estimate the cost of an incident?
$13 billion
What is the amount of losses estimated from worms and viruses in 2003?
Several computer security consulting firms
Who produces estimates of worldwide losses attributable to security breaches?
basically anecdotal
What is the underlying methodology of finding worldwide estimates for losses fur to security breaches?
during the manufacturing process
Microchips vulnerabilities are introduced when?
hardware-based or assisted computer security
What offers an alternative to soft-ware only computer security?
insecurity
What can hardware be a source of?
physical access (or sophisticated backdoor access)
What is required in order for hardware to be compromised?
Canadian Cyber Incident Response Centre
What does CCIRC stand for?
CCIRC
Who is resposible for mitigating and responding to threats to Canada's critical infrastructure?
on the Public Safety Canada website
Where does the CCIRC post regular cyber security bulletins?
Canada's Cyber Security Strategy
What functions as a counterpart document to the National Strategy and Action Plan for Critical Infrastructure?
Jay Cross
Who said "Connectedness begets vulnerability?"
the Internet Time Group
What organization does Jay Cross belong to?
increasing efficiency
What is the advantage of more critical infrastructure being controlled via computer programs?
exposes new vulnerabilities
What is the disadvantage of more critical infrastructure being controlled via computer programs?
September 27, 2010
When did Public Safety Canada partner with Stop.Think. Connect?
February 4, 2014
When was the Cyber Security Cooperation Program launched by the Government of Canada?
Public Safety Canada
Who routinely updates the GetCyberSafe portal for Canadian citizens?
October
What month is Cyber Security Awareness Month?
$1.5 million
How much does the Cyber Security Cooperation Program cost?
compromise security
Installing keyloggers and making operating system modifications are examples of ways unauthorized users for what?
standard security measures
Booting a tool or another operating system from a CD Rom can bypass what?
attacks
Disk encryption and Trusted Platform Module are designed to prevent what?
directly download data from it
An unauthorized user with physical access to a computer can likely do what?
Clickjacking
UI redress attack or User Interface redress attack is also known as what?
Clickjacking
What is a malicious technique in which an attacker tricks the user into clicking on a button or link?
some other irrelevant page
Where are the clicks meant for the top level page routed?