id
stringlengths
24
24
title
stringclasses
442 values
context
stringlengths
151
3.71k
question
stringlengths
12
270
answers
dict
57097050200fba1400367fef
Computer_security
Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ...
What are attacks designed to make a machine or network unavailable to its intended users?
{ "answer_start": [ 0 ], "text": [ "Denial of service attacks" ] }
57097050200fba1400367ff0
Computer_security
Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ...
What does deliberately entering the wrong password enough consecutive times cause?
{ "answer_start": [ 246 ], "text": [ "the victim account to be locked" ] }
57097050200fba1400367ff1
Computer_security
Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ...
What are attacks where innocent systems are fooled into sending traffic to the victom called?
{ "answer_start": [ 751 ], "text": [ "reflection and amplification attacks" ] }
57097050200fba1400367ff2
Computer_security
Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ...
What does DDoS stand for?
{ "answer_start": [ 478 ], "text": [ "Distributed denial of service" ] }
57097050200fba1400367ff3
Computer_security
Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ...
How can a network attack from a single IP address be blocked?
{ "answer_start": [ 433 ], "text": [ "by adding a new firewall rule" ] }
570971e6ed30961900e84158
Computer_security
If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv...
What were researchers in 2011 able to use as a successful attack vector?
{ "answer_start": [ 686 ], "text": [ "a malicious compact disc in a car's stereo system" ] }
570971e6ed30961900e84159
Computer_security
If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv...
In cars with built-in voice recognition features, what can the onboard microphones be used for?
{ "answer_start": [ 887 ], "text": [ "eavesdropping" ] }
570971e6ed30961900e8415a
Computer_security
If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv...
Wifi, bluetooth, and cell phone networks are examples of what?
{ "answer_start": [ 592 ], "text": [ "a potential entry point for malware or an attacker" ] }
570971e6ed30961900e8415b
Computer_security
If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv...
Assuming access has been gained to the car's internal controller area network, what is it possible to do?
{ "answer_start": [ 83 ], "text": [ "disable the brakes and turn the steering wheel" ] }
570971e6ed30961900e8415c
Computer_security
If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv...
What network is used to contact concierge and emergency assitance services as well as getting navigational and entetainment information?
{ "answer_start": [ 438 ], "text": [ "the cell phone network" ] }
5709744f200fba1400368015
Computer_security
However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T...
How many organisations are estimated to maintain computer systems with effective detection systems?
{ "answer_start": [ 9 ], "text": [ "relatively few" ] }
5709744f200fba1400368016
Computer_security
However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T...
What is the basic evidence gathered by that puts criminals behind bars?
{ "answer_start": [ 516 ], "text": [ "packet capture appliances" ] }
5709744f200fba1400368017
Computer_security
However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T...
The primary obstacle to the eradication of cyber crime is the excessive reliance on what?
{ "answer_start": [ 421 ], "text": [ "firewalls and other automated \"detection\" systems" ] }
5709744f200fba1400368018
Computer_security
However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T...
What is the source of the quote?
{ "answer_start": [ 173 ], "text": [ "Reuters" ] }
5709744f200fba1400368019
Computer_security
However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T...
Electronic theft of data is causing more loss than what?
{ "answer_start": [ 289 ], "text": [ "physical stealing of assets" ] }
5709750fed30961900e84188
Computer_security
One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str...
Technology that is used to implement secure operating systems is one use of what term?
{ "answer_start": [ 21 ], "text": [ "computer security" ] }
5709750fed30961900e84189
Computer_security
One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str...
What does EAL stand for?
{ "answer_start": [ 327 ], "text": [ "Evaluation Assurance Levels" ] }
5709750fed30961900e8418a
Computer_security
One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str...
What is the standard of EAL4?
{ "answer_start": [ 419 ], "text": [ "Methodically Designed, Tested and Reviewed" ] }
5709750fed30961900e8418b
Computer_security
One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str...
What is the standard for EAL6?
{ "answer_start": [ 578 ], "text": [ "Semiformally Verified Design and Tested" ] }
5709750fed30961900e8418c
Computer_security
One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str...
What is an example of a system that meets EAL6?
{ "answer_start": [ 630 ], "text": [ "Integrity-178B" ] }
57097780200fba1400368033
Computer_security
China's network security and information technology leadership team was established February 27, 2014. The leadership team is tasked with national security and long-term development and co-ordination of major issues related to network security and information technology. Economic, political, cultural, social and milita...
When was Chine's network security and information technology leadership team established?
{ "answer_start": [ 84 ], "text": [ "February 27, 2014" ] }
57097780200fba1400368034
Computer_security
China's network security and information technology leadership team was established February 27, 2014. The leadership team is tasked with national security and long-term development and co-ordination of major issues related to network security and information technology. Economic, political, cultural, social and milita...
What is the reason for studying the promotion of national network security ad information technology law?
{ "answer_start": [ 565 ], "text": [ "enhanced national security capabilities." ] }
57097780200fba1400368035
Computer_security
China's network security and information technology leadership team was established February 27, 2014. The leadership team is tasked with national security and long-term development and co-ordination of major issues related to network security and information technology. Economic, political, cultural, social and milita...
What country has a network security and information technology leadership team??
{ "answer_start": [ 0 ], "text": [ "China" ] }
570978aaed30961900e841ae
Computer_security
Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e...
What is the act of surreptitiously listening to a private conversation?
{ "answer_start": [ 0 ], "text": [ "Eavesdropping" ] }
570978aaed30961900e841af
Computer_security
Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e...
Conversations that people eavesdrop on are typically between who?
{ "answer_start": [ 99 ], "text": [ "hosts on a network" ] }
570978aaed30961900e841b0
Computer_security
Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e...
Who has used programs such as Carnivore and NarusInsight to eavesdrop on the systems of internet service providers?
{ "answer_start": [ 195 ], "text": [ "the FBI and NSA" ] }
570978aaed30961900e841b1
Computer_security
Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e...
Eavesdropping on a closed system via the faint electro-magnetic trasmissions generated by the hardware has been referred to as what by the NSA?
{ "answer_start": [ 469 ], "text": [ "TEMPEST" ] }
570978aaed30961900e841b2
Computer_security
Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e...
What are machines that operate with no contact to the outside world called?
{ "answer_start": [ 300 ], "text": [ "a closed system" ] }
57097fd9ed30961900e84234
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
What are desktop computers and laptops commonly infected with?
{ "answer_start": [ 57 ], "text": [ "malware" ] }
57097fd9ed30961900e84235
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
Constructing a botnet to attack another target is an example of the activity of what?
{ "answer_start": [ 57 ], "text": [ "malware" ] }
57097fd9ed30961900e84236
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
Activity trackers are an example of what?
{ "answer_start": [ 257 ], "text": [ "Quantified Self devices" ] }
57097fd9ed30961900e84237
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
What could wifi, bluetooth, and cellphone network on devices be used as?
{ "answer_start": [ 620 ], "text": [ "attack vectors" ] }
57097fd9ed30961900e84238
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
What could be remotely activated after a sucessful breach?
{ "answer_start": [ 640 ], "text": [ "sensors" ] }
5709828a200fba14003680df
Computer_security
Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ...
What does ACL stand for?
{ "answer_start": [ 99 ], "text": [ "access control lists" ] }
5709828a200fba14003680e0
Computer_security
Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ...
ACLs and capability based security are two security models capable of what?
{ "answer_start": [ 64 ], "text": [ "enforcing privilege separation" ] }
5709828a200fba14003680e1
Computer_security
Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ...
A host computer tricked into indirectly allowing access to restricted files is known as what?
{ "answer_start": [ 351 ], "text": [ "the confused deputy problem" ] }
5709828a200fba14003680e3
Computer_security
Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ...
What must designers of systems that are ACL based do?
{ "answer_start": [ 688 ], "text": [ "take responsibility to ensure that they do not introduce flaws" ] }
5709828a200fba14003680e2
Computer_security
Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ...
The confused deputy problem and the problem of not guaranteeing only one person has access are resolved by what?
{ "answer_start": [ 553 ], "text": [ "capabilities" ] }
57099043200fba1400368199
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
In what year did over a hundred intrusions made into the Rome Laboraroty?
{ "answer_start": [ 3 ], "text": [ "1994" ] }
57099043200fba140036819a
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
How were hackers able to obtain unrestricted access to Rome's networking systems?
{ "answer_start": [ 151 ], "text": [ "Using trojan horses" ] }
57099043200fba140036819b
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
How were hackers able to penetrate connected networks?
{ "answer_start": [ 611 ], "text": [ "by posing as a trusted Rome center user" ] }
57099043200fba140036819c
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
What is the Rome Laboratory?
{ "answer_start": [ 96 ], "text": [ "the US Air Force's main command and research facility" ] }
57099043200fba140036819d
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
Who does the Goddard Space Flight Center belong to?
{ "answer_start": [ 435 ], "text": [ "National Aeronautics and Space Administration" ] }
5709986aed30961900e84366
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
When did The Impact Team successfully breach Ashley Madison?
{ "answer_start": [ 3 ], "text": [ "July of 2015" ] }
5709986aed30961900e84367
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
What is the name of the parent company that created Ashley Madison?
{ "answer_start": [ 810 ], "text": [ "Avid Life Media" ] }
5709986aed30961900e84368
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
When did the Avid Life Media CEO resign?
{ "answer_start": [ 1002 ], "text": [ "After the second data dump" ] }
5709986aed30961900e84369
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
What was in the first data dump?
{ "answer_start": [ 259 ], "text": [ "emails from the company's CEO" ] }
5709986aed30961900e8436a
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
What website, in addition to Ashley Madison, was Avid Media instructed to take offline?
{ "answer_start": [ 509 ], "text": [ "Established Men" ] }
57099c47ed30961900e84378
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
According to goverment officials, what has the failure of the private sector to solve efficiently the cybersecurity problem created?
{ "answer_start": [ 481 ], "text": [ "a crucial need for regulation" ] }
57099c47ed30961900e84379
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
Where was the RSA Security Conference held?
{ "answer_start": [ 683 ], "text": [ "San Francisco" ] }
57099c47ed30961900e8437a
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
Who believes that government intervention would affect innovation?
{ "answer_start": [ 866 ], "text": [ "executives from the private sector" ] }
57099c47ed30961900e8437b
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
Who said "industry only responds when you threaten regulation"?
{ "answer_start": [ 608 ], "text": [ "R. Clarke" ] }
57099c47ed30961900e8437c
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
What is a virtual space free of any government intervention?
{ "answer_start": [ 185 ], "text": [ "cyberspace" ] }
57099d82ed30961900e84382
Computer_security
On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi...
When did Public Safety Canada unveil Canada's Cyber Security Strategy?
{ "answer_start": [ 3 ], "text": [ "October 3, 2010" ] }
57099d82ed30961900e84383
Computer_security
On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi...
What outlines the ongoing implementation of the Cyber Security Strategy?
{ "answer_start": [ 848 ], "text": [ "The Action Plan 2010–2015 for Canada's Cyber Security Strategy" ] }
57099d82ed30961900e84384
Computer_security
On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi...
What outlines the responsibilities and provides a plan for coordination during a cyber incident?
{ "answer_start": [ 647 ], "text": [ "The Cyber Incident Management Framework for Canada" ] }
57099ea3200fba14003681dd
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
What is a potential attack vector for utilities such as the power grid?
{ "answer_start": [ 188 ], "text": [ "The Internet" ] }
57099ea3200fba14003681de
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
What demonstrated equipment controlled by computers not connected to the internet can also be vulnerable?
{ "answer_start": [ 266 ], "text": [ "the Stuxnet worm" ] }
57099ea3200fba14003681df
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
When did the Computer Emergency Readiness Team investigate 79 hacking incidents at energy companies?
{ "answer_start": [ 554 ], "text": [ "2014" ] }
57099ea3200fba14003681e0
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
What department does the Computer Emergency Readiness Team belong to?
{ "answer_start": [ 613 ], "text": [ "the Department of Homeland Security" ] }
57099ea3200fba14003681e1
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
How did the Stuxnet worm infect industrial equipment?
{ "answer_start": [ 530 ], "text": [ "via removable media" ] }
57099f7bed30961900e84388
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
Firewalls and exit procedures are considered what?
{ "answer_start": [ 42 ], "text": [ "\"preventive\" measures" ] }
57099f7bed30961900e84389
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
What is defined as a way of filtering network data between a host or network and another network?
{ "answer_start": [ 102 ], "text": [ "A firewall" ] }
57099f7bed30961900e8438a
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
What does a physical firewall consist of?
{ "answer_start": [ 552 ], "text": [ "a separate machine filtering network traffic" ] }
57099f7bed30961900e8438b
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
What type of machines normall have a firewall?
{ "answer_start": [ 645 ], "text": [ "permanently connected to the Internet" ] }
57099f7bed30961900e8438c
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
What compromises mainly preventative measures?
{ "answer_start": [ 7 ], "text": [ "computer security" ] }
5709a208200fba14003681f7
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
What has caused serious financial damage?
{ "answer_start": [ 44 ], "text": [ "security breaches" ] }
5709a208200fba14003681f8
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
Data made public who is available to estimate the cost of an incident?
{ "answer_start": [ 198 ], "text": [ "the organizations involved" ] }
5709a208200fba14003681f9
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
What is the amount of losses estimated from worms and viruses in 2003?
{ "answer_start": [ 443 ], "text": [ "$13 billion" ] }
5709a208200fba14003681fa
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
Who produces estimates of worldwide losses attributable to security breaches?
{ "answer_start": [ 227 ], "text": [ "Several computer security consulting firms" ] }
5709a208200fba14003681fb
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
What is the underlying methodology of finding worldwide estimates for losses fur to security breaches?
{ "answer_start": [ 617 ], "text": [ "basically anecdotal" ] }
5709a2e5200fba1400368201
Computer_security
While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i...
Microchips vulnerabilities are introduced when?
{ "answer_start": [ 108 ], "text": [ "during the manufacturing process" ] }
5709a2e5200fba1400368202
Computer_security
While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i...
What offers an alternative to soft-ware only computer security?
{ "answer_start": [ 142 ], "text": [ "hardware-based or assisted computer security" ] }
5709a2e5200fba1400368203
Computer_security
While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i...
What can hardware be a source of?
{ "answer_start": [ 34 ], "text": [ "insecurity" ] }
5709a2e5200fba1400368204
Computer_security
While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i...
What is required in order for hardware to be compromised?
{ "answer_start": [ 443 ], "text": [ "physical access (or sophisticated backdoor access)" ] }
5709a391200fba1400368209
Computer_security
Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o...
What does CCIRC stand for?
{ "answer_start": [ 23 ], "text": [ "Canadian Cyber Incident Response Centre" ] }
5709a391200fba140036820a
Computer_security
Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o...
Who is resposible for mitigating and responding to threats to Canada's critical infrastructure?
{ "answer_start": [ 64 ], "text": [ "CCIRC" ] }
5709a391200fba140036820b
Computer_security
Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o...
Where does the CCIRC post regular cyber security bulletins?
{ "answer_start": [ 438 ], "text": [ "on the Public Safety Canada website" ] }
5709a391200fba140036820c
Computer_security
Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o...
What functions as a counterpart document to the National Strategy and Action Plan for Critical Infrastructure?
{ "answer_start": [ 589 ], "text": [ "Canada's Cyber Security Strategy" ] }
5709a509200fba1400368211
Computer_security
This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi...
Who said "Connectedness begets vulnerability?"
{ "answer_start": [ 404 ], "text": [ "Jay Cross" ] }
5709a509200fba1400368212
Computer_security
This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi...
What organization does Jay Cross belong to?
{ "answer_start": [ 438 ], "text": [ "the Internet Time Group" ] }
5709a509200fba1400368213
Computer_security
This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi...
What is the advantage of more critical infrastructure being controlled via computer programs?
{ "answer_start": [ 159 ], "text": [ "increasing efficiency" ] }
5709a509200fba1400368214
Computer_security
This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi...
What is the disadvantage of more critical infrastructure being controlled via computer programs?
{ "answer_start": [ 182 ], "text": [ "exposes new vulnerabilities" ] }
5709a5d5ed30961900e843bc
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
When did Public Safety Canada partner with Stop.Think. Connect?
{ "answer_start": [ 3 ], "text": [ "September 27, 2010" ] }
5709a5d5ed30961900e843bd
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
When was the Cyber Security Cooperation Program launched by the Government of Canada?
{ "answer_start": [ 233 ], "text": [ "February 4, 2014" ] }
5709a5d5ed30961900e843be
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
Who routinely updates the GetCyberSafe portal for Canadian citizens?
{ "answer_start": [ 593 ], "text": [ "Public Safety Canada" ] }
5709a5d5ed30961900e843bf
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
What month is Cyber Security Awareness Month?
{ "answer_start": [ 749 ], "text": [ "October" ] }
5709a5d5ed30961900e843c0
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
How much does the Cyber Security Cooperation Program cost?
{ "answer_start": [ 342 ], "text": [ "$1.5 million" ] }
5709a7c7200fba1400368219
Computer_security
An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure...
Installing keyloggers and making operating system modifications are examples of ways unauthorized users for what?
{ "answer_start": [ 128 ], "text": [ "compromise security" ] }
5709a7c7200fba140036821a
Computer_security
An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure...
Booting a tool or another operating system from a CD Rom can bypass what?
{ "answer_start": [ 295 ], "text": [ "standard security measures" ] }
5709a7c7200fba140036821b
Computer_security
An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure...
Disk encryption and Trusted Platform Module are designed to prevent what?
{ "answer_start": [ 514 ], "text": [ "attacks" ] }
5709a7c7200fba140036821c
Computer_security
An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure...
An unauthorized user with physical access to a computer can likely do what?
{ "answer_start": [ 82 ], "text": [ "directly download data from it" ] }
5709a8dd200fba140036822b
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
UI redress attack or User Interface redress attack is also known as what?
{ "answer_start": [ 0 ], "text": [ "Clickjacking" ] }
5709a8dd200fba140036822c
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
What is a malicious technique in which an attacker tricks the user into clicking on a button or link?
{ "answer_start": [ 0 ], "text": [ "Clickjacking" ] }
5709a8dd200fba140036822d
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
Where are the clicks meant for the top level page routed?
{ "answer_start": [ 407 ], "text": [ "some other irrelevant page" ] }
5709a8dd200fba140036822e
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
Where would a password typed on a seemingly authetic webpage be directed?
{ "answer_start": [ 748 ], "text": [ "into an invisible frame controlled by the attacker" ] }
5709a8dd200fba140036822f
Computer_security
Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke...
How istricking the user accomplished in clickjacking?
{ "answer_start": [ 264 ], "text": [ "using multiple transparent or opaque layers" ] }
5709a976ed30961900e843da
Computer_security
In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co...
How many computers were connected to the internet in 1988?
{ "answer_start": [ 14 ], "text": [ "60,000" ] }
5709a976ed30961900e843db
Computer_security
In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co...
When was the first computer worm released?
{ "answer_start": [ 137 ], "text": [ "November 2, 1988" ] }
5709a976ed30961900e843dc
Computer_security
In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co...
Who was the first computer worm traced back to?
{ "answer_start": [ 414 ], "text": [ "Robert Tappan Morris, Jr." ] }