id stringlengths 24 24 | title stringclasses 442
values | context stringlengths 151 3.71k | question stringlengths 12 270 | answers dict |
|---|---|---|---|---|
57097050200fba1400367fef | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | What are attacks designed to make a machine or network unavailable to its intended users? | {
"answer_start": [
0
],
"text": [
"Denial of service attacks"
]
} |
57097050200fba1400367ff0 | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | What does deliberately entering the wrong password enough consecutive times cause? | {
"answer_start": [
246
],
"text": [
"the victim account to be locked"
]
} |
57097050200fba1400367ff1 | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | What are attacks where innocent systems are fooled into sending traffic to the victom called? | {
"answer_start": [
751
],
"text": [
"reflection and amplification attacks"
]
} |
57097050200fba1400367ff2 | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | What does DDoS stand for? | {
"answer_start": [
478
],
"text": [
"Distributed denial of service"
]
} |
57097050200fba1400367ff3 | Computer_security | Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of ... | How can a network attack from a single IP address be blocked? | {
"answer_start": [
433
],
"text": [
"by adding a new firewall rule"
]
} |
570971e6ed30961900e84158 | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | What were researchers in 2011 able to use as a successful attack vector? | {
"answer_start": [
686
],
"text": [
"a malicious compact disc in a car's stereo system"
]
} |
570971e6ed30961900e84159 | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | In cars with built-in voice recognition features, what can the onboard microphones be used for? | {
"answer_start": [
887
],
"text": [
"eavesdropping"
]
} |
570971e6ed30961900e8415a | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | Wifi, bluetooth, and cell phone networks are examples of what? | {
"answer_start": [
592
],
"text": [
"a potential entry point for malware or an attacker"
]
} |
570971e6ed30961900e8415b | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | Assuming access has been gained to the car's internal controller area network, what is it possible to do? | {
"answer_start": [
83
],
"text": [
"disable the brakes and turn the steering wheel"
]
} |
570971e6ed30961900e8415c | Computer_security | If access is gained to a car's internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driv... | What network is used to contact concierge and emergency assitance services as well as getting navigational and entetainment information? | {
"answer_start": [
438
],
"text": [
"the cell phone network"
]
} |
5709744f200fba1400368015 | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | How many organisations are estimated to maintain computer systems with effective detection systems? | {
"answer_start": [
9
],
"text": [
"relatively few"
]
} |
5709744f200fba1400368016 | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | What is the basic evidence gathered by that puts criminals behind bars? | {
"answer_start": [
516
],
"text": [
"packet capture appliances"
]
} |
5709744f200fba1400368017 | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | The primary obstacle to the eradication of cyber crime is the excessive reliance on what? | {
"answer_start": [
421
],
"text": [
"firewalls and other automated \"detection\" systems"
]
} |
5709744f200fba1400368018 | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | What is the source of the quote? | {
"answer_start": [
173
],
"text": [
"Reuters"
]
} |
5709744f200fba1400368019 | Computer_security | However, relatively few organisations maintain computer systems with effective detection systems, and fewer still have organised response mechanisms in place. As result, as Reuters points out: "Companies for the first time report they are losing more through electronic theft of data than physical stealing of assets". T... | Electronic theft of data is causing more loss than what? | {
"answer_start": [
289
],
"text": [
"physical stealing of assets"
]
} |
5709750fed30961900e84188 | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | Technology that is used to implement secure operating systems is one use of what term? | {
"answer_start": [
21
],
"text": [
"computer security"
]
} |
5709750fed30961900e84189 | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | What does EAL stand for? | {
"answer_start": [
327
],
"text": [
"Evaluation Assurance Levels"
]
} |
5709750fed30961900e8418a | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | What is the standard of EAL4? | {
"answer_start": [
419
],
"text": [
"Methodically Designed, Tested and Reviewed"
]
} |
5709750fed30961900e8418b | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | What is the standard for EAL6? | {
"answer_start": [
578
],
"text": [
"Semiformally Verified Design and Tested"
]
} |
5709750fed30961900e8418c | Computer_security | One use of the term "computer security" refers to technology that is used to implement secure operating systems. In the 1980s the United States Department of Defense (DoD) used the "Orange Book" standards, but the current international standard ISO/IEC 15408, "Common Criteria" defines a number of progressively more str... | What is an example of a system that meets EAL6? | {
"answer_start": [
630
],
"text": [
"Integrity-178B"
]
} |
57097780200fba1400368033 | Computer_security | China's network security and information technology leadership team was established February 27, 2014. The leadership team is tasked with national security and long-term development and co-ordination of major issues related to network security and information technology. Economic, political, cultural, social and milita... | When was Chine's network security and information technology leadership team established? | {
"answer_start": [
84
],
"text": [
"February 27, 2014"
]
} |
57097780200fba1400368034 | Computer_security | China's network security and information technology leadership team was established February 27, 2014. The leadership team is tasked with national security and long-term development and co-ordination of major issues related to network security and information technology. Economic, political, cultural, social and milita... | What is the reason for studying the promotion of national network security ad information technology law? | {
"answer_start": [
565
],
"text": [
"enhanced national security capabilities."
]
} |
57097780200fba1400368035 | Computer_security | China's network security and information technology leadership team was established February 27, 2014. The leadership team is tasked with national security and long-term development and co-ordination of major issues related to network security and information technology. Economic, political, cultural, social and milita... | What country has a network security and information technology leadership team?? | {
"answer_start": [
0
],
"text": [
"China"
]
} |
570978aaed30961900e841ae | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | What is the act of surreptitiously listening to a private conversation? | {
"answer_start": [
0
],
"text": [
"Eavesdropping"
]
} |
570978aaed30961900e841af | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | Conversations that people eavesdrop on are typically between who? | {
"answer_start": [
99
],
"text": [
"hosts on a network"
]
} |
570978aaed30961900e841b0 | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | Who has used programs such as Carnivore and NarusInsight to eavesdrop on the systems of internet service providers? | {
"answer_start": [
195
],
"text": [
"the FBI and NSA"
]
} |
570978aaed30961900e841b1 | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | Eavesdropping on a closed system via the faint electro-magnetic trasmissions generated by the hardware has been referred to as what by the NSA? | {
"answer_start": [
469
],
"text": [
"TEMPEST"
]
} |
570978aaed30961900e841b2 | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | What are machines that operate with no contact to the outside world called? | {
"answer_start": [
300
],
"text": [
"a closed system"
]
} |
57097fd9ed30961900e84234 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | What are desktop computers and laptops commonly infected with? | {
"answer_start": [
57
],
"text": [
"malware"
]
} |
57097fd9ed30961900e84235 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | Constructing a botnet to attack another target is an example of the activity of what? | {
"answer_start": [
57
],
"text": [
"malware"
]
} |
57097fd9ed30961900e84236 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | Activity trackers are an example of what? | {
"answer_start": [
257
],
"text": [
"Quantified Self devices"
]
} |
57097fd9ed30961900e84237 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | What could wifi, bluetooth, and cellphone network on devices be used as? | {
"answer_start": [
620
],
"text": [
"attack vectors"
]
} |
57097fd9ed30961900e84238 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | What could be remotely activated after a sucessful breach? | {
"answer_start": [
640
],
"text": [
"sensors"
]
} |
5709828a200fba14003680df | Computer_security | Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ... | What does ACL stand for? | {
"answer_start": [
99
],
"text": [
"access control lists"
]
} |
5709828a200fba14003680e0 | Computer_security | Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ... | ACLs and capability based security are two security models capable of what? | {
"answer_start": [
64
],
"text": [
"enforcing privilege separation"
]
} |
5709828a200fba14003680e1 | Computer_security | Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ... | A host computer tricked into indirectly allowing access to restricted files is known as what? | {
"answer_start": [
351
],
"text": [
"the confused deputy problem"
]
} |
5709828a200fba14003680e3 | Computer_security | Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ... | What must designers of systems that are ACL based do? | {
"answer_start": [
688
],
"text": [
"take responsibility to ensure that they do not introduce flaws"
]
} |
5709828a200fba14003680e2 | Computer_security | Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ... | The confused deputy problem and the problem of not guaranteeing only one person has access are resolved by what? | {
"answer_start": [
553
],
"text": [
"capabilities"
]
} |
57099043200fba1400368199 | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | In what year did over a hundred intrusions made into the Rome Laboraroty? | {
"answer_start": [
3
],
"text": [
"1994"
]
} |
57099043200fba140036819a | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | How were hackers able to obtain unrestricted access to Rome's networking systems? | {
"answer_start": [
151
],
"text": [
"Using trojan horses"
]
} |
57099043200fba140036819b | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | How were hackers able to penetrate connected networks? | {
"answer_start": [
611
],
"text": [
"by posing as a trusted Rome center user"
]
} |
57099043200fba140036819c | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | What is the Rome Laboratory? | {
"answer_start": [
96
],
"text": [
"the US Air Force's main command and research facility"
]
} |
57099043200fba140036819d | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | Who does the Goddard Space Flight Center belong to? | {
"answer_start": [
435
],
"text": [
"National Aeronautics and Space Administration"
]
} |
5709986aed30961900e84366 | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | When did The Impact Team successfully breach Ashley Madison? | {
"answer_start": [
3
],
"text": [
"July of 2015"
]
} |
5709986aed30961900e84367 | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | What is the name of the parent company that created Ashley Madison? | {
"answer_start": [
810
],
"text": [
"Avid Life Media"
]
} |
5709986aed30961900e84368 | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | When did the Avid Life Media CEO resign? | {
"answer_start": [
1002
],
"text": [
"After the second data dump"
]
} |
5709986aed30961900e84369 | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | What was in the first data dump? | {
"answer_start": [
259
],
"text": [
"emails from the company's CEO"
]
} |
5709986aed30961900e8436a | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | What website, in addition to Ashley Madison, was Avid Media instructed to take offline? | {
"answer_start": [
509
],
"text": [
"Established Men"
]
} |
57099c47ed30961900e84378 | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | According to goverment officials, what has the failure of the private sector to solve efficiently the cybersecurity problem created? | {
"answer_start": [
481
],
"text": [
"a crucial need for regulation"
]
} |
57099c47ed30961900e84379 | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | Where was the RSA Security Conference held? | {
"answer_start": [
683
],
"text": [
"San Francisco"
]
} |
57099c47ed30961900e8437a | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | Who believes that government intervention would affect innovation? | {
"answer_start": [
866
],
"text": [
"executives from the private sector"
]
} |
57099c47ed30961900e8437b | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | Who said "industry only responds when you threaten regulation"? | {
"answer_start": [
608
],
"text": [
"R. Clarke"
]
} |
57099c47ed30961900e8437c | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | What is a virtual space free of any government intervention? | {
"answer_start": [
185
],
"text": [
"cyberspace"
]
} |
57099d82ed30961900e84382 | Computer_security | On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi... | When did Public Safety Canada unveil Canada's Cyber Security Strategy? | {
"answer_start": [
3
],
"text": [
"October 3, 2010"
]
} |
57099d82ed30961900e84383 | Computer_security | On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi... | What outlines the ongoing implementation of the Cyber Security Strategy? | {
"answer_start": [
848
],
"text": [
"The Action Plan 2010–2015 for Canada's Cyber Security Strategy"
]
} |
57099d82ed30961900e84384 | Computer_security | On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi... | What outlines the responsibilities and provides a plan for coordination during a cyber incident? | {
"answer_start": [
647
],
"text": [
"The Cyber Incident Management Framework for Canada"
]
} |
57099ea3200fba14003681dd | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | What is a potential attack vector for utilities such as the power grid? | {
"answer_start": [
188
],
"text": [
"The Internet"
]
} |
57099ea3200fba14003681de | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | What demonstrated equipment controlled by computers not connected to the internet can also be vulnerable? | {
"answer_start": [
266
],
"text": [
"the Stuxnet worm"
]
} |
57099ea3200fba14003681df | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | When did the Computer Emergency Readiness Team investigate 79 hacking incidents at energy companies? | {
"answer_start": [
554
],
"text": [
"2014"
]
} |
57099ea3200fba14003681e0 | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | What department does the Computer Emergency Readiness Team belong to? | {
"answer_start": [
613
],
"text": [
"the Department of Homeland Security"
]
} |
57099ea3200fba14003681e1 | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | How did the Stuxnet worm infect industrial equipment? | {
"answer_start": [
530
],
"text": [
"via removable media"
]
} |
57099f7bed30961900e84388 | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | Firewalls and exit procedures are considered what? | {
"answer_start": [
42
],
"text": [
"\"preventive\" measures"
]
} |
57099f7bed30961900e84389 | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | What is defined as a way of filtering network data between a host or network and another network? | {
"answer_start": [
102
],
"text": [
"A firewall"
]
} |
57099f7bed30961900e8438a | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | What does a physical firewall consist of? | {
"answer_start": [
552
],
"text": [
"a separate machine filtering network traffic"
]
} |
57099f7bed30961900e8438b | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | What type of machines normall have a firewall? | {
"answer_start": [
645
],
"text": [
"permanently connected to the Internet"
]
} |
57099f7bed30961900e8438c | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | What compromises mainly preventative measures? | {
"answer_start": [
7
],
"text": [
"computer security"
]
} |
5709a208200fba14003681f7 | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | What has caused serious financial damage? | {
"answer_start": [
44
],
"text": [
"security breaches"
]
} |
5709a208200fba14003681f8 | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | Data made public who is available to estimate the cost of an incident? | {
"answer_start": [
198
],
"text": [
"the organizations involved"
]
} |
5709a208200fba14003681f9 | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | What is the amount of losses estimated from worms and viruses in 2003? | {
"answer_start": [
443
],
"text": [
"$13 billion"
]
} |
5709a208200fba14003681fa | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | Who produces estimates of worldwide losses attributable to security breaches? | {
"answer_start": [
227
],
"text": [
"Several computer security consulting firms"
]
} |
5709a208200fba14003681fb | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | What is the underlying methodology of finding worldwide estimates for losses fur to security breaches? | {
"answer_start": [
617
],
"text": [
"basically anecdotal"
]
} |
5709a2e5200fba1400368201 | Computer_security | While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i... | Microchips vulnerabilities are introduced when? | {
"answer_start": [
108
],
"text": [
"during the manufacturing process"
]
} |
5709a2e5200fba1400368202 | Computer_security | While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i... | What offers an alternative to soft-ware only computer security? | {
"answer_start": [
142
],
"text": [
"hardware-based or assisted computer security"
]
} |
5709a2e5200fba1400368203 | Computer_security | While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i... | What can hardware be a source of? | {
"answer_start": [
34
],
"text": [
"insecurity"
]
} |
5709a2e5200fba1400368204 | Computer_security | While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i... | What is required in order for hardware to be compromised? | {
"answer_start": [
443
],
"text": [
"physical access (or sophisticated backdoor access)"
]
} |
5709a391200fba1400368209 | Computer_security | Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o... | What does CCIRC stand for? | {
"answer_start": [
23
],
"text": [
"Canadian Cyber Incident Response Centre"
]
} |
5709a391200fba140036820a | Computer_security | Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o... | Who is resposible for mitigating and responding to threats to Canada's critical infrastructure? | {
"answer_start": [
64
],
"text": [
"CCIRC"
]
} |
5709a391200fba140036820b | Computer_security | Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o... | Where does the CCIRC post regular cyber security bulletins? | {
"answer_start": [
438
],
"text": [
"on the Public Safety Canada website"
]
} |
5709a391200fba140036820c | Computer_security | Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o... | What functions as a counterpart document to the National Strategy and Action Plan for Critical Infrastructure? | {
"answer_start": [
589
],
"text": [
"Canada's Cyber Security Strategy"
]
} |
5709a509200fba1400368211 | Computer_security | This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi... | Who said "Connectedness begets vulnerability?" | {
"answer_start": [
404
],
"text": [
"Jay Cross"
]
} |
5709a509200fba1400368212 | Computer_security | This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi... | What organization does Jay Cross belong to? | {
"answer_start": [
438
],
"text": [
"the Internet Time Group"
]
} |
5709a509200fba1400368213 | Computer_security | This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi... | What is the advantage of more critical infrastructure being controlled via computer programs? | {
"answer_start": [
159
],
"text": [
"increasing efficiency"
]
} |
5709a509200fba1400368214 | Computer_security | This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi... | What is the disadvantage of more critical infrastructure being controlled via computer programs? | {
"answer_start": [
182
],
"text": [
"exposes new vulnerabilities"
]
} |
5709a5d5ed30961900e843bc | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | When did Public Safety Canada partner with Stop.Think. Connect? | {
"answer_start": [
3
],
"text": [
"September 27, 2010"
]
} |
5709a5d5ed30961900e843bd | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | When was the Cyber Security Cooperation Program launched by the Government of Canada? | {
"answer_start": [
233
],
"text": [
"February 4, 2014"
]
} |
5709a5d5ed30961900e843be | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | Who routinely updates the GetCyberSafe portal for Canadian citizens? | {
"answer_start": [
593
],
"text": [
"Public Safety Canada"
]
} |
5709a5d5ed30961900e843bf | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | What month is Cyber Security Awareness Month? | {
"answer_start": [
749
],
"text": [
"October"
]
} |
5709a5d5ed30961900e843c0 | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | How much does the Cyber Security Cooperation Program cost? | {
"answer_start": [
342
],
"text": [
"$1.5 million"
]
} |
5709a7c7200fba1400368219 | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure... | Installing keyloggers and making operating system modifications are examples of ways unauthorized users for what? | {
"answer_start": [
128
],
"text": [
"compromise security"
]
} |
5709a7c7200fba140036821a | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure... | Booting a tool or another operating system from a CD Rom can bypass what? | {
"answer_start": [
295
],
"text": [
"standard security measures"
]
} |
5709a7c7200fba140036821b | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure... | Disk encryption and Trusted Platform Module are designed to prevent what? | {
"answer_start": [
514
],
"text": [
"attacks"
]
} |
5709a7c7200fba140036821c | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure... | An unauthorized user with physical access to a computer can likely do what? | {
"answer_start": [
82
],
"text": [
"directly download data from it"
]
} |
5709a8dd200fba140036822b | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | UI redress attack or User Interface redress attack is also known as what? | {
"answer_start": [
0
],
"text": [
"Clickjacking"
]
} |
5709a8dd200fba140036822c | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | What is a malicious technique in which an attacker tricks the user into clicking on a button or link? | {
"answer_start": [
0
],
"text": [
"Clickjacking"
]
} |
5709a8dd200fba140036822d | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | Where are the clicks meant for the top level page routed? | {
"answer_start": [
407
],
"text": [
"some other irrelevant page"
]
} |
5709a8dd200fba140036822e | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | Where would a password typed on a seemingly authetic webpage be directed? | {
"answer_start": [
748
],
"text": [
"into an invisible frame controlled by the attacker"
]
} |
5709a8dd200fba140036822f | Computer_security | Clickjacking, also known as "UI redress attack or User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page. This is done using multiple transparent or opaque layers. The attacke... | How istricking the user accomplished in clickjacking? | {
"answer_start": [
264
],
"text": [
"using multiple transparent or opaque layers"
]
} |
5709a976ed30961900e843da | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co... | How many computers were connected to the internet in 1988? | {
"answer_start": [
14
],
"text": [
"60,000"
]
} |
5709a976ed30961900e843db | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co... | When was the first computer worm released? | {
"answer_start": [
137
],
"text": [
"November 2, 1988"
]
} |
5709a976ed30961900e843dc | Computer_security | In 1988, only 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On November 2, 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet "co... | Who was the first computer worm traced back to? | {
"answer_start": [
414
],
"text": [
"Robert Tappan Morris, Jr."
]
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.