id stringlengths 24 24 | title stringclasses 442
values | context stringlengths 151 3.71k | question stringlengths 1 25.7k | answers dict |
|---|---|---|---|---|
5a5cba215e8782001a9d5d8d | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | What is a conversation between hosts on a network called? | {
"text": [],
"answer_start": []
} |
5a5cba215e8782001a9d5d8e | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | What is special about hosts on a network? | {
"text": [],
"answer_start": []
} |
5a5cba215e8782001a9d5d8f | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | What transmissions does NarusInsight listen to? | {
"text": [],
"answer_start": []
} |
5a5cba215e8782001a9d5d90 | Computer_security | Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e... | What program does the FBI use to eavesdrop on closed systems? | {
"text": [],
"answer_start": []
} |
57097fd9ed30961900e84234 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | What are desktop computers and laptops commonly infected with? | {
"text": [
"malware"
],
"answer_start": [
57
]
} |
57097fd9ed30961900e84235 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | Constructing a botnet to attack another target is an example of the activity of what? | {
"text": [
"malware"
],
"answer_start": [
57
]
} |
57097fd9ed30961900e84236 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | Activity trackers are an example of what? | {
"text": [
"Quantified Self devices"
],
"answer_start": [
257
]
} |
57097fd9ed30961900e84237 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | What could wifi, bluetooth, and cellphone network on devices be used as? | {
"text": [
"attack vectors"
],
"answer_start": [
620
]
} |
57097fd9ed30961900e84238 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | What could be remotely activated after a sucessful breach? | {
"text": [
"sensors"
],
"answer_start": [
640
]
} |
5a555504134fea001a0e1a34 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | What do malware programs intend to collect from laptops and computers? | {
"text": [],
"answer_start": []
} |
5a555504134fea001a0e1a35 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | What is the secondary interest of an attacker using malware? | {
"text": [],
"answer_start": []
} |
5a555504134fea001a0e1a36 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | Why do gadgets that have GPS or collect data about your habits put you at risk for an attack? | {
"text": [],
"answer_start": []
} |
5a555504134fea001a0e1a37 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | What could be collected from your devices by an attacker? | {
"text": [],
"answer_start": []
} |
5a555504134fea001a0e1a38 | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | What are cameras, microphones, GPS receivers, compasses and accelerometers considered? | {
"text": [],
"answer_start": []
} |
5a5cca8f5e8782001a9d5daa | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | What is the name of the malware that affects activity trackers? | {
"text": [],
"answer_start": []
} |
5a5cca8f5e8782001a9d5dab | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | What is another name for malware? | {
"text": [],
"answer_start": []
} |
5a5cca8f5e8782001a9d5dac | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | How are Quantified Self Devices breached? | {
"text": [],
"answer_start": []
} |
5a5cca8f5e8782001a9d5dad | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | What sensitive information do wifi networks carry? | {
"text": [],
"answer_start": []
} |
5a5cca8f5e8782001a9d5dae | Computer_security | Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become... | What type of information is rarely collected from a laptop? | {
"text": [],
"answer_start": []
} |
5709828a200fba14003680df | Computer_security | Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ... | What does ACL stand for? | {
"text": [
"access control lists"
],
"answer_start": [
99
]
} |
5709828a200fba14003680e0 | Computer_security | Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ... | ACLs and capability based security are two security models capable of what? | {
"text": [
"enforcing privilege separation"
],
"answer_start": [
64
]
} |
5709828a200fba14003680e1 | Computer_security | Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ... | A host computer tricked into indirectly allowing access to restricted files is known as what? | {
"text": [
"the confused deputy problem"
],
"answer_start": [
351
]
} |
5709828a200fba14003680e2 | Computer_security | Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ... | The confused deputy problem and the problem of not guaranteeing only one person has access are resolved by what? | {
"text": [
"capabilities"
],
"answer_start": [
553
]
} |
5709828a200fba14003680e3 | Computer_security | Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ... | What must designers of systems that are ACL based do? | {
"text": [
"take responsibility to ensure that they do not introduce flaws"
],
"answer_start": [
688
]
} |
5a556f78134fea001a0e1a7a | Computer_security | Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ... | What has using ACLs to confine programs proven? | {
"text": [],
"answer_start": []
} |
5a556f78134fea001a0e1a7b | Computer_security | Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ... | How can a computer with ACL be tricked? | {
"text": [],
"answer_start": []
} |
5a556f78134fea001a0e1a7c | Computer_security | Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ... | Which two models in computer systems enforce privilege separation? | {
"text": [],
"answer_start": []
} |
5a556f78134fea001a0e1a7d | Computer_security | Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ... | Can an ACLs limit access to one person? | {
"text": [],
"answer_start": []
} |
5a5cdafc5e8782001a9d5df0 | Computer_security | Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ... | What is the total number of security models in a computer system? | {
"text": [],
"answer_start": []
} |
5a5cdafc5e8782001a9d5df1 | Computer_security | Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ... | When is an ACL most secure? | {
"text": [],
"answer_start": []
} |
5a5cdafc5e8782001a9d5df2 | Computer_security | Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ... | What prevents ACLs from giving access to only one person? | {
"text": [],
"answer_start": []
} |
5a5cdafc5e8782001a9d5df3 | Computer_security | Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ... | What do ACLs promise? | {
"text": [],
"answer_start": []
} |
5a5cdafc5e8782001a9d5df4 | Computer_security | Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ... | Who is not responsible for the flaws in an ACL system? | {
"text": [],
"answer_start": []
} |
57099043200fba1400368199 | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | In what year did over a hundred intrusions made into the Rome Laboraroty? | {
"text": [
"1994"
],
"answer_start": [
3
]
} |
57099043200fba140036819a | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | How were hackers able to obtain unrestricted access to Rome's networking systems? | {
"text": [
"Using trojan horses"
],
"answer_start": [
151
]
} |
57099043200fba140036819b | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | How were hackers able to penetrate connected networks? | {
"text": [
"by posing as a trusted Rome center user"
],
"answer_start": [
611
]
} |
57099043200fba140036819c | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | What is the Rome Laboratory? | {
"text": [
"the US Air Force's main command and research facility"
],
"answer_start": [
96
]
} |
57099043200fba140036819d | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | Who does the Goddard Space Flight Center belong to? | {
"text": [
"National Aeronautics and Space Administration"
],
"answer_start": [
435
]
} |
5a557333134fea001a0e1a8c | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | What did the hackers obtain? | {
"text": [],
"answer_start": []
} |
5a557333134fea001a0e1a8d | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | Why were the hackers untraceable? | {
"text": [],
"answer_start": []
} |
5a557333134fea001a0e1a8e | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | Posing as a trusted Rome Center user what did hackers use? | {
"text": [],
"answer_start": []
} |
5a557333134fea001a0e1a8f | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | Intrusion hackers were thought to be who? | {
"text": [],
"answer_start": []
} |
5a557333134fea001a0e1a90 | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | How were hackers able to go undetected? | {
"text": [],
"answer_start": []
} |
5a5ce5af5e8782001a9d5e04 | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | Who were the crackers identified as? | {
"text": [],
"answer_start": []
} |
5a5ce5af5e8782001a9d5e05 | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | When was the Rome Laboratory created? | {
"text": [],
"answer_start": []
} |
5a5ce5af5e8782001a9d5e06 | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | What were the intruders unable to access? | {
"text": [],
"answer_start": []
} |
5a5ce5af5e8782001a9d5e07 | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | What did the 1994 breach of the National Aeronautics and Space Administration's Goddard Space Flight Center also give the crackers access to? | {
"text": [],
"answer_start": []
} |
5a5ce5af5e8782001a9d5e08 | Computer_security | In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai... | What type of intrusion did the crackers use to gain access to Rome Laboratory? | {
"text": [],
"answer_start": []
} |
5709986aed30961900e84366 | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | When did The Impact Team successfully breach Ashley Madison? | {
"text": [
"July of 2015"
],
"answer_start": [
3
]
} |
5709986aed30961900e84367 | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | What is the name of the parent company that created Ashley Madison? | {
"text": [
"Avid Life Media"
],
"answer_start": [
810
]
} |
5709986aed30961900e84368 | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | When did the Avid Life Media CEO resign? | {
"text": [
"After the second data dump"
],
"answer_start": [
1002
]
} |
5709986aed30961900e84369 | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | What was in the first data dump? | {
"text": [
"emails from the company's CEO"
],
"answer_start": [
259
]
} |
5709986aed30961900e8436a | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | What website, in addition to Ashley Madison, was Avid Media instructed to take offline? | {
"text": [
"Established Men"
],
"answer_start": [
509
]
} |
5a557564134fea001a0e1aa0 | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | Why was the website to be removed? | {
"text": [],
"answer_start": []
} |
5a557564134fea001a0e1aa1 | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | How did the site remain functional after the data breach? | {
"text": [],
"answer_start": []
} |
5a557564134fea001a0e1aa2 | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | What was the response from people using the service? | {
"text": [],
"answer_start": []
} |
5a557564134fea001a0e1aa3 | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | Was the Goal of the Impact Team carried out? | {
"text": [],
"answer_start": []
} |
5a557564134fea001a0e1aa4 | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | Were other sites compromised in addition to Ashley Madison? | {
"text": [],
"answer_start": []
} |
5a5ce7425e8782001a9d5e18 | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | Who was the CEO of Ashley Madison? | {
"text": [],
"answer_start": []
} |
5a5ce7425e8782001a9d5e19 | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | When was Ashley Madison taken down? | {
"text": [],
"answer_start": []
} |
5a5ce7425e8782001a9d5e1a | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | When was Established Man taken offline? | {
"text": [],
"answer_start": []
} |
5a5ce7425e8782001a9d5e1b | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | How large was the data dump of the CEO's emails? | {
"text": [],
"answer_start": []
} |
5a5ce7425e8782001a9d5e1c | Computer_security | In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre... | Why was the customer data dumped first? | {
"text": [],
"answer_start": []
} |
57099c47ed30961900e84378 | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | According to goverment officials, what has the failure of the private sector to solve efficiently the cybersecurity problem created? | {
"text": [
"a crucial need for regulation"
],
"answer_start": [
481
]
} |
57099c47ed30961900e84379 | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | Where was the RSA Security Conference held? | {
"text": [
"San Francisco"
],
"answer_start": [
683
]
} |
57099c47ed30961900e8437a | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | Who believes that government intervention would affect innovation? | {
"text": [
"executives from the private sector"
],
"answer_start": [
866
]
} |
57099c47ed30961900e8437b | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | Who said "industry only responds when you threaten regulation"? | {
"text": [
"R. Clarke"
],
"answer_start": [
608
]
} |
57099c47ed30961900e8437c | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | What is a virtual space free of any government intervention? | {
"text": [
"cyberspace"
],
"answer_start": [
185
]
} |
5a55762f134fea001a0e1aaa | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | What is the polemical problem presented? | {
"text": [],
"answer_start": []
} |
5a55762f134fea001a0e1aab | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | What is considered vital of the internet? | {
"text": [],
"answer_start": []
} |
5a55762f134fea001a0e1aac | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | Who currently runs cyberspace? | {
"text": [],
"answer_start": []
} |
5a55762f134fea001a0e1aad | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | Is the cyberspace industry under attack or threatened by regulation? | {
"text": [],
"answer_start": []
} |
5a55762f134fea001a0e1aae | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | Who believes they are better at improving cyberspace? | {
"text": [],
"answer_start": []
} |
5a5cf3d75e8782001a9d5e2c | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | What do most people agree on in regards to internet security? | {
"text": [],
"answer_start": []
} |
5a5cf3d75e8782001a9d5e2d | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | Why did R. Clarke want to avoid government intervention? | {
"text": [],
"answer_start": []
} |
5a5cf3d75e8782001a9d5e2e | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | Where is government intervention most common? | {
"text": [],
"answer_start": []
} |
5a5cf3d75e8782001a9d5e2f | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | Why is threatening an industry unhelpful according to Clarke? | {
"text": [],
"answer_start": []
} |
5a5cf3d75e8782001a9d5e30 | Computer_security | The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th... | Where is Clarke from? | {
"text": [],
"answer_start": []
} |
57099d82ed30961900e84382 | Computer_security | On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi... | When did Public Safety Canada unveil Canada's Cyber Security Strategy? | {
"text": [
"October 3, 2010"
],
"answer_start": [
3
]
} |
57099d82ed30961900e84383 | Computer_security | On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi... | What outlines the ongoing implementation of the Cyber Security Strategy? | {
"text": [
"The Action Plan 2010–2015 for Canada's Cyber Security Strategy"
],
"answer_start": [
848
]
} |
57099d82ed30961900e84384 | Computer_security | On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi... | What outlines the responsibilities and provides a plan for coordination during a cyber incident? | {
"text": [
"The Cyber Incident Management Framework for Canada"
],
"answer_start": [
647
]
} |
5a557754134fea001a0e1ab4 | Computer_security | On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi... | Canadian cyberspace was boosted by who? | {
"text": [],
"answer_start": []
} |
5a557754134fea001a0e1ab5 | Computer_security | On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi... | Multiple departments were involved in what? | {
"text": [],
"answer_start": []
} |
5a557754134fea001a0e1ab6 | Computer_security | On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi... | What type of plan is provided? | {
"text": [],
"answer_start": []
} |
5a557754134fea001a0e1ab7 | Computer_security | On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi... | Why was a cyber security plan unveiled in October of 2010? | {
"text": [],
"answer_start": []
} |
5a557754134fea001a0e1ab8 | Computer_security | On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi... | Who is the security measure meant to help the most? | {
"text": [],
"answer_start": []
} |
5a5cfad65e8782001a9d5e36 | Computer_security | On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi... | When was Public Safety Canada founded? | {
"text": [],
"answer_start": []
} |
5a5cfad65e8782001a9d5e37 | Computer_security | On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi... | How many departments does the new strategy involve? | {
"text": [],
"answer_start": []
} |
5a5cfad65e8782001a9d5e38 | Computer_security | On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi... | Who created the Action Plan? | {
"text": [],
"answer_start": []
} |
5a5cfad65e8782001a9d5e39 | Computer_security | On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi... | What was the predecessor to Canada's Cyber Security Strategy? | {
"text": [],
"answer_start": []
} |
5a5cfad65e8782001a9d5e3a | Computer_security | On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi... | When was the Speech from the Throne? | {
"text": [],
"answer_start": []
} |
57099ea3200fba14003681dd | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | What is a potential attack vector for utilities such as the power grid? | {
"text": [
"The Internet"
],
"answer_start": [
188
]
} |
57099ea3200fba14003681de | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | What demonstrated equipment controlled by computers not connected to the internet can also be vulnerable? | {
"text": [
"the Stuxnet worm"
],
"answer_start": [
266
]
} |
57099ea3200fba14003681df | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | When did the Computer Emergency Readiness Team investigate 79 hacking incidents at energy companies? | {
"text": [
"2014"
],
"answer_start": [
554
]
} |
57099ea3200fba14003681e0 | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | What department does the Computer Emergency Readiness Team belong to? | {
"text": [
"the Department of Homeland Security"
],
"answer_start": [
613
]
} |
57099ea3200fba14003681e1 | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | How did the Stuxnet worm infect industrial equipment? | {
"text": [
"via removable media"
],
"answer_start": [
530
]
} |
5a55538e134fea001a0e1a2a | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | What division was part of the Department of Homeland Security? | {
"text": [],
"answer_start": []
} |
5a55538e134fea001a0e1a2b | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | Can computers not attached to the internet be attack by a virus? | {
"text": [],
"answer_start": []
} |
5a55538e134fea001a0e1a2c | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | What industrial equipment effected after receiving malicious commands? | {
"text": [],
"answer_start": []
} |
5a55538e134fea001a0e1a2d | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | What type of damage was dealt to the industrial equipment? | {
"text": [],
"answer_start": []
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.