id
stringlengths
24
24
title
stringclasses
442 values
context
stringlengths
151
3.71k
question
stringlengths
1
25.7k
answers
dict
5a5cba215e8782001a9d5d8d
Computer_security
Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e...
What is a conversation between hosts on a network called?
{ "text": [], "answer_start": [] }
5a5cba215e8782001a9d5d8e
Computer_security
Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e...
What is special about hosts on a network?
{ "text": [], "answer_start": [] }
5a5cba215e8782001a9d5d8f
Computer_security
Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e...
What transmissions does NarusInsight listen to?
{ "text": [], "answer_start": [] }
5a5cba215e8782001a9d5d90
Computer_security
Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e...
What program does the FBI use to eavesdrop on closed systems?
{ "text": [], "answer_start": [] }
57097fd9ed30961900e84234
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
What are desktop computers and laptops commonly infected with?
{ "text": [ "malware" ], "answer_start": [ 57 ] }
57097fd9ed30961900e84235
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
Constructing a botnet to attack another target is an example of the activity of what?
{ "text": [ "malware" ], "answer_start": [ 57 ] }
57097fd9ed30961900e84236
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
Activity trackers are an example of what?
{ "text": [ "Quantified Self devices" ], "answer_start": [ 257 ] }
57097fd9ed30961900e84237
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
What could wifi, bluetooth, and cellphone network on devices be used as?
{ "text": [ "attack vectors" ], "answer_start": [ 620 ] }
57097fd9ed30961900e84238
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
What could be remotely activated after a sucessful breach?
{ "text": [ "sensors" ], "answer_start": [ 640 ] }
5a555504134fea001a0e1a34
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
What do malware programs intend to collect from laptops and computers?
{ "text": [], "answer_start": [] }
5a555504134fea001a0e1a35
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
What is the secondary interest of an attacker using malware?
{ "text": [], "answer_start": [] }
5a555504134fea001a0e1a36
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
Why do gadgets that have GPS or collect data about your habits put you at risk for an attack?
{ "text": [], "answer_start": [] }
5a555504134fea001a0e1a37
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
What could be collected from your devices by an attacker?
{ "text": [], "answer_start": [] }
5a555504134fea001a0e1a38
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
What are cameras, microphones, GPS receivers, compasses and accelerometers considered?
{ "text": [], "answer_start": [] }
5a5cca8f5e8782001a9d5daa
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
What is the name of the malware that affects activity trackers?
{ "text": [], "answer_start": [] }
5a5cca8f5e8782001a9d5dab
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
What is another name for malware?
{ "text": [], "answer_start": [] }
5a5cca8f5e8782001a9d5dac
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
How are Quantified Self Devices breached?
{ "text": [], "answer_start": [] }
5a5cca8f5e8782001a9d5dad
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
What sensitive information do wifi networks carry?
{ "text": [], "answer_start": [] }
5a5cca8f5e8782001a9d5dae
Computer_security
Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become...
What type of information is rarely collected from a laptop?
{ "text": [], "answer_start": [] }
5709828a200fba14003680df
Computer_security
Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ...
What does ACL stand for?
{ "text": [ "access control lists" ], "answer_start": [ 99 ] }
5709828a200fba14003680e0
Computer_security
Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ...
ACLs and capability based security are two security models capable of what?
{ "text": [ "enforcing privilege separation" ], "answer_start": [ 64 ] }
5709828a200fba14003680e1
Computer_security
Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ...
A host computer tricked into indirectly allowing access to restricted files is known as what?
{ "text": [ "the confused deputy problem" ], "answer_start": [ 351 ] }
5709828a200fba14003680e2
Computer_security
Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ...
The confused deputy problem and the problem of not guaranteeing only one person has access are resolved by what?
{ "text": [ "capabilities" ], "answer_start": [ 553 ] }
5709828a200fba14003680e3
Computer_security
Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ...
What must designers of systems that are ACL based do?
{ "text": [ "take responsibility to ensure that they do not introduce flaws" ], "answer_start": [ 688 ] }
5a556f78134fea001a0e1a7a
Computer_security
Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ...
What has using ACLs to confine programs proven?
{ "text": [], "answer_start": [] }
5a556f78134fea001a0e1a7b
Computer_security
Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ...
How can a computer with ACL be tricked?
{ "text": [], "answer_start": [] }
5a556f78134fea001a0e1a7c
Computer_security
Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ...
Which two models in computer systems enforce privilege separation?
{ "text": [], "answer_start": [] }
5a556f78134fea001a0e1a7d
Computer_security
Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ...
Can an ACLs limit access to one person?
{ "text": [], "answer_start": [] }
5a5cdafc5e8782001a9d5df0
Computer_security
Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ...
What is the total number of security models in a computer system?
{ "text": [], "answer_start": [] }
5a5cdafc5e8782001a9d5df1
Computer_security
Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ...
When is an ACL most secure?
{ "text": [], "answer_start": [] }
5a5cdafc5e8782001a9d5df2
Computer_security
Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ...
What prevents ACLs from giving access to only one person?
{ "text": [], "answer_start": [] }
5a5cdafc5e8782001a9d5df3
Computer_security
Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ...
What do ACLs promise?
{ "text": [], "answer_start": [] }
5a5cdafc5e8782001a9d5df4
Computer_security
Within computer systems, two of many security models capable of enforcing privilege separation are access control lists (ACLs) and capability-based security. Using ACLs to confine programs has been proven to be insecure in many situations, such as if the host computer can be tricked into indirectly allowing restricted ...
Who is not responsible for the flaws in an ACL system?
{ "text": [], "answer_start": [] }
57099043200fba1400368199
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
In what year did over a hundred intrusions made into the Rome Laboraroty?
{ "text": [ "1994" ], "answer_start": [ 3 ] }
57099043200fba140036819a
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
How were hackers able to obtain unrestricted access to Rome's networking systems?
{ "text": [ "Using trojan horses" ], "answer_start": [ 151 ] }
57099043200fba140036819b
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
How were hackers able to penetrate connected networks?
{ "text": [ "by posing as a trusted Rome center user" ], "answer_start": [ 611 ] }
57099043200fba140036819c
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
What is the Rome Laboratory?
{ "text": [ "the US Air Force's main command and research facility" ], "answer_start": [ 96 ] }
57099043200fba140036819d
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
Who does the Goddard Space Flight Center belong to?
{ "text": [ "National Aeronautics and Space Administration" ], "answer_start": [ 435 ] }
5a557333134fea001a0e1a8c
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
What did the hackers obtain?
{ "text": [], "answer_start": [] }
5a557333134fea001a0e1a8d
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
Why were the hackers untraceable?
{ "text": [], "answer_start": [] }
5a557333134fea001a0e1a8e
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
Posing as a trusted Rome Center user what did hackers use?
{ "text": [], "answer_start": [] }
5a557333134fea001a0e1a8f
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
Intrusion hackers were thought to be who?
{ "text": [], "answer_start": [] }
5a557333134fea001a0e1a90
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
How were hackers able to go undetected?
{ "text": [], "answer_start": [] }
5a5ce5af5e8782001a9d5e04
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
Who were the crackers identified as?
{ "text": [], "answer_start": [] }
5a5ce5af5e8782001a9d5e05
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
When was the Rome Laboratory created?
{ "text": [], "answer_start": [] }
5a5ce5af5e8782001a9d5e06
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
What were the intruders unable to access?
{ "text": [], "answer_start": [] }
5a5ce5af5e8782001a9d5e07
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
What did the 1994 breach of the National Aeronautics and Space Administration's Goddard Space Flight Center also give the crackers access to?
{ "text": [], "answer_start": [] }
5a5ce5af5e8782001a9d5e08
Computer_security
In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtai...
What type of intrusion did the crackers use to gain access to Rome Laboratory?
{ "text": [], "answer_start": [] }
5709986aed30961900e84366
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
When did The Impact Team successfully breach Ashley Madison?
{ "text": [ "July of 2015" ], "answer_start": [ 3 ] }
5709986aed30961900e84367
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
What is the name of the parent company that created Ashley Madison?
{ "text": [ "Avid Life Media" ], "answer_start": [ 810 ] }
5709986aed30961900e84368
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
When did the Avid Life Media CEO resign?
{ "text": [ "After the second data dump" ], "answer_start": [ 1002 ] }
5709986aed30961900e84369
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
What was in the first data dump?
{ "text": [ "emails from the company's CEO" ], "answer_start": [ 259 ] }
5709986aed30961900e8436a
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
What website, in addition to Ashley Madison, was Avid Media instructed to take offline?
{ "text": [ "Established Men" ], "answer_start": [ 509 ] }
5a557564134fea001a0e1aa0
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
Why was the website to be removed?
{ "text": [], "answer_start": [] }
5a557564134fea001a0e1aa1
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
How did the site remain functional after the data breach?
{ "text": [], "answer_start": [] }
5a557564134fea001a0e1aa2
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
What was the response from people using the service?
{ "text": [], "answer_start": [] }
5a557564134fea001a0e1aa3
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
Was the Goal of the Impact Team carried out?
{ "text": [], "answer_start": [] }
5a557564134fea001a0e1aa4
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
Were other sites compromised in addition to Ashley Madison?
{ "text": [], "answer_start": [] }
5a5ce7425e8782001a9d5e18
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
Who was the CEO of Ashley Madison?
{ "text": [], "answer_start": [] }
5a5ce7425e8782001a9d5e19
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
When was Ashley Madison taken down?
{ "text": [], "answer_start": [] }
5a5ce7425e8782001a9d5e1a
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
When was Established Man taken offline?
{ "text": [], "answer_start": [] }
5a5ce7425e8782001a9d5e1b
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
How large was the data dump of the CEO's emails?
{ "text": [], "answer_start": [] }
5a5ce7425e8782001a9d5e1c
Computer_security
In July of 2015, a hacker group known as "The Impact Team" successfully breached the extramarital relationship website Ashley Madison. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and thre...
Why was the customer data dumped first?
{ "text": [], "answer_start": [] }
57099c47ed30961900e84378
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
According to goverment officials, what has the failure of the private sector to solve efficiently the cybersecurity problem created?
{ "text": [ "a crucial need for regulation" ], "answer_start": [ 481 ] }
57099c47ed30961900e84379
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
Where was the RSA Security Conference held?
{ "text": [ "San Francisco" ], "answer_start": [ 683 ] }
57099c47ed30961900e8437a
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
Who believes that government intervention would affect innovation?
{ "text": [ "executives from the private sector" ], "answer_start": [ 866 ] }
57099c47ed30961900e8437b
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
Who said "industry only responds when you threaten regulation"?
{ "text": [ "R. Clarke" ], "answer_start": [ 608 ] }
57099c47ed30961900e8437c
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
What is a virtual space free of any government intervention?
{ "text": [ "cyberspace" ], "answer_start": [ 185 ] }
5a55762f134fea001a0e1aaa
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
What is the polemical problem presented?
{ "text": [], "answer_start": [] }
5a55762f134fea001a0e1aab
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
What is considered vital of the internet?
{ "text": [], "answer_start": [] }
5a55762f134fea001a0e1aac
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
Who currently runs cyberspace?
{ "text": [], "answer_start": [] }
5a55762f134fea001a0e1aad
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
Is the cyberspace industry under attack or threatened by regulation?
{ "text": [], "answer_start": [] }
5a55762f134fea001a0e1aae
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
Who believes they are better at improving cyberspace?
{ "text": [], "answer_start": [] }
5a5cf3d75e8782001a9d5e2c
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
What do most people agree on in regards to internet security?
{ "text": [], "answer_start": [] }
5a5cf3d75e8782001a9d5e2d
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
Why did R. Clarke want to avoid government intervention?
{ "text": [], "answer_start": [] }
5a5cf3d75e8782001a9d5e2e
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
Where is government intervention most common?
{ "text": [], "answer_start": [] }
5a5cf3d75e8782001a9d5e2f
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
Why is threatening an industry unhelpful according to Clarke?
{ "text": [], "answer_start": [] }
5a5cf3d75e8782001a9d5e30
Computer_security
The question of whether the government should intervene or not in the regulation of the cyberspace is a very polemical one. Indeed, for as long as it has existed and by definition, the cyberspace is a virtual space free of any government intervention. Where everyone agree that an improvement on cybersecurity is more th...
Where is Clarke from?
{ "text": [], "answer_start": [] }
57099d82ed30961900e84382
Computer_security
On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi...
When did Public Safety Canada unveil Canada's Cyber Security Strategy?
{ "text": [ "October 3, 2010" ], "answer_start": [ 3 ] }
57099d82ed30961900e84383
Computer_security
On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi...
What outlines the ongoing implementation of the Cyber Security Strategy?
{ "text": [ "The Action Plan 2010–2015 for Canada's Cyber Security Strategy" ], "answer_start": [ 848 ] }
57099d82ed30961900e84384
Computer_security
On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi...
What outlines the responsibilities and provides a plan for coordination during a cyber incident?
{ "text": [ "The Cyber Incident Management Framework for Canada" ], "answer_start": [ 647 ] }
5a557754134fea001a0e1ab4
Computer_security
On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi...
Canadian cyberspace was boosted by who?
{ "text": [], "answer_start": [] }
5a557754134fea001a0e1ab5
Computer_security
On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi...
Multiple departments were involved in what?
{ "text": [], "answer_start": [] }
5a557754134fea001a0e1ab6
Computer_security
On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi...
What type of plan is provided?
{ "text": [], "answer_start": [] }
5a557754134fea001a0e1ab7
Computer_security
On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi...
Why was a cyber security plan unveiled in October of 2010?
{ "text": [], "answer_start": [] }
5a557754134fea001a0e1ab8
Computer_security
On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi...
Who is the security measure meant to help the most?
{ "text": [], "answer_start": [] }
5a5cfad65e8782001a9d5e36
Computer_security
On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi...
When was Public Safety Canada founded?
{ "text": [], "answer_start": [] }
5a5cfad65e8782001a9d5e37
Computer_security
On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi...
How many departments does the new strategy involve?
{ "text": [], "answer_start": [] }
5a5cfad65e8782001a9d5e38
Computer_security
On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi...
Who created the Action Plan?
{ "text": [], "answer_start": [] }
5a5cfad65e8782001a9d5e39
Computer_security
On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi...
What was the predecessor to Canada's Cyber Security Strategy?
{ "text": [], "answer_start": [] }
5a5cfad65e8782001a9d5e3a
Computer_security
On October 3, 2010, Public Safety Canada unveiled Canada’s Cyber Security Strategy, following a Speech from the Throne commitment to boost the security of Canadian cyberspace. The aim of the strategy is to strengthen Canada’s "cyber systems and critical infrastructure sectors, support economic growth and protect Canadi...
When was the Speech from the Throne?
{ "text": [], "answer_start": [] }
57099ea3200fba14003681dd
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
What is a potential attack vector for utilities such as the power grid?
{ "text": [ "The Internet" ], "answer_start": [ 188 ] }
57099ea3200fba14003681de
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
What demonstrated equipment controlled by computers not connected to the internet can also be vulnerable?
{ "text": [ "the Stuxnet worm" ], "answer_start": [ 266 ] }
57099ea3200fba14003681df
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
When did the Computer Emergency Readiness Team investigate 79 hacking incidents at energy companies?
{ "text": [ "2014" ], "answer_start": [ 554 ] }
57099ea3200fba14003681e0
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
What department does the Computer Emergency Readiness Team belong to?
{ "text": [ "the Department of Homeland Security" ], "answer_start": [ 613 ] }
57099ea3200fba14003681e1
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
How did the Stuxnet worm infect industrial equipment?
{ "text": [ "via removable media" ], "answer_start": [ 530 ] }
5a55538e134fea001a0e1a2a
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
What division was part of the Department of Homeland Security?
{ "text": [], "answer_start": [] }
5a55538e134fea001a0e1a2b
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
Can computers not attached to the internet be attack by a virus?
{ "text": [], "answer_start": [] }
5a55538e134fea001a0e1a2c
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
What industrial equipment effected after receiving malicious commands?
{ "text": [], "answer_start": [] }
5a55538e134fea001a0e1a2d
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
What type of damage was dealt to the industrial equipment?
{ "text": [], "answer_start": [] }