id stringlengths 24 24 | title stringclasses 442
values | context stringlengths 151 3.71k | question stringlengths 1 25.7k | answers dict |
|---|---|---|---|---|
5a55538e134fea001a0e1a2e | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | What controls the functions of our utilities such as telecommunications, power grid, nuclear power plants, etc? | {
"text": [],
"answer_start": []
} |
5a5cc7fa5e8782001a9d5da0 | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | What controls computer functions? | {
"text": [],
"answer_start": []
} |
5a5cc7fa5e8782001a9d5da1 | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | Who created the Stuxnet worm? | {
"text": [],
"answer_start": []
} |
5a5cc7fa5e8782001a9d5da2 | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | When was the Stuxnet worm created? | {
"text": [],
"answer_start": []
} |
5a5cc7fa5e8782001a9d5da3 | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | What was infected in the 79 hacking incidents at energy companies? | {
"text": [],
"answer_start": []
} |
5a5cc7fa5e8782001a9d5da4 | Computer_security | Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont... | How many people were on the Computer Emergency Readiness Team? | {
"text": [],
"answer_start": []
} |
57099f7bed30961900e84388 | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | Firewalls and exit procedures are considered what? | {
"text": [
"\"preventive\" measures"
],
"answer_start": [
42
]
} |
57099f7bed30961900e84389 | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | What is defined as a way of filtering network data between a host or network and another network? | {
"text": [
"A firewall"
],
"answer_start": [
102
]
} |
57099f7bed30961900e8438a | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | What does a physical firewall consist of? | {
"text": [
"a separate machine filtering network traffic"
],
"answer_start": [
552
]
} |
57099f7bed30961900e8438b | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | What type of machines normall have a firewall? | {
"text": [
"permanently connected to the Internet"
],
"answer_start": [
645
]
} |
57099f7bed30961900e8438c | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | What compromises mainly preventative measures? | {
"text": [
"computer security"
],
"answer_start": [
7
]
} |
5a555ca9134fea001a0e1a52 | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | Computer security is mostly comprised of what? | {
"text": [],
"answer_start": []
} |
5a555ca9134fea001a0e1a53 | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | How are firewalls implemented? | {
"text": [],
"answer_start": []
} |
5a555ca9134fea001a0e1a54 | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | Which system has a built in firewall? | {
"text": [],
"answer_start": []
} |
5a555ca9134fea001a0e1a55 | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | What is another form of having a firewall connected? | {
"text": [],
"answer_start": []
} |
5a555ca9134fea001a0e1a56 | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | Which part of a Linux computer is the firewall built into? | {
"text": [],
"answer_start": []
} |
5a5cd39b5e8782001a9d5dc8 | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | What types of measures do computer security firms rarely use today? | {
"text": [],
"answer_start": []
} |
5a5cd39b5e8782001a9d5dc9 | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | What type of machine rarely uses firewalls? | {
"text": [],
"answer_start": []
} |
5a5cd39b5e8782001a9d5dca | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | What is an exit procedure? | {
"text": [],
"answer_start": []
} |
5a5cd39b5e8782001a9d5dcb | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | How are exit procedures implemented? | {
"text": [],
"answer_start": []
} |
5a5cd39b5e8782001a9d5dcc | Computer_security | Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st... | What type of OS does not use the operating system kernel? | {
"text": [],
"answer_start": []
} |
5709a208200fba14003681f7 | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | What has caused serious financial damage? | {
"text": [
"security breaches"
],
"answer_start": [
44
]
} |
5709a208200fba14003681f8 | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | Data made public who is available to estimate the cost of an incident? | {
"text": [
"the organizations involved"
],
"answer_start": [
198
]
} |
5709a208200fba14003681f9 | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | What is the amount of losses estimated from worms and viruses in 2003? | {
"text": [
"$13 billion"
],
"answer_start": [
443
]
} |
5709a208200fba14003681fa | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | Who produces estimates of worldwide losses attributable to security breaches? | {
"text": [
"Several computer security consulting firms"
],
"answer_start": [
227
]
} |
5709a208200fba14003681fb | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | What is the underlying methodology of finding worldwide estimates for losses fur to security breaches? | {
"text": [
"basically anecdotal"
],
"answer_start": [
617
]
} |
5a555aad134fea001a0e1a48 | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | What was the loss estimated for covert attacks in 2003? | {
"text": [],
"answer_start": []
} |
5a555aad134fea001a0e1a49 | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | What forms of attack were responsible for the loss? | {
"text": [],
"answer_start": []
} |
5a555aad134fea001a0e1a4a | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | What information is used to estimate the cost of the incident? | {
"text": [],
"answer_start": []
} |
5a555aad134fea001a0e1a4b | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | How wide-scale were the losses? | {
"text": [],
"answer_start": []
} |
5a555aad134fea001a0e1a4c | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | Why is difficult to estimate loss in this situation? | {
"text": [],
"answer_start": []
} |
5a5cd2f25e8782001a9d5dbe | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | How much did firms save in 2003 from preventing attacks? | {
"text": [],
"answer_start": []
} |
5a5cd2f25e8782001a9d5dbf | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | When was the standard model for estimating the cost of a breach established? | {
"text": [],
"answer_start": []
} |
5a5cd2f25e8782001a9d5dc0 | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | What data is not made public when an organization is breached? | {
"text": [],
"answer_start": []
} |
5a5cd2f25e8782001a9d5dc1 | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | What was the minimum estimate of losses due to security breaches in the US in 2003? | {
"text": [],
"answer_start": []
} |
5a5cd2f25e8782001a9d5dc2 | Computer_security | Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib... | Why are loss estimates rarely challenged? | {
"text": [],
"answer_start": []
} |
5709a2e5200fba1400368201 | Computer_security | While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i... | Microchips vulnerabilities are introduced when? | {
"text": [
"during the manufacturing process"
],
"answer_start": [
108
]
} |
5709a2e5200fba1400368202 | Computer_security | While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i... | What offers an alternative to soft-ware only computer security? | {
"text": [
"hardware-based or assisted computer security"
],
"answer_start": [
142
]
} |
5709a2e5200fba1400368203 | Computer_security | While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i... | What can hardware be a source of? | {
"text": [
"insecurity"
],
"answer_start": [
34
]
} |
5709a2e5200fba1400368204 | Computer_security | While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i... | What is required in order for hardware to be compromised? | {
"text": [
"physical access (or sophisticated backdoor access)"
],
"answer_start": [
443
]
} |
5a55606b134fea001a0e1a66 | Computer_security | While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i... | What step can increase computer security? | {
"text": [],
"answer_start": []
} |
5a55606b134fea001a0e1a67 | Computer_security | While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i... | What is used in physical access of a computer? | {
"text": [],
"answer_start": []
} |
5a55606b134fea001a0e1a68 | Computer_security | While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i... | What causes hardware to be insecure? | {
"text": [],
"answer_start": []
} |
5a55606b134fea001a0e1a69 | Computer_security | While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i... | How can a cell phone increase computer security? | {
"text": [],
"answer_start": []
} |
5a55606b134fea001a0e1a6a | Computer_security | While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i... | What physical device is used as a passkey for your computer? | {
"text": [],
"answer_start": []
} |
5a5cd75a5e8782001a9d5ddc | Computer_security | While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i... | When are microchip vulnerabilities removed? | {
"text": [],
"answer_start": []
} |
5a5cd75a5e8782001a9d5ddd | Computer_security | While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i... | Dongles less secure because of what? | {
"text": [],
"answer_start": []
} |
5a5cd75a5e8782001a9d5dde | Computer_security | While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i... | What is an example of software-only computer security? | {
"text": [],
"answer_start": []
} |
5a5cd75a5e8782001a9d5ddf | Computer_security | While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i... | What is required to compromise a software-only computer? | {
"text": [],
"answer_start": []
} |
5a5cd75a5e8782001a9d5de0 | Computer_security | While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i... | What type of vulnerability is hardware-based computer security impervious to? | {
"text": [],
"answer_start": []
} |
5709a391200fba1400368209 | Computer_security | Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o... | What does CCIRC stand for? | {
"text": [
"Canadian Cyber Incident Response Centre"
],
"answer_start": [
23
]
} |
5709a391200fba140036820a | Computer_security | Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o... | Who is resposible for mitigating and responding to threats to Canada's critical infrastructure? | {
"text": [
"CCIRC"
],
"answer_start": [
64
]
} |
5709a391200fba140036820b | Computer_security | Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o... | Where does the CCIRC post regular cyber security bulletins? | {
"text": [
"on the Public Safety Canada website"
],
"answer_start": [
438
]
} |
5709a391200fba140036820c | Computer_security | Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o... | What functions as a counterpart document to the National Strategy and Action Plan for Critical Infrastructure? | {
"text": [
"Canada's Cyber Security Strategy"
],
"answer_start": [
589
]
} |
5a557830134fea001a0e1abe | Computer_security | Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o... | What sort of responses are CCIRC responsible for? | {
"text": [],
"answer_start": []
} |
5a557830134fea001a0e1abf | Computer_security | Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o... | What would CCIRC do in an event of a breach? | {
"text": [],
"answer_start": []
} |
5a557830134fea001a0e1ac0 | Computer_security | Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o... | What does the CCIRC operate? | {
"text": [],
"answer_start": []
} |
5a557830134fea001a0e1ac1 | Computer_security | Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o... | CCIRC is part of what that is much larger? | {
"text": [],
"answer_start": []
} |
5a557830134fea001a0e1ac2 | Computer_security | Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o... | Online tools are meant for what by CCIRC? | {
"text": [],
"answer_start": []
} |
5a5cfd075e8782001a9d5e40 | Computer_security | Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o... | What organization is attacking Canada's infrastructure? | {
"text": [],
"answer_start": []
} |
5a5cfd075e8782001a9d5e41 | Computer_security | Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o... | Who runs Public Safety Canada? | {
"text": [],
"answer_start": []
} |
5a5cfd075e8782001a9d5e42 | Computer_security | Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o... | What document contradicts the Cyber Security Strategy? | {
"text": [],
"answer_start": []
} |
5a5cfd075e8782001a9d5e43 | Computer_security | Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o... | Who controls Canada's infrastructure? | {
"text": [],
"answer_start": []
} |
5a5cfd075e8782001a9d5e44 | Computer_security | Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o... | What do individuals use to create a cyber incident? | {
"text": [],
"answer_start": []
} |
5709a509200fba1400368211 | Computer_security | This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi... | Who said "Connectedness begets vulnerability?" | {
"text": [
"Jay Cross"
],
"answer_start": [
404
]
} |
5709a509200fba1400368212 | Computer_security | This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi... | What organization does Jay Cross belong to? | {
"text": [
"the Internet Time Group"
],
"answer_start": [
438
]
} |
5709a509200fba1400368213 | Computer_security | This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi... | What is the advantage of more critical infrastructure being controlled via computer programs? | {
"text": [
"increasing efficiency"
],
"answer_start": [
159
]
} |
5709a509200fba1400368214 | Computer_security | This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi... | What is the disadvantage of more critical infrastructure being controlled via computer programs? | {
"text": [
"exposes new vulnerabilities"
],
"answer_start": [
182
]
} |
5a557b55134fea001a0e1ae6 | Computer_security | This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi... | What has led to cyberwarfare? | {
"text": [],
"answer_start": []
} |
5a557b55134fea001a0e1ae7 | Computer_security | This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi... | What is cyberterrorism? | {
"text": [],
"answer_start": []
} |
5a557b55134fea001a0e1ae8 | Computer_security | This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi... | In what way does "connectedness begets vulnerability?" | {
"text": [],
"answer_start": []
} |
5a557b55134fea001a0e1ae9 | Computer_security | This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi... | What types of test will be run? | {
"text": [],
"answer_start": []
} |
5a557b55134fea001a0e1aea | Computer_security | This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi... | Will cyberterrorism evolve with new technology? | {
"text": [],
"answer_start": []
} |
5a5d04505e8782001a9d5e66 | Computer_security | This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi... | Who coined the word "cyberwarfare"? | {
"text": [],
"answer_start": []
} |
5a5d04505e8782001a9d5e67 | Computer_security | This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi... | What computer program controls critical infrastructure? | {
"text": [],
"answer_start": []
} |
5a5d04505e8782001a9d5e68 | Computer_security | This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi... | Which infrastructures are the least vulnerable to attack? | {
"text": [],
"answer_start": []
} |
5a5d04505e8782001a9d5e69 | Computer_security | This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi... | What is cyberterrorism? | {
"text": [],
"answer_start": []
} |
5a5d04505e8782001a9d5e6a | Computer_security | This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi... | Who disagreed with the saying "Connectedness begets vulnerability"? | {
"text": [],
"answer_start": []
} |
5709a5d5ed30961900e843bc | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | When did Public Safety Canada partner with Stop.Think. Connect? | {
"text": [
"September 27, 2010"
],
"answer_start": [
3
]
} |
5709a5d5ed30961900e843bd | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | When was the Cyber Security Cooperation Program launched by the Government of Canada? | {
"text": [
"February 4, 2014"
],
"answer_start": [
233
]
} |
5709a5d5ed30961900e843be | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | Who routinely updates the GetCyberSafe portal for Canadian citizens? | {
"text": [
"Public Safety Canada"
],
"answer_start": [
593
]
} |
5709a5d5ed30961900e843bf | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | What month is Cyber Security Awareness Month? | {
"text": [
"October"
],
"answer_start": [
749
]
} |
5709a5d5ed30961900e843c0 | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | How much does the Cyber Security Cooperation Program cost? | {
"text": [
"$1.5 million"
],
"answer_start": [
342
]
} |
5a5578ee134fea001a0e1ac8 | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | STOP.THINK.CONNECT is what kind of organization? | {
"text": [],
"answer_start": []
} |
5a5578ee134fea001a0e1ac9 | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | What type of grants were given out by the Canadian Government? | {
"text": [],
"answer_start": []
} |
5a5578ee134fea001a0e1aca | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | What does the Cyber Security Cooperation monitor? | {
"text": [],
"answer_start": []
} |
5a5578ee134fea001a0e1acb | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | Why is there a cyber security month? | {
"text": [],
"answer_start": []
} |
5a5578ee134fea001a0e1acc | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | How are people protected online? | {
"text": [],
"answer_start": []
} |
5a5cff985e8782001a9d5e4a | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | When was STOP.THINK.CONNECT created? | {
"text": [],
"answer_start": []
} |
5a5cff985e8782001a9d5e4b | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | How expensive is the GetCyberSafe portal? | {
"text": [],
"answer_start": []
} |
5a5cff985e8782001a9d5e4c | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | When was the Cyber Security Cooperation Program shut down? | {
"text": [],
"answer_start": []
} |
5a5cff985e8782001a9d5e4d | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | When was the GetCyberSafe portal created? | {
"text": [],
"answer_start": []
} |
5a5cff985e8782001a9d5e4e | Computer_security | On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog... | When is the international Cyber Security Awareness month? | {
"text": [],
"answer_start": []
} |
5709a7c7200fba1400368219 | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure... | Installing keyloggers and making operating system modifications are examples of ways unauthorized users for what? | {
"text": [
"compromise security"
],
"answer_start": [
128
]
} |
5709a7c7200fba140036821a | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure... | Booting a tool or another operating system from a CD Rom can bypass what? | {
"text": [
"standard security measures"
],
"answer_start": [
295
]
} |
5709a7c7200fba140036821b | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure... | Disk encryption and Trusted Platform Module are designed to prevent what? | {
"text": [
"attacks"
],
"answer_start": [
514
]
} |
5709a7c7200fba140036821c | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure... | An unauthorized user with physical access to a computer can likely do what? | {
"text": [
"directly download data from it"
],
"answer_start": [
82
]
} |
5a5546d5134fea001a0e1a0c | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure... | What increases the safety of a computer? | {
"text": [],
"answer_start": []
} |
5a5546d5134fea001a0e1a0d | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure... | What can cause standard security measures to become obsolete? | {
"text": [],
"answer_start": []
} |
5a5546d5134fea001a0e1a0e | Computer_security | An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure... | What is the number one cause of data theft? | {
"text": [],
"answer_start": []
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.