id
stringlengths
24
24
title
stringclasses
442 values
context
stringlengths
151
3.71k
question
stringlengths
1
25.7k
answers
dict
5a55538e134fea001a0e1a2e
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
What controls the functions of our utilities such as telecommunications, power grid, nuclear power plants, etc?
{ "text": [], "answer_start": [] }
5a5cc7fa5e8782001a9d5da0
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
What controls computer functions?
{ "text": [], "answer_start": [] }
5a5cc7fa5e8782001a9d5da1
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
Who created the Stuxnet worm?
{ "text": [], "answer_start": [] }
5a5cc7fa5e8782001a9d5da2
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
When was the Stuxnet worm created?
{ "text": [], "answer_start": [] }
5a5cc7fa5e8782001a9d5da3
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
What was infected in the 79 hacking incidents at energy companies?
{ "text": [], "answer_start": [] }
5a5cc7fa5e8782001a9d5da4
Computer_security
Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment cont...
How many people were on the Computer Emergency Readiness Team?
{ "text": [], "answer_start": [] }
57099f7bed30961900e84388
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
Firewalls and exit procedures are considered what?
{ "text": [ "\"preventive\" measures" ], "answer_start": [ 42 ] }
57099f7bed30961900e84389
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
What is defined as a way of filtering network data between a host or network and another network?
{ "text": [ "A firewall" ], "answer_start": [ 102 ] }
57099f7bed30961900e8438a
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
What does a physical firewall consist of?
{ "text": [ "a separate machine filtering network traffic" ], "answer_start": [ 552 ] }
57099f7bed30961900e8438b
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
What type of machines normall have a firewall?
{ "text": [ "permanently connected to the Internet" ], "answer_start": [ 645 ] }
57099f7bed30961900e8438c
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
What compromises mainly preventative measures?
{ "text": [ "computer security" ], "answer_start": [ 7 ] }
5a555ca9134fea001a0e1a52
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
Computer security is mostly comprised of what?
{ "text": [], "answer_start": [] }
5a555ca9134fea001a0e1a53
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
How are firewalls implemented?
{ "text": [], "answer_start": [] }
5a555ca9134fea001a0e1a54
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
Which system has a built in firewall?
{ "text": [], "answer_start": [] }
5a555ca9134fea001a0e1a55
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
What is another form of having a firewall connected?
{ "text": [], "answer_start": [] }
5a555ca9134fea001a0e1a56
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
Which part of a Linux computer is the firewall built into?
{ "text": [], "answer_start": [] }
5a5cd39b5e8782001a9d5dc8
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
What types of measures do computer security firms rarely use today?
{ "text": [], "answer_start": [] }
5a5cd39b5e8782001a9d5dc9
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
What type of machine rarely uses firewalls?
{ "text": [], "answer_start": [] }
5a5cd39b5e8782001a9d5dca
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
What is an exit procedure?
{ "text": [], "answer_start": [] }
5a5cd39b5e8782001a9d5dcb
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
How are exit procedures implemented?
{ "text": [], "answer_start": [] }
5a5cd39b5e8782001a9d5dcc
Computer_security
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network st...
What type of OS does not use the operating system kernel?
{ "text": [], "answer_start": [] }
5709a208200fba14003681f7
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
What has caused serious financial damage?
{ "text": [ "security breaches" ], "answer_start": [ 44 ] }
5709a208200fba14003681f8
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
Data made public who is available to estimate the cost of an incident?
{ "text": [ "the organizations involved" ], "answer_start": [ 198 ] }
5709a208200fba14003681f9
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
What is the amount of losses estimated from worms and viruses in 2003?
{ "text": [ "$13 billion" ], "answer_start": [ 443 ] }
5709a208200fba14003681fa
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
Who produces estimates of worldwide losses attributable to security breaches?
{ "text": [ "Several computer security consulting firms" ], "answer_start": [ 227 ] }
5709a208200fba14003681fb
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
What is the underlying methodology of finding worldwide estimates for losses fur to security breaches?
{ "text": [ "basically anecdotal" ], "answer_start": [ 617 ] }
5a555aad134fea001a0e1a48
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
What was the loss estimated for covert attacks in 2003?
{ "text": [], "answer_start": [] }
5a555aad134fea001a0e1a49
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
What forms of attack were responsible for the loss?
{ "text": [], "answer_start": [] }
5a555aad134fea001a0e1a4a
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
What information is used to estimate the cost of the incident?
{ "text": [], "answer_start": [] }
5a555aad134fea001a0e1a4b
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
How wide-scale were the losses?
{ "text": [], "answer_start": [] }
5a555aad134fea001a0e1a4c
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
Why is difficult to estimate loss in this situation?
{ "text": [], "answer_start": [] }
5a5cd2f25e8782001a9d5dbe
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
How much did firms save in 2003 from preventing attacks?
{ "text": [], "answer_start": [] }
5a5cd2f25e8782001a9d5dbf
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
When was the standard model for estimating the cost of a breach established?
{ "text": [], "answer_start": [] }
5a5cd2f25e8782001a9d5dc0
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
What data is not made public when an organization is breached?
{ "text": [], "answer_start": [] }
5a5cd2f25e8782001a9d5dc1
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
What was the minimum estimate of losses due to security breaches in the US in 2003?
{ "text": [], "answer_start": [] }
5a5cd2f25e8782001a9d5dc2
Computer_security
Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attrib...
Why are loss estimates rarely challenged?
{ "text": [], "answer_start": [] }
5709a2e5200fba1400368201
Computer_security
While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i...
Microchips vulnerabilities are introduced when?
{ "text": [ "during the manufacturing process" ], "answer_start": [ 108 ] }
5709a2e5200fba1400368202
Computer_security
While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i...
What offers an alternative to soft-ware only computer security?
{ "text": [ "hardware-based or assisted computer security" ], "answer_start": [ 142 ] }
5709a2e5200fba1400368203
Computer_security
While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i...
What can hardware be a source of?
{ "text": [ "insecurity" ], "answer_start": [ 34 ] }
5709a2e5200fba1400368204
Computer_security
While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i...
What is required in order for hardware to be compromised?
{ "text": [ "physical access (or sophisticated backdoor access)" ], "answer_start": [ 443 ] }
5a55606b134fea001a0e1a66
Computer_security
While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i...
What step can increase computer security?
{ "text": [], "answer_start": [] }
5a55606b134fea001a0e1a67
Computer_security
While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i...
What is used in physical access of a computer?
{ "text": [], "answer_start": [] }
5a55606b134fea001a0e1a68
Computer_security
While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i...
What causes hardware to be insecure?
{ "text": [], "answer_start": [] }
5a55606b134fea001a0e1a69
Computer_security
While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i...
How can a cell phone increase computer security?
{ "text": [], "answer_start": [] }
5a55606b134fea001a0e1a6a
Computer_security
While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i...
What physical device is used as a passkey for your computer?
{ "text": [], "answer_start": [] }
5a5cd75a5e8782001a9d5ddc
Computer_security
While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i...
When are microchip vulnerabilities removed?
{ "text": [], "answer_start": [] }
5a5cd75a5e8782001a9d5ddd
Computer_security
While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i...
Dongles less secure because of what?
{ "text": [], "answer_start": [] }
5a5cd75a5e8782001a9d5dde
Computer_security
While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i...
What is an example of software-only computer security?
{ "text": [], "answer_start": [] }
5a5cd75a5e8782001a9d5ddf
Computer_security
While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i...
What is required to compromise a software-only computer?
{ "text": [], "answer_start": [] }
5a5cd75a5e8782001a9d5de0
Computer_security
While hardware may be a source of insecurity, such as with microchip vulnerabilities maliciously introduced during the manufacturing process, hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, i...
What type of vulnerability is hardware-based computer security impervious to?
{ "text": [], "answer_start": [] }
5709a391200fba1400368209
Computer_security
Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o...
What does CCIRC stand for?
{ "text": [ "Canadian Cyber Incident Response Centre" ], "answer_start": [ 23 ] }
5709a391200fba140036820a
Computer_security
Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o...
Who is resposible for mitigating and responding to threats to Canada's critical infrastructure?
{ "text": [ "CCIRC" ], "answer_start": [ 64 ] }
5709a391200fba140036820b
Computer_security
Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o...
Where does the CCIRC post regular cyber security bulletins?
{ "text": [ "on the Public Safety Canada website" ], "answer_start": [ 438 ] }
5709a391200fba140036820c
Computer_security
Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o...
What functions as a counterpart document to the National Strategy and Action Plan for Critical Infrastructure?
{ "text": [ "Canada's Cyber Security Strategy" ], "answer_start": [ 589 ] }
5a557830134fea001a0e1abe
Computer_security
Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o...
What sort of responses are CCIRC responsible for?
{ "text": [], "answer_start": [] }
5a557830134fea001a0e1abf
Computer_security
Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o...
What would CCIRC do in an event of a breach?
{ "text": [], "answer_start": [] }
5a557830134fea001a0e1ac0
Computer_security
Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o...
What does the CCIRC operate?
{ "text": [], "answer_start": [] }
5a557830134fea001a0e1ac1
Computer_security
Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o...
CCIRC is part of what that is much larger?
{ "text": [], "answer_start": [] }
5a557830134fea001a0e1ac2
Computer_security
Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o...
Online tools are meant for what by CCIRC?
{ "text": [], "answer_start": [] }
5a5cfd075e8782001a9d5e40
Computer_security
Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o...
What organization is attacking Canada's infrastructure?
{ "text": [], "answer_start": [] }
5a5cfd075e8782001a9d5e41
Computer_security
Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o...
Who runs Public Safety Canada?
{ "text": [], "answer_start": [] }
5a5cfd075e8782001a9d5e42
Computer_security
Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o...
What document contradicts the Cyber Security Strategy?
{ "text": [], "answer_start": [] }
5a5cfd075e8782001a9d5e43
Computer_security
Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o...
Who controls Canada's infrastructure?
{ "text": [], "answer_start": [] }
5a5cfd075e8782001a9d5e44
Computer_security
Public Safety Canada’s Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada’s critical infrastructure and cyber systems. The CCIRC provides support to mitigate cyber threats, technical support to respond and recover from targeted cyber attacks, and provides o...
What do individuals use to create a cyber incident?
{ "text": [], "answer_start": [] }
5709a509200fba1400368211
Computer_security
This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi...
Who said "Connectedness begets vulnerability?"
{ "text": [ "Jay Cross" ], "answer_start": [ 404 ] }
5709a509200fba1400368212
Computer_security
This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi...
What organization does Jay Cross belong to?
{ "text": [ "the Internet Time Group" ], "answer_start": [ 438 ] }
5709a509200fba1400368213
Computer_security
This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi...
What is the advantage of more critical infrastructure being controlled via computer programs?
{ "text": [ "increasing efficiency" ], "answer_start": [ 159 ] }
5709a509200fba1400368214
Computer_security
This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi...
What is the disadvantage of more critical infrastructure being controlled via computer programs?
{ "text": [ "exposes new vulnerabilities" ], "answer_start": [ 182 ] }
5a557b55134fea001a0e1ae6
Computer_security
This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi...
What has led to cyberwarfare?
{ "text": [], "answer_start": [] }
5a557b55134fea001a0e1ae7
Computer_security
This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi...
What is cyberterrorism?
{ "text": [], "answer_start": [] }
5a557b55134fea001a0e1ae8
Computer_security
This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi...
In what way does "connectedness begets vulnerability?"
{ "text": [], "answer_start": [] }
5a557b55134fea001a0e1ae9
Computer_security
This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi...
What types of test will be run?
{ "text": [], "answer_start": [] }
5a557b55134fea001a0e1aea
Computer_security
This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi...
Will cyberterrorism evolve with new technology?
{ "text": [], "answer_start": [] }
5a5d04505e8782001a9d5e66
Computer_security
This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi...
Who coined the word "cyberwarfare"?
{ "text": [], "answer_start": [] }
5a5d04505e8782001a9d5e67
Computer_security
This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi...
What computer program controls critical infrastructure?
{ "text": [], "answer_start": [] }
5a5d04505e8782001a9d5e68
Computer_security
This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi...
Which infrastructures are the least vulnerable to attack?
{ "text": [], "answer_start": [] }
5a5d04505e8782001a9d5e69
Computer_security
This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi...
What is cyberterrorism?
{ "text": [], "answer_start": [] }
5a5d04505e8782001a9d5e6a
Computer_security
This has led to new terms such as cyberwarfare and cyberterrorism. More and more critical infrastructure is being controlled via computer programs that, while increasing efficiency, exposes new vulnerabilities. The test will be to see if governments and corporations that control critical systems such as energy, communi...
Who disagreed with the saying "Connectedness begets vulnerability"?
{ "text": [], "answer_start": [] }
5709a5d5ed30961900e843bc
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
When did Public Safety Canada partner with Stop.Think. Connect?
{ "text": [ "September 27, 2010" ], "answer_start": [ 3 ] }
5709a5d5ed30961900e843bd
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
When was the Cyber Security Cooperation Program launched by the Government of Canada?
{ "text": [ "February 4, 2014" ], "answer_start": [ 233 ] }
5709a5d5ed30961900e843be
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
Who routinely updates the GetCyberSafe portal for Canadian citizens?
{ "text": [ "Public Safety Canada" ], "answer_start": [ 593 ] }
5709a5d5ed30961900e843bf
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
What month is Cyber Security Awareness Month?
{ "text": [ "October" ], "answer_start": [ 749 ] }
5709a5d5ed30961900e843c0
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
How much does the Cyber Security Cooperation Program cost?
{ "text": [ "$1.5 million" ], "answer_start": [ 342 ] }
5a5578ee134fea001a0e1ac8
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
STOP.THINK.CONNECT is what kind of organization?
{ "text": [], "answer_start": [] }
5a5578ee134fea001a0e1ac9
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
What type of grants were given out by the Canadian Government?
{ "text": [], "answer_start": [] }
5a5578ee134fea001a0e1aca
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
What does the Cyber Security Cooperation monitor?
{ "text": [], "answer_start": [] }
5a5578ee134fea001a0e1acb
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
Why is there a cyber security month?
{ "text": [], "answer_start": [] }
5a5578ee134fea001a0e1acc
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
How are people protected online?
{ "text": [], "answer_start": [] }
5a5cff985e8782001a9d5e4a
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
When was STOP.THINK.CONNECT created?
{ "text": [], "answer_start": [] }
5a5cff985e8782001a9d5e4b
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
How expensive is the GetCyberSafe portal?
{ "text": [], "answer_start": [] }
5a5cff985e8782001a9d5e4c
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
When was the Cyber Security Cooperation Program shut down?
{ "text": [], "answer_start": [] }
5a5cff985e8782001a9d5e4d
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
When was the GetCyberSafe portal created?
{ "text": [], "answer_start": [] }
5a5cff985e8782001a9d5e4e
Computer_security
On September 27, 2010, Public Safety Canada partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations dedicated to informing the general public on how to protect themselves online. On February 4, 2014, the Government of Canada launched the Cyber Security Cooperation Prog...
When is the international Cyber Security Awareness month?
{ "text": [], "answer_start": [] }
5709a7c7200fba1400368219
Computer_security
An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure...
Installing keyloggers and making operating system modifications are examples of ways unauthorized users for what?
{ "text": [ "compromise security" ], "answer_start": [ 128 ] }
5709a7c7200fba140036821a
Computer_security
An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure...
Booting a tool or another operating system from a CD Rom can bypass what?
{ "text": [ "standard security measures" ], "answer_start": [ 295 ] }
5709a7c7200fba140036821b
Computer_security
An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure...
Disk encryption and Trusted Platform Module are designed to prevent what?
{ "text": [ "attacks" ], "answer_start": [ 514 ] }
5709a7c7200fba140036821c
Computer_security
An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure...
An unauthorized user with physical access to a computer can likely do what?
{ "text": [ "directly download data from it" ], "answer_start": [ 82 ] }
5a5546d5134fea001a0e1a0c
Computer_security
An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure...
What increases the safety of a computer?
{ "text": [], "answer_start": [] }
5a5546d5134fea001a0e1a0d
Computer_security
An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure...
What can cause standard security measures to become obsolete?
{ "text": [], "answer_start": [] }
5a5546d5134fea001a0e1a0e
Computer_security
An unauthorized user gaining physical access to a computer is most likely able to directly download data from it. They may also compromise security by making operating system modifications, installing software worms, keyloggers, or covert listening devices. Even when the system is protected by standard security measure...
What is the number one cause of data theft?
{ "text": [], "answer_start": [] }