Week 5 Flashcards
(31 cards)
Dr. Matt Bishop noted in his cybersecurity lecture that in an emergency situation confidentiality is overridden by the immediacy of the situation. In the business this is referred to as _______________________ policy.
Bread the glass.
What is not a characteristic of the Stuxnet worm?
Can update itself without the internet.
According to the “brief” on cyberwarfare and cyberterrorism by the Congressional Research Service, this 2013 document ______________ sets out 95 “black letter rules” governing cyber conflict addressing sovereignty, state responsibility and the law of armed conflict.
Tallin manual.
According to the “brief” on cyberwarfare and cyberterrorism by the Congressional Research Service, the first cyberweapon was ____.
Struxnet.
A worm that was designed to attack Siemens programmable logic controllers and Windows-based industrial software and used to damage Iran’s nuclear generation program was called ____.
Struxnet.
Software that appears to perform function but steals information or harms system.
Trojan horse.
Rinderpest is also known as ____.
Cattle plague.
According to John Arquilla in his Computer Mouse that Roared article, the ‘negative proof” of the offense-defense theory was _____.
World War I.
The Information Age analog to strategic bombing is hacking and/or compromising _____.
Information infrastructure.
According to Dr. Matt Bishop who is the following quote attributed? “Those who vote decide nothing. Those who count the vote decide everything.”
Joseph Stalin.
Dr. Matt Bishop noted in his cybersecurity lecture that security is not monolithic with different aspects of society wanting different things. The most important aspect of security for the military was ________________.
Confidentiality.
According to Dr. Matt Bishop cars can be hacked from around what distance?
150 meters.
According to the “brief” on cyberwarfare and cyberterrorism by the Congressional Research Service, individuals who steal classified information used by governments to gain a competitive advantages are ______.
Cyberspies.
According to the “brief” on cyberwarfare and cyberterrorism by the Congressional Research Service, state-sponsored and non-state actors who engage in cyberattack to pursue their objectives are _____.
Cyberterrorists.
In 200 workers at Cellatex chemical plant in _____________purposely dumped 800 gallons of sulfuric acid into a river when denied workers’ benefits.
France.
Terrorists blowing up the dam and flooding the town would be known as ______.
Resource as a target terrorism.
An honest person diagnosed as truthful would be considered a _______.
True negative.
Percentage of deceptive cases that give positive results would be considered which property of polygraph tests?
Sensitivity.
According to the PBS documentary on North Korea, it is estimated that 1-in-____ of the population are political prisoners.
100.
When did Korea split into North and South?
1940s.
One of Kim Jong-un’s ____ was ordered to be executed.
Uncles
The goal of Boko Haram is to overthrow the _____government and create an Islamic State.
Nigerian.
Which of the following is NOT a lesson learned from the history of nuclear proliferation?
Nuclear proliferation takes years to develop.
Did you rob the bank of Friday? versus Are you in New Jersey? would fall into which class of polygraph questions?
Relavent-irrelevant.