Deck 8: Defending a Virtual World: Cybersecurity and Homeland Security

Full screen (f)
exit full mode
Question
_________________ refers to the study of cybercrime from a criminological perspective.

A) Digital forensics
B) Criminology
C) Cybercriminology
D) Cybersecurity
Use Space or
up arrow
down arrow
to flip the card.
Question
The CISA is organized into three divisions centered on particular areas of focus within critical infrastructure protection-cyber protection, infrastructure resilience, and _____________________.

A) due diligence
B) emergency communications
C) infrastructure security
D) technology development
Question
__________________ is defined as efforts to protect the confidentiality, integrity, and availability of information technology infrastructure.

A) Digital forensics
B) Hacktivist
C) Cybercriminology
D) Cybersecurity
Question
Which of the following is not one of the five pillars identified in the DHS cybersecurity strategy?

A) Risk identification
B) Vulnerability reduction
C) Threat reduction
D) Continuing education
Question
________________ refers to the scope of electronic targets that are vulnerable to potential malicious action.

A) Attack Surface
B) Dark Web
C) Risk Plane
D) Zero Days
Question
Which one of the following threats would NOT be considered to be a category of cybersecurity threats?

A) Hacktivists
B) Malicious insiders
C) Spies
D) Transportation
Question
The scope of cybersecurity threats that exists today is vast.
Question
Every federal agency has employees working on cybersecurity initiatives.
Question
DHS is responsible for protecting the web servers of all non-military federal agencies.
Question
There are no jurisdictional challenges to investigating and prosecuting cybercriminals.
Question
The primary difference between cybercriminals and other types of criminals is their specific motivations.
Question
Hacktivists are hackers who use their skills for the purposes of political and social activism.
Question
There is virtually no criminal action today that does not have at least some link to online activity.
Question
Describe the different classifications of hackers.
Question
Explain some of the PPP arrangements that can exist in the realm of cybersecurity.
Question
Summarize how anonymous browsers work.
Question
What lessons can be learned from studying the Stuxnet virus?
Question
Discuss the advances have been made to manage the growing interconnections among computer networks and critical infrastructure.
Question
Cybercriminolgy is a relatively new academic discipline, where do you see the field moving in the next few years? Why?
Question
Why is it important to treat cybersecurity and critical infrastructure protection in an integrated fashion?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Defending a Virtual World: Cybersecurity and Homeland Security
1
_________________ refers to the study of cybercrime from a criminological perspective.

A) Digital forensics
B) Criminology
C) Cybercriminology
D) Cybersecurity
C
2
The CISA is organized into three divisions centered on particular areas of focus within critical infrastructure protection-cyber protection, infrastructure resilience, and _____________________.

A) due diligence
B) emergency communications
C) infrastructure security
D) technology development
B
3
__________________ is defined as efforts to protect the confidentiality, integrity, and availability of information technology infrastructure.

A) Digital forensics
B) Hacktivist
C) Cybercriminology
D) Cybersecurity
D
4
Which of the following is not one of the five pillars identified in the DHS cybersecurity strategy?

A) Risk identification
B) Vulnerability reduction
C) Threat reduction
D) Continuing education
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
________________ refers to the scope of electronic targets that are vulnerable to potential malicious action.

A) Attack Surface
B) Dark Web
C) Risk Plane
D) Zero Days
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
Which one of the following threats would NOT be considered to be a category of cybersecurity threats?

A) Hacktivists
B) Malicious insiders
C) Spies
D) Transportation
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
The scope of cybersecurity threats that exists today is vast.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
Every federal agency has employees working on cybersecurity initiatives.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
DHS is responsible for protecting the web servers of all non-military federal agencies.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
There are no jurisdictional challenges to investigating and prosecuting cybercriminals.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
The primary difference between cybercriminals and other types of criminals is their specific motivations.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
Hacktivists are hackers who use their skills for the purposes of political and social activism.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
There is virtually no criminal action today that does not have at least some link to online activity.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
Describe the different classifications of hackers.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
Explain some of the PPP arrangements that can exist in the realm of cybersecurity.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
Summarize how anonymous browsers work.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
What lessons can be learned from studying the Stuxnet virus?
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
Discuss the advances have been made to manage the growing interconnections among computer networks and critical infrastructure.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
Cybercriminolgy is a relatively new academic discipline, where do you see the field moving in the next few years? Why?
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
Why is it important to treat cybersecurity and critical infrastructure protection in an integrated fashion?
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 20 flashcards in this deck.