Deck 8: Defending a Virtual World: Cybersecurity and Homeland Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
Play
Full screen (f)
Deck 8: Defending a Virtual World: Cybersecurity and Homeland Security
1
_________________ refers to the study of cybercrime from a criminological perspective.
A) Digital forensics
B) Criminology
C) Cybercriminology
D) Cybersecurity
A) Digital forensics
B) Criminology
C) Cybercriminology
D) Cybersecurity
C
2
The CISA is organized into three divisions centered on particular areas of focus within critical infrastructure protection-cyber protection, infrastructure resilience, and _____________________.
A) due diligence
B) emergency communications
C) infrastructure security
D) technology development
A) due diligence
B) emergency communications
C) infrastructure security
D) technology development
B
3
__________________ is defined as efforts to protect the confidentiality, integrity, and availability of information technology infrastructure.
A) Digital forensics
B) Hacktivist
C) Cybercriminology
D) Cybersecurity
A) Digital forensics
B) Hacktivist
C) Cybercriminology
D) Cybersecurity
D
4
Which of the following is not one of the five pillars identified in the DHS cybersecurity strategy?
A) Risk identification
B) Vulnerability reduction
C) Threat reduction
D) Continuing education
A) Risk identification
B) Vulnerability reduction
C) Threat reduction
D) Continuing education
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
________________ refers to the scope of electronic targets that are vulnerable to potential malicious action.
A) Attack Surface
B) Dark Web
C) Risk Plane
D) Zero Days
A) Attack Surface
B) Dark Web
C) Risk Plane
D) Zero Days
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
Which one of the following threats would NOT be considered to be a category of cybersecurity threats?
A) Hacktivists
B) Malicious insiders
C) Spies
D) Transportation
A) Hacktivists
B) Malicious insiders
C) Spies
D) Transportation
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
The scope of cybersecurity threats that exists today is vast.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
Every federal agency has employees working on cybersecurity initiatives.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
DHS is responsible for protecting the web servers of all non-military federal agencies.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
There are no jurisdictional challenges to investigating and prosecuting cybercriminals.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
The primary difference between cybercriminals and other types of criminals is their specific motivations.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
Hacktivists are hackers who use their skills for the purposes of political and social activism.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
There is virtually no criminal action today that does not have at least some link to online activity.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
Describe the different classifications of hackers.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
Explain some of the PPP arrangements that can exist in the realm of cybersecurity.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
Summarize how anonymous browsers work.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
What lessons can be learned from studying the Stuxnet virus?
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
Discuss the advances have been made to manage the growing interconnections among computer networks and critical infrastructure.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
Cybercriminolgy is a relatively new academic discipline, where do you see the field moving in the next few years? Why?
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
Why is it important to treat cybersecurity and critical infrastructure protection in an integrated fashion?
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck