Week 5 Flashcards
Dr. Matt Bishop noted in his cybersecurity lecture that in an emergency situation confidentiality is overridden by the immediacy of the situation. In the business this is referred to as _______________________ policy.
Bread the glass.
What is not a characteristic of the Stuxnet worm?
Can update itself without the internet.
According to the “brief” on cyberwarfare and cyberterrorism by the Congressional Research Service, this 2013 document ______________ sets out 95 “black letter rules” governing cyber conflict addressing sovereignty, state responsibility and the law of armed conflict.
Tallin manual.
According to the “brief” on cyberwarfare and cyberterrorism by the Congressional Research Service, the first cyberweapon was ____.
Struxnet.
A worm that was designed to attack Siemens programmable logic controllers and Windows-based industrial software and used to damage Iran’s nuclear generation program was called ____.
Struxnet.
Software that appears to perform function but steals information or harms system.
Trojan horse.
Rinderpest is also known as ____.
Cattle plague.
According to John Arquilla in his Computer Mouse that Roared article, the ‘negative proof” of the offense-defense theory was _____.
World War I.
The Information Age analog to strategic bombing is hacking and/or compromising _____.
Information infrastructure.
According to Dr. Matt Bishop who is the following quote attributed? “Those who vote decide nothing. Those who count the vote decide everything.”
Joseph Stalin.
Dr. Matt Bishop noted in his cybersecurity lecture that security is not monolithic with different aspects of society wanting different things. The most important aspect of security for the military was ________________.
Confidentiality.
According to Dr. Matt Bishop cars can be hacked from around what distance?
150 meters.
According to the “brief” on cyberwarfare and cyberterrorism by the Congressional Research Service, individuals who steal classified information used by governments to gain a competitive advantages are ______.
Cyberspies.
According to the “brief” on cyberwarfare and cyberterrorism by the Congressional Research Service, state-sponsored and non-state actors who engage in cyberattack to pursue their objectives are _____.
Cyberterrorists.
In 200 workers at Cellatex chemical plant in _____________purposely dumped 800 gallons of sulfuric acid into a river when denied workers’ benefits.
France.