Anda di halaman 1dari 16

Introduction and Security Trends

Which threats are characterized by possibly long periods of preparation (years is not uncommon), tremendous financial backing, a large and organized group of attackers, and attempts to subvert insiders or to plant individuals inside a potential target in advance of a planned attack?

Unstructured threats
Structured threats

Highly structured threats


Nation-state information warfare threats

Which of the following is an attempt to find and attack a site that has hardware or software that is vulnerable to a specific exploit?
Target of opportunity attack
Targeted attack

Vulnerability scan attack


Information warfare attack

Which of the following threats has not grown over the last decade as a result of increasing numbers of Internet users?
Viruses
Hackers

Denial-of-service attacks
All of these have seen an increase over the last decade.

The rise of which of the following has greatly increased the number of individuals who probe organizations looking for vulnerabilities to exploit?
Virus writers
Script kiddies

Hackers
Elite hackers

Which of the following is generally viewed as the first Internet worm to have caused significant damage and to have brought the Internet down?

Melissa The Love Bug

The Morris worm


Code Red

Which of the following individuals was convicted of various computer crimes and was known for his ability to conduct successful social engineering attacks?
Kevin Mitnick
Vladmir Levin

Timothy Lloyd
David Smith

According to the CSI/FBI survey, which of the following statistics decreased in 2003?

The number of organizations reporting the internet as a point of attack The number of organizations that have reported unauthorized use of their systems

The average loss as a result of theft of proprietary information

Both B and C

Which virus/worm was credited with reaching global proportions in less than ten minutes?

Melissa Code Red

Morris worm
Slammer

The act of deliberately accessing computer systems and networks without authorization is generally known as:

Computer intrusions Hacking

Cracking
Probing

What is the most common problem/threat an organization faces?

Viruses/worms
Script kiddies

Hackers
Hacktivists

Warfare conducted against the information and information processing equipment used by an adversary is known as:
Hacking
Cyber terrorism

Information warfare
Network warfare

An attacker who feels that using animals to make fur coats is unethical and thus defaces the web site of a company that sells fur coats is an example of:

Information warfare Hacktivisim

Cyber crusading
Elite hacking

Which of the following is not described as a critical infrastructure?

Electricity (power)
Banking and finance

Telecommunicaitons
Retail stores

Criminal organizations would normally be classified as what type of threat?

Unstructured Unstructured but hostile

Structured
Highly structured

Elite hackers dont account for more than what percentage of the total number of individuals conducting intrusive activity on the Internet?
1-2 percent
3-5 percent

7-10 percent
15-20 percent

Anda mungkin juga menyukai