0% found this document useful (0 votes)
126 views16 pages

SEC280 Chapter 01

Highly structured threats refer to nation-state information warfare threats that involve long preparation, large financial backing, and organized groups attempting to infiltrate targets in advance. A vulnerability scan attack attempts to find and exploit known vulnerabilities in hardware or software. Denial-of-service attacks have increased over the last decade due to more internet users. The rise of script kiddies has increased the number of individuals probing organizations for vulnerabilities due to easier access to hacking tools. The Morris worm in 1988 was the first internet worm to cause significant damage by bringing parts of the internet down.

Uploaded by

frankieciv608
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
126 views16 pages

SEC280 Chapter 01

Highly structured threats refer to nation-state information warfare threats that involve long preparation, large financial backing, and organized groups attempting to infiltrate targets in advance. A vulnerability scan attack attempts to find and exploit known vulnerabilities in hardware or software. Denial-of-service attacks have increased over the last decade due to more internet users. The rise of script kiddies has increased the number of individuals probing organizations for vulnerabilities due to easier access to hacking tools. The Morris worm in 1988 was the first internet worm to cause significant damage by bringing parts of the internet down.

Uploaded by

frankieciv608
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Introduction and Security Trends

Which threats are characterized by possibly long periods of preparation (years is not uncommon), tremendous financial backing, a large and organized group of attackers, and attempts to subvert insiders or to plant individuals inside a potential target in advance of a planned attack?

Unstructured threats
Structured threats

Highly structured threats


Nation-state information warfare threats

Which of the following is an attempt to find and attack a site that has hardware or software that is vulnerable to a specific exploit?
Target of opportunity attack
Targeted attack

Vulnerability scan attack


Information warfare attack

Which of the following threats has not grown over the last decade as a result of increasing numbers of Internet users?
Viruses
Hackers

Denial-of-service attacks
All of these have seen an increase over the last decade.

The rise of which of the following has greatly increased the number of individuals who probe organizations looking for vulnerabilities to exploit?
Virus writers
Script kiddies

Hackers
Elite hackers

Which of the following is generally viewed as the first Internet worm to have caused significant damage and to have brought the Internet down?

Melissa The Love Bug

The Morris worm


Code Red

Which of the following individuals was convicted of various computer crimes and was known for his ability to conduct successful social engineering attacks?
Kevin Mitnick
Vladmir Levin

Timothy Lloyd
David Smith

According to the CSI/FBI survey, which of the following statistics decreased in 2003?

The number of organizations reporting the internet as a point of attack The number of organizations that have reported unauthorized use of their systems

The average loss as a result of theft of proprietary information

Both B and C

Which virus/worm was credited with reaching global proportions in less than ten minutes?

Melissa Code Red

Morris worm
Slammer

The act of deliberately accessing computer systems and networks without authorization is generally known as:

Computer intrusions Hacking

Cracking
Probing

What is the most common problem/threat an organization faces?

Viruses/worms
Script kiddies

Hackers
Hacktivists

Warfare conducted against the information and information processing equipment used by an adversary is known as:
Hacking
Cyber terrorism

Information warfare
Network warfare

An attacker who feels that using animals to make fur coats is unethical and thus defaces the web site of a company that sells fur coats is an example of:

Information warfare Hacktivisim

Cyber crusading
Elite hacking

Which of the following is not described as a critical infrastructure?

Electricity (power)
Banking and finance

Telecommunicaitons
Retail stores

Criminal organizations would normally be classified as what type of threat?

Unstructured Unstructured but hostile

Structured
Highly structured

Elite hackers dont account for more than what percentage of the total number of individuals conducting intrusive activity on the Internet?
1-2 percent
3-5 percent

7-10 percent
15-20 percent

You might also like