1.4 Historical Perspective and Major Incidents in Information Assurance and Security

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What did the Stuxnet worm target?

  • Websites
  • Smartphones
  • Supervisory control and data acquisition systems (correct)
  • Personal computers

Which event highlighted the risks associated with supply chain vulnerabilities in 2020?

  • WannaCry ransomware attack in 2017
  • Target breach in 2013
  • Equifax breach in 2017
  • SolarWinds cyberattack (correct)

Who was responsible for the leak of widespread surveillance practices by government agencies in 2013?

  • APT groups
  • Edward Snowden (correct)
  • Bob Thomas
  • Malicious actors

What significant aspect did the Creeper virus demonstrate in the 1970s?

<p>Potential for disrupting systems and stealing information (C)</p> Signup and view all the answers

Who were some of the pioneering researchers in the development of basic security principles for early computer systems?

<p>Willis Ware and Jerome Saltzer (C)</p> Signup and view all the answers

Which incident in the 1980s was one of the first major instances of malware spreading across the internet?

<p>Morris Worm (A)</p> Signup and view all the answers

What did incidents like the Kevin Mitnick hacking cases in the 1990s bring attention to?

<p>Vulnerabilities of computer networks (D)</p> Signup and view all the answers

During which decade did the 2000s witness a surge in malicious software (malware) and cyber attacks?

<p>2010s (C)</p> Signup and view all the answers

Which two significant malware incidents exploited vulnerabilities in Microsoft Windows in 2003?

<p>Blaster Worm and SQL Slammer (A)</p> Signup and view all the answers

What was a key milestone in the 1970s related to computer security?

<p>Birth of Computer Security (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Computer Security Concepts
18 questions
Information Assurance and Security Trends
10 questions
Information Security Basics Quiz
9 questions

Information Security Basics Quiz

SuperiorCharacterization avatar
SuperiorCharacterization
Information Assurance and Security I Quiz
48 questions
Use Quizgecko on...
Browser
Browser