Podcast
Questions and Answers
What did the Stuxnet worm target?
What did the Stuxnet worm target?
- Websites
- Smartphones
- Supervisory control and data acquisition systems (correct)
- Personal computers
Which event highlighted the risks associated with supply chain vulnerabilities in 2020?
Which event highlighted the risks associated with supply chain vulnerabilities in 2020?
- WannaCry ransomware attack in 2017
- Target breach in 2013
- Equifax breach in 2017
- SolarWinds cyberattack (correct)
Who was responsible for the leak of widespread surveillance practices by government agencies in 2013?
Who was responsible for the leak of widespread surveillance practices by government agencies in 2013?
- APT groups
- Edward Snowden (correct)
- Bob Thomas
- Malicious actors
What significant aspect did the Creeper virus demonstrate in the 1970s?
What significant aspect did the Creeper virus demonstrate in the 1970s?
Who were some of the pioneering researchers in the development of basic security principles for early computer systems?
Who were some of the pioneering researchers in the development of basic security principles for early computer systems?
Which incident in the 1980s was one of the first major instances of malware spreading across the internet?
Which incident in the 1980s was one of the first major instances of malware spreading across the internet?
What did incidents like the Kevin Mitnick hacking cases in the 1990s bring attention to?
What did incidents like the Kevin Mitnick hacking cases in the 1990s bring attention to?
During which decade did the 2000s witness a surge in malicious software (malware) and cyber attacks?
During which decade did the 2000s witness a surge in malicious software (malware) and cyber attacks?
Which two significant malware incidents exploited vulnerabilities in Microsoft Windows in 2003?
Which two significant malware incidents exploited vulnerabilities in Microsoft Windows in 2003?
What was a key milestone in the 1970s related to computer security?
What was a key milestone in the 1970s related to computer security?