1.4 Historical Perspective and Major Incidents in Information Assurance and Security
10 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What did the Stuxnet worm target?

  • Websites
  • Smartphones
  • Supervisory control and data acquisition systems (correct)
  • Personal computers

Which event highlighted the risks associated with supply chain vulnerabilities in 2020?

  • WannaCry ransomware attack in 2017
  • Target breach in 2013
  • Equifax breach in 2017
  • SolarWinds cyberattack (correct)

Who was responsible for the leak of widespread surveillance practices by government agencies in 2013?

  • APT groups
  • Edward Snowden (correct)
  • Bob Thomas
  • Malicious actors

What significant aspect did the Creeper virus demonstrate in the 1970s?

<p>Potential for disrupting systems and stealing information (C)</p> Signup and view all the answers

Who were some of the pioneering researchers in the development of basic security principles for early computer systems?

<p>Willis Ware and Jerome Saltzer (C)</p> Signup and view all the answers

Which incident in the 1980s was one of the first major instances of malware spreading across the internet?

<p>Morris Worm (A)</p> Signup and view all the answers

What did incidents like the Kevin Mitnick hacking cases in the 1990s bring attention to?

<p>Vulnerabilities of computer networks (D)</p> Signup and view all the answers

During which decade did the 2000s witness a surge in malicious software (malware) and cyber attacks?

<p>2010s (C)</p> Signup and view all the answers

Which two significant malware incidents exploited vulnerabilities in Microsoft Windows in 2003?

<p>Blaster Worm and SQL Slammer (A)</p> Signup and view all the answers

What was a key milestone in the 1970s related to computer security?

<p>Birth of Computer Security (C)</p> Signup and view all the answers

More Like This

Computer Security Fundamentals
14 questions
Information Assurance and Security Trends
10 questions
Information Security Basics Quiz
9 questions

Information Security Basics Quiz

SuperiorCharacterization avatar
SuperiorCharacterization
Information Assurance and Security I Quiz
48 questions
Use Quizgecko on...
Browser
Browser