Collective Behavior and Cyber Strategy Quiz
49 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a norm in the context of collective behavior?

  • An agreement amongst a group about expected behavior (correct)
  • A personal belief that is subject to change
  • A strict regulation that limits individual actions
  • An established law that must be followed by all parties
  • Which of the following elements is not included in an effective cyber strategy?

  • Goals and subordinate objectives
  • Risk management strategies
  • A clear statement of purpose
  • Financial forecasting techniques (correct)
  • How does the US respond to hostile cyber acts according to the content?

  • By using solely economic sanctions
  • Through a combination of various means, including military action (correct)
  • With diplomatic discussions only
  • By ignoring the acts to prevent escalation
  • What is a key problem highlighted regarding minor damage caused in retaliation?

    <p>It lacks a deterrent effect as repairs can be made quickly (C)</p> Signup and view all the answers

    Which aspect is crucial for organizational effectiveness in cybersecurity?

    <p>Clear communication of roles and responsibilities (B)</p> Signup and view all the answers

    In terms of collective expectations, national cyber strategies can articulate what?

    <p>A vision of cooperation or privacy goals (D)</p> Signup and view all the answers

    The challenge of attribution in international relations primarily refers to what issue?

    <p>Identifying state actors involved in cybercriminal activities (B)</p> Signup and view all the answers

    What strategy may be employed to ensure that a cyber adversary's systems consistently fail?

    <p>Inducing lasting damage that modifies their infrastructure (D)</p> Signup and view all the answers

    What strategy did Japan adopt to gain dominance in the semiconductor market?

    <p>License it strategy (B)</p> Signup and view all the answers

    What was a significant impact of the Vietnam War on the semiconductor industry?

    <p>Struggles within the Air Force due to lack of precision (C)</p> Signup and view all the answers

    What was the main focus of Intel to regain its market share?

    <p>Focusing on microprocessors (A)</p> Signup and view all the answers

    What led to the establishment of TSMC in 1987?

    <p>Support from Philips and the Taiwanese government (D)</p> Signup and view all the answers

    What has the EU done in response to antitrust violations by companies like Google?

    <p>Imposed fines (D)</p> Signup and view all the answers

    What was a disadvantage for US companies in the context of Japanese influence in semiconductors?

    <p>Lack of recognition of Japanese advancements (C)</p> Signup and view all the answers

    How do other regions view the US's regulatory approach towards tech companies?

    <p>As protectionist (D)</p> Signup and view all the answers

    Which company began challenging Japan in the DRAM market?

    <p>Micron (C)</p> Signup and view all the answers

    What was a critical change in the supply chain nodes between 1990 and 2000?

    <p>Clear leaders began to emerge in each supply chain node (A)</p> Signup and view all the answers

    What approach does China take with its 'Digital Silk Road'?

    <p>Exports its technology and regulatory norms (D)</p> Signup and view all the answers

    What significant realization led to the founding of SMIC in China?

    <p>Recognition of falling behind in semiconductor technology (B)</p> Signup and view all the answers

    Which legislation in the US protects tech companies from liability for user-generated content?

    <p>Section 230 (C)</p> Signup and view all the answers

    What is a key characteristic of the EU's data protection approach?

    <p>Rights-driven emphasis (C)</p> Signup and view all the answers

    What effect has the GDPR had on countries outside the EU?

    <p>It has influenced data protection laws in other countries. (B)</p> Signup and view all the answers

    What concern does the American model raise regarding tech companies?

    <p>Unchecked influence and misinformation (B)</p> Signup and view all the answers

    What do the proposed norms emphasize regarding cyber operations?

    <p>States should avoid targeting critical infrastructure. (B)</p> Signup and view all the answers

    What is a key aspect of interstate cooperation on cybersecurity?

    <p>Assisting one another in managing cyber incidents. (A)</p> Signup and view all the answers

    What aspect does the EU focus on compared to the American model in tech governance?

    <p>Rights and data protection (A)</p> Signup and view all the answers

    What challenge is associated with the attribution of cyber attacks?

    <p>The difficulty in convincing states of accurate attribution. (D)</p> Signup and view all the answers

    Why might states refrain from disclosing evidence related to cyber attacks?

    <p>They fear intelligence sources could be compromised. (A)</p> Signup and view all the answers

    What is one of the primary aims of the norms proposed by the UN GGE and OEWG?

    <p>To protect critical infrastructure from cyber threats. (C)</p> Signup and view all the answers

    Which problem related to attribution involves potential secrecy?

    <p>Data collected through espionage or intelligence gathering. (C)</p> Signup and view all the answers

    What legal issue is related to the state responsibility doctrine?

    <p>It has been addressed in contexts outside of cyber-attacks. (B)</p> Signup and view all the answers

    What is an important norm regarding hospitals and humanitarian organizations?

    <p>They should be protected from cyber threats. (D)</p> Signup and view all the answers

    What role do private firms play in cybersecurity?

    <p>They provide in-house cyber security to protect themselves. (D)</p> Signup and view all the answers

    Why is inadequate private cybersecurity a concern for national defense?

    <p>Civilian infrastructure is often used to transmit military data. (D)</p> Signup and view all the answers

    How does the Swiss cheese model relate to cybersecurity?

    <p>It highlights negative externalities affecting inequality and accountability. (C)</p> Signup and view all the answers

    Which of the following firms provided protection to the British Labour Party during a DDoS attack?

    <p>Cloudfare (D)</p> Signup and view all the answers

    What is a significant characteristic of cybersecurity compared to traditional military services?

    <p>Cybersecurity was never in public hands to begin with. (C)</p> Signup and view all the answers

    Which statement about privatization in cybersecurity is accurate?

    <p>Privatization affects equality and accountability in cybersecurity. (B)</p> Signup and view all the answers

    What intersection is highlighted regarding private and state roles in cybersecurity?

    <p>Private sector maintenance of critical infrastructure is essential. (C)</p> Signup and view all the answers

    What implication does the privatization of cybersecurity have?

    <p>It may create inequality in access to cybersecurity resources. (C)</p> Signup and view all the answers

    What is a significant concern regarding the reliance on the market for security services?

    <p>It could result in the exclusion of those who cannot afford security. (C)</p> Signup and view all the answers

    What does the term 'cyber-enabled crime' refer to?

    <p>Existing crimes that have been transformed by the internet. (C)</p> Signup and view all the answers

    Which of the following issues arises from the lack of democratic control over private cybersecurity measures?

    <p>A difficulty in holding private firms accountable. (A)</p> Signup and view all the answers

    What is a characteristic of cyber-dependent crime?

    <p>It involves the use of digital systems as both targets and tools. (C)</p> Signup and view all the answers

    How does introducing market logic into cybersecurity potentially affect public protection?

    <p>It may discourage collective investment in public security. (B)</p> Signup and view all the answers

    What is a key obstacle for understanding private military and security companies (PMSCs)?

    <p>A general lack of public awareness and information about them. (C)</p> Signup and view all the answers

    What defines the complexity of cybercrime?

    <p>It is affected by various technological and socio-economic drivers. (B)</p> Signup and view all the answers

    Which of the following is NOT a feature of the security services market identified in the context?

    <p>It promotes equitable access to security for all citizens. (A)</p> Signup and view all the answers

    Signup and view all the answers

    Study Notes

    Cyber Security Foundations

    • Two main points to consider: Technology and Political, economic, and military aspects.

    Technology

    • First attempts at creating the internet were in the 1960s, for military use.
    • Public internet access became available in the 1990s.
    • iPhones were introduced in 2007.
    • Web 1.0 was static and difficult to use. First commercial web in 1990s
    • Web 2.0 was interactive (e.g., Facebook) and needed no technical knowledge to use.
    • Web 3.0 is interactive, using AI and the Internet of Things.

    Political, Economic, and Military

    • The very first phone was a Simon, a proper smartphone.
    • It had similar functions to current iPhones.
    • People did not need to carry phones or cameras separately.

    Cyberspace Layers

    • Physical: Devices and hardware
    • Logical: Connections between devices.
    • Semantic/social: Individuals and information in cyber activities.

    Cybersecurity in International Relations

    • International consensus on norms and rules for behavior in cyberspace is lacking.
    • Determining the origin of cyberattacks is also difficult.

    Approaches to Security

    • Realism, Liberalism, Social Constructivism, Securitization, Critical Security Studies, Peace Studies, Poststructuralism, Postcolonialism, Human Security, and Gender.
    • Traditional and non-traditional security.
    • Digital sovereignty approach, who governs the web?
    • Multi-stakeholder approach for tackling cybersecurity.

    Critical Infrastructure

    • The US government identified 16 critical infrastructure sectors.
    • Incapacitating them would harm national security, health, and economy.
    • Cyber space is becoming crucial for national security.
    • Offensive vs Defensive strategies are present in cyber warfare.

    Cyber Power

    • The ability to invent, adopt, and adapt new technologies, affecting military, economic, and cultural power
    • Innovation power underlies modern military power.
    • The speed to adapt technology is a critical aspect.
    • Sovereign state is the primary concept in regulating global politics.
    • Cyberspace affects concepts of power, governance, and sovereignty.
    • Digital sovereignty refers to a government's authority over the internet and defending its citizens' interests.
    • Multiple stakeholder approach is considered for regulating the Internet/ cyberspace

    Cyber Exceptionalism

    • The digital realm is different from the physical world. Unique approaches are needed to address cyber threats.

    Multi-Stakeholder Internet Governance

    • Prioritises the responsibility of those affected by the internet rather than government regulation.
    • Promotes transnationalism and avoids government-dominated international institutions.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Cybersecurity Foundations PDF

    Description

    Test your knowledge on collective behavior norms and the intricacies of effective cyber strategies. This quiz delves into topics such as national cyber policies, attribution challenges, and the semiconductor industry's evolution. Explore how various elements interact within the realm of cybersecurity and collective expectations.

    More Like This

    Sociology Unit 2 Chapter 23
    26 questions

    Sociology Unit 2 Chapter 23

    SolicitousPelican7010 avatar
    SolicitousPelican7010
    Use Quizgecko on...
    Browser
    Browser