Podcast
Questions and Answers
What is the estimated annual cost of cybercrime to the global economy according to Intel Security (2014)?
What is the estimated annual cost of cybercrime to the global economy according to Intel Security (2014)?
> USD400 Billion
What is the projected cost of cybercrime by 2019 according to Forbes (2016)?
What is the projected cost of cybercrime by 2019 according to Forbes (2016)?
USD2-Trillion
What is the concept that explains why cybercriminals often target easy and lucrative targets?
What is the concept that explains why cybercriminals often target easy and lucrative targets?
Low-hanging fruit
According to Prothero's theory, what happens when convenience overtakes concerns or problems?
According to Prothero's theory, what happens when convenience overtakes concerns or problems?
Signup and view all the answers
Why are internet and associated technologies vulnerable to cybercrime?
Why are internet and associated technologies vulnerable to cybercrime?
Signup and view all the answers
What is the estimated cost of cybercrime in 2019 according to Statista?
What is the estimated cost of cybercrime in 2019 according to Statista?
Signup and view all the answers
What is the main purpose of Samba?
What is the main purpose of Samba?
Signup and view all the answers
What is the purpose of tools like chkrootkit?
What is the purpose of tools like chkrootkit?
Signup and view all the answers
Why is it nearly impossible to write a bug-free program?
Why is it nearly impossible to write a bug-free program?
Signup and view all the answers
What is the main difference between static and dynamic web pages?
What is the main difference between static and dynamic web pages?
Signup and view all the answers
What is the purpose of the Common Gateway Interface (CGI)?
What is the purpose of the Common Gateway Interface (CGI)?
Signup and view all the answers
What is the main advantage of using PHP?
What is the main advantage of using PHP?
Signup and view all the answers
What is the purpose of ODBC?
What is the purpose of ODBC?
Signup and view all the answers
What is the main advantage of using ActiveX Data Objects (ADO)?
What is the main advantage of using ActiveX Data Objects (ADO)?
Signup and view all the answers
What is the main goal of the Open Web Application Security Project (OWASP)?
What is the main goal of the Open Web Application Security Project (OWASP)?
Signup and view all the answers
What is the main purpose of the OWASP WebGoat project?
What is the main purpose of the OWASP WebGoat project?
Signup and view all the answers
What can be determined with just a URL?
What can be determined with just a URL?
Signup and view all the answers
What is a cookie?
What is a cookie?
Signup and view all the answers
What is a web bug?
What is a web bug?
Signup and view all the answers
What is social engineering?
What is social engineering?
Signup and view all the answers
What is port scanning?
What is port scanning?
Signup and view all the answers
What is footprinting?
What is footprinting?
Signup and view all the answers
What is enumeration?
What is enumeration?
Signup and view all the answers
What is the main weakness in FAT file system?
What is the main weakness in FAT file system?
Signup and view all the answers
What is SQL Server vulnerability?
What is SQL Server vulnerability?
Signup and view all the answers
What is the importance of patching systems?
What is the importance of patching systems?
Signup and view all the answers
What is the main security weakness in any network?
What is the main security weakness in any network?
Signup and view all the answers
What is the primary function of an Access Point (AP) in a wireless network?
What is the primary function of an Access Point (AP) in a wireless network?
Signup and view all the answers
What is the purpose of a Service Set Identifier (SSID) in a wireless network?
What is the purpose of a Service Set Identifier (SSID) in a wireless network?
Signup and view all the answers
What is the difference between WEP and WPA in wireless network security?
What is the difference between WEP and WPA in wireless network security?
Signup and view all the answers
What is the purpose of the 802.1X standard in wireless networks?
What is the purpose of the 802.1X standard in wireless networks?
Signup and view all the answers
What is wardriving, and what tools are typically used in the process?
What is wardriving, and what tools are typically used in the process?
Signup and view all the answers
What is the main purpose of the IEEE in relation to wireless networks?
What is the main purpose of the IEEE in relation to wireless networks?
Signup and view all the answers
What is the function of a Wireless Network Interface Card (WNIC) in a wireless network?
What is the function of a Wireless Network Interface Card (WNIC) in a wireless network?
Signup and view all the answers
What is the primary concern with wireless networks in terms of security?
What is the primary concern with wireless networks in terms of security?
Signup and view all the answers
What is the difference between a Basic Service Set (BSS) and a Distribution System (DS) in a wireless network?
What is the difference between a Basic Service Set (BSS) and a Distribution System (DS) in a wireless network?
Signup and view all the answers
What is the purpose of countermeasures for wireless attacks, such as anti-wardriving software and honeypots?
What is the purpose of countermeasures for wireless attacks, such as anti-wardriving software and honeypots?
Signup and view all the answers
What is one way an attacker can launch a Unicode exploit on an IIS web server?
What is one way an attacker can launch a Unicode exploit on an IIS web server?
Signup and view all the answers
What is the purpose of checking for SQL injection vulnerabilities in a web application?
What is the purpose of checking for SQL injection vulnerabilities in a web application?
Signup and view all the answers
Why is it important to test a web application's authentication mechanism?
Why is it important to test a web application's authentication mechanism?
Signup and view all the answers
What is a characteristic of dynamic web pages?
What is a characteristic of dynamic web pages?
Signup and view all the answers
What is one type of input that security testers should check for when testing for SQL injection vulnerabilities?
What is one type of input that security testers should check for when testing for SQL injection vulnerabilities?
Signup and view all the answers
What is the purpose of checking if a web application connects to a back-end database server?
What is the purpose of checking if a web application connects to a back-end database server?
Signup and view all the answers