Podcast
Questions and Answers
What is a generic term for any 'evil software'?
What is a generic term for any 'evil software'?
How do traditional external attackers primarily use the Internet?
How do traditional external attackers primarily use the Internet?
What was the behavior detected in the 2008 Presidential election campaign and celebrity hospitalizations related to?
What was the behavior detected in the 2008 Presidential election campaign and celebrity hospitalizations related to?
What is one of the risks associated with downloading inappropriate material at work?
What is one of the risks associated with downloading inappropriate material at work?
Signup and view all the answers
What did one in three senior IT administrators admit to doing according to a survey in London?
What did one in three senior IT administrators admit to doing according to a survey in London?
Signup and view all the answers
What are some examples of non-internet computer abuse?
What are some examples of non-internet computer abuse?
Signup and view all the answers
Which category of attackers often retains credentials after their brief engagement ends?
Which category of attackers often retains credentials after their brief engagement ends?
Signup and view all the answers
'RATs' are an example of what type of software?
'RATs' are an example of what type of software?
Signup and view all the answers
'Internet Abuse' can lead to which of the following consequences?
'Internet Abuse' can lead to which of the following consequences?
Signup and view all the answers
'Loss of computers or data media containing sensitive information' is an example of what kind of threat?
'Loss of computers or data media containing sensitive information' is an example of what kind of threat?
Signup and view all the answers