11 Questions
What is considered an asset?
Bank account
Which of the following falls under an intangible asset?
Goodwill
What are vulnerabilities in the context of data misuse?
Exploits
What type of personal information was exposed in the Marriott breach?
Names, addresses, phone numbers, passport numbers
How is the Cryptowall Trojan typically distributed?
Through spam campaigns and malicious ads
What is the main objective of the Cryptowall Trojan after infecting a computer?
To encrypt the user's files and demand ransom
In the context of the text, what type of action characterizes the concept of Usurpation?
Unauthorized control of some part of a system
What was the method used by security researchers to capture a player's Fortnite authentication token?
Sending a malicious link through a chat message
What action did the FBI recommend to address the VPNFilter malware threat in May 2018?
Rebooting routers
Which term best describes the consequence of 'unauthorized access to information' as outlined in the text?
Data breach
What potential impact does the VPNFilter malware have on small office and home office routers?
It renders routers inoperable
Explore the survey results from King Saud University regarding data tracking and surveillance perceptions among respondents. Gain insights into the beliefs on online tracking, surveillance consequences, control over data collection, and potential risks of data collection.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free