29 Questions
What types of data are mentioned in the text?
Valuable, private, dangerous
Why is implementing secure software and hardware challenging?
Ignorance and unawareness of developers
What is a common theme among recent vulnerabilities mentioned in the text?
Security vulnerabilities in various systems
What is often leaked during security breaches according to the text?
Names, addresses, passwords
Which company is described as a high-stakes negotiator with ransomware attackers?
Coveware
What type of attacks does the text mention Coveware dealing with?
Malware attacks
What was the average ransom payout in Q3 2020?
$233,817.30
By what percentage did the average ransom payout rise in the past quarter?
21%
What type of malware targeted ICS systems and sabotaged Iran?
Stuxnet Worm
What is often considered a game of good and evil players?
Practice and theory of security
Which ransomware heavyweights are mentioned as the primary driving factor in the demand for high ransoms?
NotPetya
What area often sees an intersection with many areas of computer science according to the text?
Practice and theory of security
What is the definition of 'Usurpation'?
Unauthorized control of resources
Which security mechanism focuses on preventing attacks prior to the violation of security goals?
Encryption
What is the main purpose of a security policy?
Statement of what is and what is not allowed
Which strategy for security mechanisms involves the use of a virus scanner?
Detection
What is the primary focus of the mechanism 'Authentication' in the context of security?
Verifying the identity of users and entities
What does the term 'CIA' stand for in the context of security goals?
Confidentiality, Integrity, Availability
Which of the following is an example of an attack on Integrity?
An attacker changes the receipt of a bank transaction
What security measure is used to protect resources from unauthorized disclosure?
Encryption of data
Which class of threat involves unauthorized access to information?
Disclosure
What does the term 'Deception' refer to in security terms?
Acceptance of false data
Which security measure is used to protect resources from unauthorized disruption?
Restriction
What is the main goal of the 'Crash course in IT Security'?
To touch the majority of practical relevant security topics
How many PhD students are part of Prof. Dr. Martin Johns' team at the Institute of Application Security?
8 PhD students
What is required to pass the class 'Einführung in die IT-Sicherheit'?
Completing 50% of the weekly exercise sheets
Which topic is NOT covered in the 'Crash course in IT Security'?
Data Privacy Laws
What are the two types of assessments in the 'Einführung in die IT-Sicherheit' class?
Studienleistung and Prüfungsleistung
What level of fear is associated with the 'Exercises' part of the course?
'No fear!' as experimentation is encouraged
Explore the increasing trend of ransomware payouts with average ransom demands and payouts over quarterly periods. Find out the latest statistics and trends in ransomware attacks from reputable sources like Coveware.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free