Test Bank Answers Ch.8 Cybersecurity and Homeland - Homeland Security 1e | Test Bank Givens by Austen D. Givens. DOCX document preview.
Chapter 8: Test Bank
Multiple Choice
- _________________ refers to the study of cybercrime from a criminological perspective.
- Digital forensics
- Criminology
- Cybercriminology
- Cybersecurity
- The CISA is organized into three divisions centered on particular areas of focus within critical infrastructure protection—cyber protection, infrastructure resilience, and _____________________.
- due diligence
- emergency communications
- infrastructure security
- technology development
- __________________ is defined as efforts to protect the confidentiality, integrity, and availability of information technology infrastructure.
- Digital forensics
- Hacktivist
- Cybercriminology
- Cybersecurity
- Which of the following is not one of the five pillars identified in the DHS cybersecurity strategy?
- Risk identification
- Vulnerability reduction
- Threat reduction
- Continuing education
- ________________ refers to the scope of electronic targets that are vulnerable to potential malicious action.
- Attack Surface
- Dark Web
- Risk Plane
- Zero Days
- Which one of the following threats would NOT be considered to be a category of cybersecurity threats?
- Hacktivists
- Malicious insiders
- Spies
- Transportation
True/False
- The scope of cybersecurity threats that exists today is vast.
- True
- False
- Every federal agency has employees working on cybersecurity initiatives.
- True
- False
- DHS is responsible for protecting the web servers of all non-military federal agencies.
- True
- False
- There are no jurisdictional challenges to investigating and prosecuting cybercriminals.
- True
- False
- The primary difference between cybercriminals and other types of criminals is their specific motivations.
- True
- False
- Hacktivists are hackers who use their skills for the purposes of political and social activism.
- True
- False
- There is virtually no criminal action today that does not have at least some link to online activity.
- True
- False
Short Answer
- Describe the different classifications of hackers.
- Hackers can be generally classified into three types: black hat hackers, who knowingly engage in illegal activities; white hat hackers, who carry out legal system penetration work within strict legal and ethical guidelines; and gray hat hackers, who engage in a mixture of legal and illegal activity.
- Explain some of the PPP arrangements that can exist in the realm of cybersecurity.
- Student answer may vary but should include information about several of the following PPPs - legal contracts, information sharing partnerships, civic switchboard partnerships, and/or supply chains.
- Summarize how anonymous browsers work.
- Anonymous browsers employ a combination of proxy servers—that is, they leverage intermediate computer servers used to communicate data requests—and blockers that eliminate or substantially limit the possibility of an Internet user being tracked and identified. The browser itself routes Internet data requests through a series of global proxy servers, or hops. This technology can make it appear that one who is browsing the web from a cafe in New Mexico is in fact located in a home in the Netherlands, for instance
- What lessons can be learned from studying the Stuxnet virus?
- There are at least three broad lessons to be drawn from our understanding of the Stuxnet virus. First, in the absence of robust international laws and norms about cyber warfare, offensive cyber warfare capabilities—rather than defensive capabilities—may offer states the greatest strategic advantage. Second, the ability to strike first using previously unknown system vulnerabilities called zero days creates asymmetric benefits in cyber conflicts that are difficult to counter. It is worth noting that the United States government once held a near monopoly in developing offensive cyber warfare capabilities. And third, while offensive cyber warfare capabilities hold promise for the United States and its allies, governments must also take care in deploying offensive cyber weapons, since they can be re-used against the organizations that developed them.
- Discuss the advances have been made to manage the growing interconnections among computer networks and critical infrastructure.
- In 2018 Congress established the Cybersecurity and Infrastructure Security Agency (CISA) as a component agency within DHS (superseding the national Programs and Protection Directorate). The agency’s mission is to protect national critical infrastructure by leveraging its partnerships with government agencies and private businesses. The CISA is organized into three divisions centered on particular areas of focus within critical infrastructure protection—cyber protection, infrastructure resilience, and emergency communications.
Short Essay
- Cybercriminolgy is a relatively new academic discipline, where do you see the field moving in the next few years? Why?
- Why is it important to treat cybersecurity and critical infrastructure protection in an integrated fashion?
Document Information
Connected Book
Explore recommendations drawn directly from what you're reading
Quick Navigation
Benefits
Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party