an interdependent network of information technology infrastructures including the Internet, telecommunications networks, and computer systems.
What is, cyberspace.
According to General Michael Hayden, a cybersecurity knowledge gap exists between ______.
youthful generation and older generation
A ______ is a small software program designed to spread from one computer to another and to interfere with computer operation.
Virus
system that led to the creation of the Morse code?
Morse Code
According to the text, some of the most popular products advertised on the hidden wiki are ______.
drugs
______ is a global system of interconnected computer networks that are set up to exchange various types of data.
What is, The Internet?
According to the text, dams, railways, and power plants are considered ______.
infrastructures
______ viruses attach to the original code, changing the start-up information of the program.
Add-on
Cyberespionage can be classified into what two types?
economic and political
The Darknet Silk Road runs like a black market ______ site for drugs, drug paraphernalia, and other goods and services.
ebay-type
3 layers of cyberspace
physical, information, logic.
Work-for-hire hackers who work for private security corporations are also referred to as ______.
red teams
Multimedia message services viruses target ______.
mobile devices
An act that occurs when an actor, knowing that his or her actions will benefit any foreign government, instrumentality, or agent, steals, copies, or receives a trade secret is referred to as ______
economic espionage
On the darknet, prices are listed in ______ and are shipped to remote addresses or P.O. boxes.
bitcoins
the acronym URL?
Uniform Resource Locator
______ became notorious for being the one of the first cybersecurity intrusions to illustrate how vulnerable our technology is to malicious infiltration.
Moonlight Maze
A ______ malware is disguised as, or embedded within, legitimate software.
Trojan Horse
According to the text, the most pervasive cyberthreat may be ______.
theft of intellectual property
Two of the most popular forms of cryptocurrency are ______.
bitcoins and dash
The ______ of the Internet might be a concern for parents regarding who their children may be talking to online.
anonymity/identity
______ occur when a computer system is accessed without permission.
Network Intrusions
______ are software programs or pieces of hardware that help screen out hackers, viruses, and worms that try to reach computers via the Internet.
Fire walls
According to the text, three aspects must be taken into account to determine risk: the threat, the asset, and the ______.
vulnerability
Which of the constitutional Amendments established the right to freedom of speech?
First