Cyberspace
What is Cybersecurity?
Threats
Cyberwarefare/terror
The Deep Web
100

an interdependent network of information technology infrastructures including the Internet, telecommunications networks, and computer systems.

What is, cyberspace. 

100

According to General Michael Hayden, a cybersecurity knowledge gap exists between ______.


youthful generation and older generation

100

A ______ is a small software program designed to spread from one computer to another and to interfere with computer operation.

Virus

100

system that led to the creation of the Morse code?

Morse Code

100

According to the text, some of the most popular products advertised on the hidden wiki are ______.

drugs

200

______ is a global system of interconnected computer networks that are set up to exchange various types of data.

What is, The Internet?

200

According to the text, dams, railways, and power plants are considered ______.

infrastructures

200

______ viruses attach to the original code, changing the start-up information of the program.

Add-on

200

Cyberespionage can be classified into what two types?

economic and political

200

The Darknet Silk Road runs like a black market ______ site for drugs, drug paraphernalia, and other goods and services.

ebay-type

300

3 layers of cyberspace 

physical, information, logic. 

300

Work-for-hire hackers who work for private security corporations are also referred to as ______.

red teams

300

Multimedia message services viruses target ______.

mobile devices

300

An act that occurs when an actor, knowing that his or her actions will benefit any foreign government, instrumentality, or agent, steals, copies, or receives a trade secret is referred to as ______


economic espionage

300

On the darknet, prices are listed in ______ and are shipped to remote addresses or P.O. boxes.

bitcoins

400

the acronym URL?

Uniform Resource Locator 

400

______ became notorious for being the one of the first cybersecurity intrusions to illustrate how vulnerable our technology is to malicious infiltration.

Moonlight Maze

400

A ______ malware is disguised as, or embedded within, legitimate software.

Trojan Horse

400

According to the text, the most pervasive cyberthreat may be ______.

theft of intellectual property

400

Two of the most popular forms of cryptocurrency are ______.

bitcoins and dash

500

The ______ of the Internet might be a concern for parents regarding who their children may be talking to online.

anonymity/identity

500

______ occur when a computer system is accessed without permission.

Network Intrusions

500

______ are software programs or pieces of hardware that help screen out hackers, viruses, and worms that try to reach computers via the Internet.

Fire walls

500

According to the text, three aspects must be taken into account to determine risk: the threat, the asset, and the ______.

vulnerability

500

Which of the constitutional Amendments established the right to freedom of speech?

First

M
e
n
u