Viruses
Hackers attack
DSB
Cyberwarfare attacks
Cyberspace
100

Virus 

Virus - is a program that, when executed, replicates itself by modifying other computer programs.

100

The core function of Keychain - 

Keep track of passwords so users don't have to memorise them

100

What is included in the countermeasures

Countermeasures:application firewalls, encryption programs, patch management, and biometric authentication systems.

100

Is a type of cyberattack conducted by a threat actor (or cyber spy) who accesses, steals, or exposes classified data with malicious intent, in order to gain an economic, political, or competitive advantage in a corporate or government setting

Espionage

100

1)A device or any set of computer instructions intended to unlawfully damage a system acting as a critical infrastructure, its information, the data or programs therein contained or thereto relevant, or even intended to facilitate the interruption, total or artial, or alteration of its o erations.

2)Cyber weapon could be defined as a computer code that is used or designed to be used with the aim of threatening or causing physical, functional, or mental harm to structures, s stems, or livin bein s.

1)Security expert

2)Legal expert

200

Adware

Keylogger

Advaware - is software that displays unwanted pop-up ads which can appear on your computer

Keylogger - is a program that records every keystroke made by a computer user to gain fraudulent access to passwords.

200

You start your computer and then an advertisement pops up on the entire screen, after it closes, another advertisement pops up. What kind of virus is this?

Adware
200

Security in IT

Security in information technology (IT) is the defense of digital information and IT assets against internal and external, malicious and accidental threats. This defense includes detection, prevention and response to threats through the use of security policies, software tools and IT services

200

An effort to control information in whatever form it takes, and influence public opinion. It is a form of psychological warfare, except it uses social media, fake news websites and other digital means.

Propaganda attacks 

200

What is cyberspace?

Information and Communication Technology has created a virtual world with no boundaries(cyberspace).

300

Rootkit

Ransomware

Rootkit - is a program that masks its or other software existence.

Ransomware - is malware that prevents or limits users from accessing their system.

300

You received a phone call from an unknown number, the person introduced himself as a friend of your relative. He says that he needs money for the operation your relative. What the name of this hack?

Vishing

300

Physical security

Physical security is the protection of personal, hardware, software, networks and data from physical actions, intrusions, and other events that could damage an organisation. This includes natural disasters, fire, theft and terrorism, among others. Physical security for enterprises often includes employee access control to the office buildings as well as specific locations, such as data centres

300

Is an attack meant to shut down a machine or network, making it inaccessible to its intended users.Thats attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.

Denial of services(DoS) attacks

300

What illegal activities do people commit in cyberspace?

Espionage, theft of technology, financial frauds and so on.

400

Spyware

DDoS Attack virus(Botnet)

Spyware - is any software that installs itself on your computer and starts covertly monitoring your online behaviour without your knowledge or permission. It relays this data to other parties.

DDoS Attack virus - A DDoS virus turns the victim’s device into a zombie participating in a larger botnet. 

400

You are sitting in a coffee shop and drinking coffee, while working on your project and chatting on social networks. Have a carefree time, but then your account was hacked. How did it happen?

Sniffing

400

Application security

 Application security — the protection of applications from threats that seek to manipulate application and access, steal, modify or delete data.

400

DELIBERATE actions to harm an organization's physical or virtual infrastructure, including noncompliance with maintenance or IT procedures, contaminating clean spaces, physically damaging facilities, or deleting code to prevent regular operations.  

Sabotage

400

What parameters can cyber weapons be classified by?

Precision, intrusion, visibility, ease of implementation

500

Trojan

Worm

Bot

Trojan - is a program that, when executed, replicates itself by modifying other computer programs

Worm - can replicate itself without any human interaction, it can be transmitted via software vulnerabilities or could arrive as attachments in spam emails or instant messages

Bot - is a type of malware that is disguised as a legitimate program; it seems to perform one action but actually does something else.

500

You are a frivolous person who sits at home and enjoys homemade cakes and drinks coffee. But suddenly it’s time for work, you leisurely go to the computer, but then there’s trouble, your accounts have been hacked. You understand perfectly well that you didn’t download anything, didn’t follow any links, didn’t surf on private networks and didn’t show your password to anyone, your computer is completely clean from hacker attacks. But how can this be?

A dictionary attack

or

The brute force attack

500

Insosec

Information security encompasses a broad set of strategies for managing the process, tools and policies that aim to prevent, detect and respond to assaults to both digital and non-digital information assets. Infosec includes: application security, the protection of applications from threats that seek to manipulate application and access, steal, modify or delete data.Also infosec includes applicatons security and countermeasures

 

500

What is the danger of electrical power grid attacks?

Surprise attacks?

Electical - Cyber attackers also have the ability to access power system communication networks and connect to remote access points at a power system infrastructure. This can lead to serious and harmful consequences. As a result, cyber security of smart grids has been recognized as a critical issue 

Surprise attacks - The point is to carry out a massive attack that the enemy isn't expecting, enabling the attacker to weaken their defenses 

500

What economic spheres does cyber weapon strike most often?

What are the most dangerous effects of the use of cyber weapons?

Likely targets of cyber weapons are electronic national defence systems, hospitals, water supplies, fully-automated transportation control systems, air traffic controls and etc.

Difficulty to predict its diffusion since cyber space has no boundaries.This means that cyber weapons could hit in unpredictable ways other systems and networks that are not considered targets. In extreme cases, there is a possibility that it attacks the systems of host nation in a sort of "boomerang effect"

M
e
n
u