Networking
Cyberattacks
100

This type of network device provides a connection that allows devices to send, receive, and store data in a network. They play a crucial role in efficient data transmission, scalability, flexibility, and improved network performance security. 

What is a node

Nodes are similar to traffic intersections in a city. Just like intersections where multiple roads met and where vehicles can stop, go, or turn, nodes are point in a network where data packets are routed and transferred. 

100

Who are black hat hackers? 

Criminals who break into computer networks with malicious intent. 

200

A large retail company, RetailCo, has experienced a significant data breach where cybercriminals infiltrated their systems and accessed sensitive customer information including credit card numbers and left hateful speech throughout their documents. What ethical principles are violated by the actions of the cybercriminals? What type of attack was this? 

The cybercriminals are violating the principles of privacy, offensive language, harm, and deception. By conducting this phishing attack, they are accessing sensitive material which could endanger a company's secrets and the public's trust in their organization. 

200

What is the role of a keylogger in cybersecurity? How do cybercriminals use them? 

A keylogger records every keystroke on a computer device through a bug, potentially capturing sensitive information like passwords and bank information. Cybercriminals use them as a method to blackmail victims into sending money or find vulnerabilities in a system to launch a deeper attack. 

300

The Internet is a worldwide collection of different networks that connect millions of devices. How does this interconnectivity pose challenges for both cybersecurity and cybercrime prevention? 

With more devices and systems connected to the Internet, there are greater vulnerabilities in networks which can be exploited to gain access to sensitive information. Also, a more complex environment also makes it difficult to deploy cybersecurity solutions that obey laws and regulations. Lastly, cybercrime operates anonymously and across borders, making it difficult to attribute attacks to specific individuals or organizations. 

300

What is a denial of service attack (DoS)? How do cybercriminals use it? 

It is a cyber-attack in which an attacker seeks to make a machine or network resource unavailable or to disrupt services connected to the Internet. Hackers accomplish a DoS attack by flooding targeted machines with requests that overload the system and prevent that system from performing its normal operations. 

400

Consider the definition of cyberwarfare. How does the use of technology to attack a nation affect international relations and national security strategies? What preventive measures can be adopted to mitigate such threats?

Cyberwarfare - the use of technology to attack a nation via network communications and computer devices. 

Responses addressing international relations should include one of the following: increased tensions between countries, evolution of warfare and federal resource allocation, and a lack of trust. 

Responses addressing preventive measures should include one of the following: bolstering cybersecurity infrastructure, international agreements, cyber defense exercises, developing cyber deterrence strategies, etc.

400

What are the two ways a sniffer can be used? 

Sniffers can have both legitimate and malicious uses. Network or systems administrators can use sniffers to monitor and troubleshoot network traffic. On the other hand, attackers can use sniffers to capture data packers containing sensitive information. 
500

Imagine a community library is expanding its services and wants to create a new digital network to connects its main branch to smaller branches across the city. The library intends to establish a centralized server with each smaller branch acting as a node within the network. What factors should the library consider when designing the network architecture to ensure efficient communication between the server and the nodes? 

The library should adopt a network topology that facilitates easy management and scalability. Robust security measures such as firewalls, encryption, and secure password protocols are necessary to protect sensitive data. 

500
What are the three types of hackers? 

White hat hackers - also known as ethical hackers, these "good" hackers are hired to find and fix security vulnerabilities in systems. 

Black hat hackers - these hackers are cyber criminals who conduct unauthorized cyberattacks to steal information and sell it for profit. 

Grey hat hackers - these hackers are a combination of white hat and black hat hackers, and they exploit security vulnerabilities without authorization. They then expose the vulnerabilities to network administrators and offer to fix them for money.