Nefarious Activities
Prevention
Detection
Virtuous Activities
Trivia that will NOT be on Exam 3
100

Necessity was the reason for hacking in this historical example.

What is World War Two?

100

The reason incentives for hacking should be understood. 

What is to know who and why so we can thwart their efforts?

100

Organizations offer these to entice hackers to find vulnerabilities in their systems.

What are "bug bounties"? 

100

These issues are at the core of cybersecurity.

What are ethical issues?

100

Most dating app uninstalls occur within this time period.

What is the first day of usage?

200

Curiosity was the reason for hacking in this historical example.

What was the 1988 Morris Worm?

200

The shape of the utility curve depicting utility of wealth for a risk averse individual.

What is concave?

200

Protects the integrity and privacy of a company's data in storage and transit.

What is information security?

200

This is one of the sought-after work ethics.

What are attitude, character, cooperation, respect, and productivity? (Any one is acceptable.)

200

The most common reason for hacking.

What is to learn (according to Statista 2023)?

300

This is the costliest but least common cybercrime.

What is investment?

300

Happens to expected utility when the amount of the potential loss decreases.

What is expected utility rises? 

300

Focuses on keeping software and devices free of threats.

What is application security?

300

A cyber expert institutes an extremely time-consuming security login procedure; this economic element of the hospital's functioning is most impacted.

What is resource allocation? 

300

Most web content is located in this portion of the Internet.

What is the deep web?

400

These individuals earn a living hacking legally (common name(s) required).

What are white hat hackers and blue hat hackers? (One or the other is acceptable.)

400

The expected wealth when a $100,000 profit it subject to a 10% risk of losing half of that profit.

What is $95,000?

400

Defines how an organization responds to a cybersecurity incident.

What are disaster recovery and business continuity? (One is acceptable.)

400

The term for the ethical duty to disclose security risks when identified.

What are transparency and disclosure?

400

This code provided for the law of retribution. 

What is Hammurabi's Code?

500

The 2010 Stuxnet Worm was known for evilly doing this.

What is causing physical damage to control systems monitoring industrial facilities?

500

Happens to expected wealth when the likelihood of incurring a loss decreases.

What is expected wealth increases?

500

The greatest risk to a company's security comes from this element of the company.

What are the employees? 

500
Appropriately choosing between what you want now and what you want most, involves this. 

What is discipline?

500

The date we will not have class because Professor Hauge will be in Kentucky. 

What is April 25th?