Cyber Security definitions
Cyber Security Laws
Cyber Security Threats 2016
Nanotechnology
100

What is the type of software that is designed specifically to damage or disrupt a system?

malware

100
What year was the Electronic Communication Act founded?
1986
100
Who do extortion hacks play into the deepest fears of?
executives and companies
100
What are 2 fields changed through nanotechnology?
military and sporting goods
200

Spyware

What is the name of software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes?

200
What law attempts to strike a balance between the fundamental privacy rights of citizens and the legitimate needs of law enforcement with respect to data shared or stored in various types of electronic and telecommunications services?
Electronic Communication Act 1986
200
What is our next nightmare instead of capturing or releasing data?
changing the data
200
It is predicted that nanotechnology will be as big as the next?
Industrial Revolution
300
What is the program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes?
Virus
300
In what year was the Privacy Act created?
1974
300
What is the problem when someone gets in the system and starts manipulating and changing data, to the point where now as an operator, you no longer believe what you’re seeing in your system?
how do you prove anything
300
According to 2016 trends it is estimated that by the year 2020 what percent of the world's economy will account for digital technology?
25%
400
What is the name of the destructive program that masquerades as a benign application?
Trojan Horse
400
What law limits the disclosure of personally identifiable information (PII) held by federal agencies?
Privacy Act of 1974
400
How can data sabotage be much more difficult to detect than the kind of physical destruction?
Because it is harder to see unless you are looking for it
400
According to 2016 technology trends in IT companies the top 3 areas the should focus on are?
Service, Speed and Personalization
500
What is short for malicious software?
malware
500
What are the types of hacks that threaten to release sensitive company or customer data if the victim doesn’t pay up or meet some other demand called?
extortion hacks
500
During the 1991 Gulf War conflict the computer system failed on the missile defense system, this made us rethink our dependency on what?
computers
500
What education and skills are needed for a career in nanotechnology?
Science, Physics, Chemistry and Biology