Module 11: Trends

Assessment

True/False

Indicate whether the statement is true or false.

 

____ 1. Passive defense takes into consideration threat intelligence information that can covertly respond to threat information.

Multiple Choice

Identify the choice that best completes the statement or answers the question.

 

____ 2 Attacks continue to evolve. Which of the following is not one that was discussed in the presentation?

  • a. APTs
  • b. Increased attack surfaces associated with IoT
  • c. Increased social engineering attacks
  • d. All are evolving threats

 

____ 3. Which of the following is not a problem associated with the Internet of Things?

  • a. Sensors might be placed in public locations where they are prone to tampering.
  • b. The small nature of the sensors makes it difficult to update, or patch, when a problem is found.
  • c. Protocols have been used for decades and so tend to be unreliable.
  • d. Security is not usually built in to the device, as they are considered disposable items.

Completion

Complete each statement.

4. An attack in which the attacker has gained access, maintaining access for long periods of time before detection, is called a/an _____________________.

Short Answer

5. The lecture discussed data integrity attacks on power grids or water systems. Identify other critical services to which may be vulnerable to a data integrity attack and discuss, generically, how the attack might occur.

6. Discuss at least one of the ethical or privacy issues associated with critical infrastructure protection.

7. Discuss at least one emerging trend relating to critical infrastructure protection.

License

Icon for the Creative Commons Attribution 4.0 International License

Critical Infrastructure Systems by NCyTE Center is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book