Skip to main content
Workforce LibreTexts

11.5: Assessment

  • Page ID
    4388
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    True/False

    Indicate whether the statement is true or false.

    ____ 1. Passive defense takes into consideration threat intelligence information that can covertly respond to threat information.

    ____ 2. Privacy-by-design provides standards for securely collecting and maintaining privacy information, beginning at the point of project initiation.

     

    Multiple Choice

    Identify the choice that best completes the statement or answers the question.

    ____ 3. Attacks continue to evolve. Which of the following is not one that was discussed in the presentation?

    a. APTs c. Increased social engineering attacks
    b. Increased attack surfaces associated with the Internet of Things d. All are evolving threats

     

    ____ 4. Which of the following is not a problem associated with the Internet of Things?

    a. Sensors might be placed in public locations where they are prone to tampering. c. Protocols have been used for decades and so tend to be unreliable.
    b. Small nature of the sensors makes them difficult to update, or patch, when a problem is found. d. Security is not usually built into the devices, as they are considered disposable.

     

     

    Completion

    Complete the sentence.

    5. An attack in which the attacker has gained access and maintains access for long periods of time before detection is called a/an ________________________.

     

    Short Answer

    6. The lecture discussed data integrity attacks on power grid or water systems. Identify other critical services that may be vulnerable to a data integrity attack and discuss, generically, how the attack might occur.
     
     
     
    7. Discuss at least one of the ethical or privacy issues associated with critical infrastructure protection.

     

     

     
     

    For the answers to these questions, email your name, the name of your college or other institution, and your position there toinfo@cyberwatchwest.org. CyberWatch West will email you a copy of the answer key.


    11.5: Assessment is shared under a CC BY license and was authored, remixed, and/or curated by LibreTexts.

    • Was this article helpful?