Cybersecurity affects everyone, including in the delivery of basic products and services. If you or your organization want to better understand how to address your cybersecurity, this is the course for you and your colleagues to take from seasoned professionals to your non-technical colleagues.
The course is currently offered by The University of Maryland through coursera platform.
You can enroll here:
https://www.coursera.org/learn/cybersecurity-for-everyone

Coursera X Cybersecurity for Everyone Week 6 Quiz Answers!
Question 1. A threat actor can only create direct effects on the victim cyber-attack can only generate impacts on the system it directly hacks.
True
False
Question 2. The direct impacts a threat actor has on a system is called a:
Primary effect
Secondary effect
Second Order effect
Cumulative effect
None of the Above
Question 3. Secondary effects capture each of the following consequences except for:
Impacts to a firm’s revenue
Impacts to a firm’s reputation
Costs tied to the remediation of systems and services for the firm
Decreased technical system performance
None of the Above
Question 4. Second-order effects are best described as:
Effects on society that stem from actions taken by threat actors but whose actions generate failures to a critical organization's systems and processes
Effects on a organization’s ability to produce products and generate revenue
Effects on a specific IT system that results in a 24 downtime for that device
Effects on the reputation of the business as a result of a hacker’s efforts
None of the Above
Question 5. Determining if a cyber attack is a private problem versus a public concern is primarily a function of:
The scope and severity of the primary impacts on the victim’s computers and networks
The scope and severity of the secondary impacts on the victim’s revenue and product or service delivery capability
The scope and severity of the second-order impacts to a community because of the loss of capabilities of systemically important organizations
The sophistication of the techniques used to engineer the hack of the target’s computers
None of the Above
Question 6. A firm’s stock price that falls 20% after a cyber event is an example of a:
a) Second Order Effect
b) Secondary Effect
c) Primary Effect
d) Complex Effect
e) c and d
Question 7. Use the Following Narrative for the questions that follow.
In 2017, a cyber attack against Maersk Line, a large container transport company, resulted in thousands of their devices disrupted by the NotPetya ransomware by having the contents on those devices encrypted and made inaccessible to the company. The firm eventually rebuilt over 45,000 desktops and over 2,500 servers. Port operations in 76 countries were impacted, costing the company $300M in lost revenue and remediation costs. Hundreds of companies had their logistics chains stopped or severely degraded. Researchers have tied the distribution of the ransomware to efforts by a Russian APT.
According to the classification system presented, the primary effect to Maersk’s devices is best described as a:
Data Attack
Sensor Exploitation
External Denial of Service Attack
Internal Denial of Service Attack
Message Manipulation Attack
Question 8. The $300M dollar loss by Maersk Line would be considered a:
Primary Effect
Secondary Effect
Second Order Effect
Physical Effect
Question 9. The degradation to the central European logistics supply chains stemming from this attack would be an example of a:
Second Order Effect
Primary Effect
Secondary Effect
Data Attack
Post a Comment