APPENDIX AAnswers to the “Check Your Understanding” Questions
1. C. Ransomware commonly encrypts data on a computer and makes the data unavailable until the computer user pays a specific sum of money.
2. D. Cyberwarfare is a subset of information warfare (IW). Its objective is to disrupt (availability), corrupt (integrity), or exploit (confidentiality or privacy). It can be directed against military forces, critical infrastructures, or other national interests, such as economic targets. It involves several teams that work together. A botnet might be one of several tools used for launching the attack.
3. A. A security information and event management system (SIEM) combines data from multiple sources to help SOC personnel collect and ...