Having read this chapter, try answering the following questions on your own:
- True/False. The code used in the Mirai botnet attack in 2016 was released to the public in order to create plausible deniability for the creators.
- True/False. A command and control server is used in DDoS attacks.
- What is a cross-site scripting attack?
- Name three of the possible types of attacks against our edge analytics applications.
- True/False. A sniffer is a type of spying tool that is set up between our internet router and edge computer.
- How does a cyber criminal trick you into giving them your username and password when you log on to a legitimate website?
- True/False. A physical key switch can be used as a form of security protection on our edge device.
- What are some of the libraries that we can use to write a machine learning module?
- True/False. The name of the Microsoft tool used to monitor...