2. • Which WWII technology Technology from the
Nazi German's, famously decoded by British
mathematician Alan Turing, has recently
became a topic of payment security because it
could help to create fraud-proof bank cards.
What?
8. • There was a series of coordinated attacks on American
computer systems since 2003, masked by proxy, zombie
computer, is considered as the largest instance of state-
sponsored cyber warfare
• The series of attacks are believed by some to be the actions
of the People’s Liberation Army (PLA), rather than some
freelance Chinese hackers.
• This has caused friction between the U.S. and Chinese
governments, although with little evidence the U.S.
government has blamed the Chinese government for the
attacks of 2004.
• In what name federal government of the United States
address this attack?
12. • Native mobile applications are developed for a
specific platform and installed on a computing
device.
• Web applications are generalized for multiple
platforms and not installed locally but made
available over the Internet through a browser.
• But the combination of both exist with the
following features…
13. • Can function whether or not the device is
connected.
• Integration with a device’s file system.
• Integration with Web-based services.
• An embedded browser to improve access to
dynamic online content.
• What do you call such application?
15. • X is the leading platform to discover
innovative companies and the people behind
them.
• Armed with loads of startup data, you can
look up a specific company, person, investor,
venture investments, acquisitions. Identify the
initiative from TechCrunch network?
42. • C&C MDM (Command and Control
Multiplexer DeMultiplexer) and ЦВМ
(Центральная вычислительная машина)
(central computing machine) are the built in
computers in X to run the flight software.
• The C&C runs the US segment and the ЦВМ
runs the Russian segment. What is X?
45. • Germany installs ground-level traffic lights for
a special set of pedestrians, colloquially
dubbed as ‘smombies’.
• A new traffic signal has been introduced for
them. What are we talking about?
• (Image…)
46.
47.
48. • “We’re building digital tools
to fight human trafficking.
Basically, the purchase and
commerce for human
trafficking is happening
online, just like everything
else now, and so we’re
building digital tools to fight
back against it.”
• Rescued 6000 sex trafficking
victims already!
• The person who made above
statement has a tech
connection through a 2013
film. Who/or which movie?
49.
50. • Stuxnet is a 500-kilobyte computer worm, first
identified in 2010, designed to target only
Siemens supervisory control and data
acquisition (SCADA) systems that are
configured to control and monitor specific
industrial processes.
• Its most famous mode of attack explained in
the next slide…
51. • First, it targeted Microsoft Windows machines and
networks, repeatedly replicating itself.
• Then it sought out Siemens Step7 software, which is
also Windows-based and used to program industrial
control systems that operate equipment, such as
centrifuges.
• Finally, it compromised the programmable logic
controllers. The worm’s authors could thus spy on the
industrial systems and even cause the fast-spinning
centrifuges to tear themselves apart, unbeknownst to
the human operators at the plant.
• What was the target?
53. • At the Kaspersky Security Analysts Summit held in Mexico
on February 16, 2015, Kaspersky Lab announced its
discovery of one of the most sophisticated cyber attack
groups in the world. Ands their finding were…
1. Their loader, "Grayfish", had similarities to a previously
discovered loader "Gauss" from another attack series.
2. They used two zero-day attacks later used in Stuxnet.
-------------------------------------------------------------------------
• Researchers concluded that "the similar type of usage of
both exploits together in different computer worms, at
around the same time, indicates that this attack group
group and the Stuxnet developers are either the same or
working closely together. Name the attack group?
55. Given are the two definitions for same thing in the context of
information security. Give me the popular phrase hacking
communities usually used to explain following set of behavior?
• The use of centralized planning in an attempt
to manage social change and regulate the
future development and behaviour of a
society.
• The use of deception to manipulate individuals
into divulging confidential or personal
information that may be used for fraudulent
purposes
60. • "X comes from the marriage of the excitement of
the internet with the simplicity of Macintosh.
Even though this is a full-blooded Macintosh, we
are targeting this for the number one use that
consumers tell us they want a computer for,
which is to get on the internet - simply and fast. X
means some other things to us. We are a personal
computer company always. Product is born to
network, it also is a beautiful standalone
product“.
• What exactly Steve Jobs trying to explain here?
61.
62. • “In 1998, after having been swept up into an improbable romance, I
was then swept up into the eye of a political, legal and media
maelstrom like we had never seen before. Remember, just a few
years earlier, news was consumed from just three places reading a
news paper or magazine, listening to the video or watching
television. but that wasn't my fate! Instead, this scandal brought to
you by digital revolution!
• That meant we could access all the information we wanted, when
we wanted it, anytime, anywhere! And when the story broke in
January 1998, it broke online. It was the first time the traditional
news was usurped by the internet for a major story! When this
happened to me 17 years ago there was no name for it now we call
it cyber bullying or online harassment”
• -Whose statement am I referring here?
63.
64. • With a tagline ‘Build, Ship,
Run’, Docker is the world’s
leading software ____X_____
platform.
• It wrap up a piece of software
in a complete file system that
contains everything it needs to
run: code, runtime, system
tools, system libraries –
anything you can install on a
server. This guarantees that it
will always run the same,
regardless of the environment
it is running in.
• Identify the missing term X
66. • They gained prominence in the Indian smartphone
market by partnering with brands like OnePlus and
Micromax subsidiary Yu. A recent statement appeared
in their blog shown below
• ‘As part of the ongoing consolidation of X, all services
and X-supported nightly builds will be discontinued no
later than 12/31/16. The open source project and
source code will remain available for anyone who
wants to build X personally.’
• What is X?
68. • “In 2011, Manipal Global Education - Chairman
Mohandas Pai, asked someone the exact valuation of
his company, which at that time became quite popular
among college students in South India.
• The founder of that company replied an exaggerated
value of Rs.200Crore against the actual valuation
somewhere close to 40Cr. Mr. Pai became really excited
over the unconvincing figure later managed to invest in
the venture and exited out of the business with a four
times return than the promised value of three times.”
• Story of which personality am I talking about?
69.
70. • In November 2015, this IAS officer was posted in
Trivandrum as Survey Director. He initiated a project
with the intention of bringing places of public interest
onto the online platform. Titled the ‘Map My Home
Project’, it was implemented with the participation of
over 100 students from multiple colleges in the city.
• Three months and over 1500 mapped-locations later,
the Govt. of Kerala issued an order recommending the
state wide implementation of this project.
• His latest IT initiatives are SpeedSpot and TriD.
• Images follow…