Which technology is cited as most at risk from cyberattacks?

Prepare for the USNA Professional Competency Board Test. Use resources like flashcards and multi-choice questions. Achieve success with detailed explanations and hints for every question. Boost your confidence and excel on your exam!

Multiple Choice

Which technology is cited as most at risk from cyberattacks?

Explanation:
The most at-risk technology category is the one that creates the largest attack surface: mobile devices and Internet of Things (IoT). These devices are everywhere and continuously connected, from smartphones and tablets to smart home gadgets, wearables, and industrial sensors. That sheer ubiquity means there are countless points for an attacker to target. Many IoT devices run on limited hardware and use security features that are weak or inconsistently implemented, with infrequent updates, insecure defaults, and complex supply chains. They often communicate over wireless networks and use diverse, sometimes insecure protocols, which makes it easier for attackers to intercept data, hijack devices, or push them into botnets for larger crimes like DDoS or data theft. In contrast, mainframe computers are highly fortified with rigorous access controls and centralized patching, and corporate desktops, while still targets, are typically easier to defend and update than the sprawling, less-managed world of IoT and mobile devices. Analog telephony lines, though legacy, are not as exposed to modern cyberattacks as IP-connected devices. All of this adds up to why mobile and IoT devices are flagged as the most at risk.

The most at-risk technology category is the one that creates the largest attack surface: mobile devices and Internet of Things (IoT). These devices are everywhere and continuously connected, from smartphones and tablets to smart home gadgets, wearables, and industrial sensors. That sheer ubiquity means there are countless points for an attacker to target. Many IoT devices run on limited hardware and use security features that are weak or inconsistently implemented, with infrequent updates, insecure defaults, and complex supply chains. They often communicate over wireless networks and use diverse, sometimes insecure protocols, which makes it easier for attackers to intercept data, hijack devices, or push them into botnets for larger crimes like DDoS or data theft. In contrast, mainframe computers are highly fortified with rigorous access controls and centralized patching, and corporate desktops, while still targets, are typically easier to defend and update than the sprawling, less-managed world of IoT and mobile devices. Analog telephony lines, though legacy, are not as exposed to modern cyberattacks as IP-connected devices. All of this adds up to why mobile and IoT devices are flagged as the most at risk.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy