Send a link to your students to track their progress
233 Terms
1
New cards
Three components of Computer arcitecture
.Central Processing Unit (CPU); Random Access Memory (RAM); Hard Drive
2
New cards
CPU (Central Processing Unit)
It is the brains of the computer, performing all mathematical and logical operations.
3
New cards
RAM (Random Access Memory)
Short Term (Volatile) memory; Non-Persistant data storage meaning it is lost when a computer loses power.
4
New cards
Hard Drive
The primary storage component of a computer which holds all software and data; Persistant Data Storage meaning data is saved if power is lost
5
New cards
Fetch-Decode-Execute Sequence
1.) FETCH the next instruction as a block of bytes
6
New cards
2.) DECODE the bytes to determine which action
7
New cards
3.) EXECUTE the action decoded
8
New cards
When you run a program, the computer first copies the program from the hard drive to RAM before entering
9
New cards
into the fetch-decode-execute sequence (T/F)
TRUE
10
New cards
Supply Chain Threats
Counterfeit Electronics (I.e old/refurbished equip. ; bad part packaged like a real one ; cloned parts imbedded with malware )
11
New cards
The large number of organizations involved in supply chain for producing computers, reduces cybersecurity risk. (T/F)
FALSE
12
New cards
Aspects of Cyber Security Domain
1.) PERSONA ASPECTS
13
New cards
2.) INTERFACE ASPECTS
14
New cards
3.) DATA ASPECTS
15
New cards
4.) NETWORK ASPECTS
16
New cards
5.) GEOGRAPHIC ASPECTS
17
New cards
PERSONA ASPECTS
- represent users that have a role in cyber domain (can have multiple personas)
18
New cards
INTERFACE ASPECTS
- Hardware and software users interact with to provide input (I.e Keyboards, mouses, etc)
19
New cards
DATA ASPECTS
- represent info stored in the information system; raw data stored in cyber domain
20
New cards
NETWORK ASPECTS
- represents the path s that data flows accross between systems or systems that store data
21
New cards
GEOGRAPHIC ASPECTS
- represents phsycial location of user, system, and data paths (includes natural boundaries and geopolitical boundaries)
22
New cards
Pillars of Cyber Security
(CIANA) (5 of them)
23
New cards
Confidentiality
24
New cards
Integrity
25
New cards
Availability
26
New cards
Non-repudiation
27
New cards
Authentication
28
New cards
Confidentiality
Protection of Information from DISCLOSURE to unauthorized users (DATA oriented)
29
New cards
Integrity
Protection of Information, systems, etc from MODIFICATION or destruction (DATA oriented)
30
New cards
Availability
Timely, reliable access to data and information servcies (SERVICE Oriented)
31
New cards
Non-Repudiation
Change a record of a recorded action (changing up proof) (ENTITY oriented)
32
New cards
Authentication
ability to VERIFY the indentity of someone (ENTITY oriented)
33
New cards
What is the primary pillar of cyber security violated:
34
New cards
Successfully injected javascript into a webpage that changed the contents of the page
__Integrity__ Key word: CHANGED, INJECTED
35
New cards
What is the primary pillar of cyber security violated:
36
New cards
Logged onto your roommate's laptop, without their permission, with stolen credentials
_Authentication__ Key Word: STOLEN CREDENTIALS
37
New cards
What is the primary pillar of cyber security violated:
38
New cards
Once on your roommate's laptop, read all of their emails to see what they said about you
__Confidentiality__ Key Word: READ
39
New cards
What is the primary pillar of cyber security violated:
40
New cards
Changed an online invoice to state that you made a purchase at 10:00 AM instead of 10:00 PM
__Non-repudiation__ Key Word: CHANGED, TIME
41
New cards
Think of this as getting your ass out of trouble for proof when you go to court. "He was killed at 10AM" bt he couldnt be because I was at the store at 10AM (even tho you werent because you killed him)
42
New cards
What is the primary pillar of cyber security violated:
43
New cards
Sent one million ping requests simultaneously to the RONA server, flooding it with requests
__Availability__ Key Word: Flood
44
New cards
It crashes the server so no one can use it to get more info on what you did when you killed the person from above scenario
45
New cards
Risk and Vulnerabilities types
Risk
46
New cards
Impact
47
New cards
Vulnerability
48
New cards
Threat
49
New cards
Capability
50
New cards
Oppurtunity
51
New cards
Intent
52
New cards
Risk Management Tradeoff
53
New cards
What s a Risk?
a measure of the extent to which an entity is threatened by a potential circumstance or event
54
New cards
What is Impact?
an adverse effect that results from an event occurring
55
New cards
What is Vulnerability?
a weakness in a system that can be exploited by a threat that adversely affect the system, results in an adverse impact. weakness in an information system that can be exploited to compromise a pillar of cybersecurity.
56
New cards
What's a Threat? (think)
an actor or event with the potential to adversely impact and information system
57
New cards
To have the Capability: (You can)
the knowledge and skill set required by a threat to carry out an event
58
New cards
To have the Oppurtuntiy: (You could/ You have the means to(too?))
the resources and positioning required by a threat to carry out an action
59
New cards
What is Intent (I want to)
the motivation of a threat to carry out an action
60
New cards
Risk Management Tradeoff
Functionality, risk, cost
61
New cards
Risk is a part of everything we as humans do on and off a computer. Risk generally increases the more you do online.
62
New cards
List the 4 strategies for addressing Risk:
(AACT)
63
New cards
64
New cards
- Avoid - Avoid activities that would make you incur the risk
65
New cards
- Control - Apply measures to reduce (mitigate) the risk
66
New cards
- Accept - Accept all of the risk and continue the activity
67
New cards
- Transfer - Transfer the risk to someone else
68
New cards
How to mitigate the risk of someone coming in and looking at the rainbow table tryna steal passwords?
Hashed (and salted) the password file.
69
New cards
What should you never do with your passwords? How many times should you use a password?
Not reuse passwords. Only once
70
New cards
Bit
individual 0 or 1 value
71
New cards
Byte
8-bit chunk.
72
New cards
String
sequence of characters
73
New cards
File
sequence of bytes
74
New cards
Plaintext
contains text of course; open with Notepad or Notepad++; typical extension is .txt
75
New cards
JPG
image file; open with Windows Photo Viewer, photoshop, etc.' extension is .jpg or .jpeg
76
New cards
ZIP file
contains a bundled collection of files and folders; typical extension is .zip (annoying shit we'd have to open and unpack in the labs)
77
New cards
PDF File
portable document format; open with adobe acrobat reader, extension is .pdf
78
New cards
MP3 File
Mpeg layer 3 file; audio file using a specific compression algorithm; can be opened in many players, including iTunes, Windows Media player, and WinAmp; extension is .mp3 (Think MP3 Players \> Music ETC also SOUND CLOUD RAPPER)
79
New cards
0101 0010 0100 1001 0100 0110 0100 0110
80
New cards
What tool would you use to look at the bytes of this file to determine what type of file it is?
What is the Hexadecimal representation of the first two bytes of the file?
52 49
83
New cards
0101 0010 0100 1001 0100 0110 0100 0110
84
New cards
What type of file is this?
AVI / WAV
85
New cards
0101 0010 0100 1001 0100 0110 0100 0110
86
New cards
What is a better indicator of file type - file extensions or file headers? Explain your answer.
File headers are a better indicator, because they are needed to open a file correctly. Conversely, someone
87
New cards
can change the file extensions, and the file could still open if the file header was correct. (Can't open something if you don't know what to open/ don't know what a paepr is about without an intro with a thesis)
88
New cards
When hiding information in a picture file using steganography, it is better to hide the data in the least
89
New cards
significant bits of a byte because those bits have less influence over the quality of the picture than higher order bits. (T/F)
TRUE
90
New cards
What is a File Extention?
-When the operating system trusts the extension to tell them the file type.
91
New cards
-Extensions may lie.
92
New cards
-This is the shit you change when you want to mess with people (We did this in a lot of labs)
93
New cards
-The only real way to know the type of the file is to examine its bytes and see what format it's in. (By using somethig like Fhred )
94
New cards
What are File Headers
a short sequence of data at the head or beginning of the file data. This can be recognized when viewing a file in a hex editor
95
New cards
96
New cards
EXAMPLES:
97
New cards
JPG: ff d8 dd e0 00 10
98
New cards
avi/RIFF: 52 49 46 46
99
New cards
Doc: d0 cf 11 e0 a1 b1 1a e1 00 00
100
New cards
Define Policy
set of actions the government should take in order to reach its desired outcome