CompSci Objectives

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/68

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

69 Terms

1
New cards

Describe and differentiate between the components of the Von Neumann Computer architecture

In a Von Neumann Computer it can store and process info.  There are 4 parts.  Input, CPU, Memory, and output.  The input device is what inputs the information.  The CPU processes that info based off algorithms (instructions) are stored in memory. The memory houses more data and algorithms as well.  The output device is the result of the computer after processing the input.  This may be pulling up a file or operating a system like a printer.

2
New cards

Describe the function of each major computer hardware component: motherboard, CPU, memory boards, display card, power supply

The motherboard is the physical piece of material that houses the major components of the computer and connects them.  The CPU or central processing unit processes information and carries out commands.  Memory boards such as RAM and hard drives store memory for the computer both long term and short term.  The display card is responsible for the graphics of the computer and displaying the information.  The power supply takes power from a wall outlet and sends it to all areas where it is needed.

3
New cards

Summarize the memory hierarchy and explain the balance between access speed, storage capacity, and cost with regards to computer memory

At the top of the hierarch is the CPU caches and registers (not important for this course).  Then Ram, Hard Drive, and Archival memory like DVDs and CDs.  As access speed increase, storage capacity decreases and cost increases.  So RAM cant store a ton of data, and is expensive but is fast.

4
New cards

Apply Moore's Law to analyze computer performance over time

Moore’s Law is the principle which says that processing power of computers roughly doubles every 2 years due to the number of transistors which can fit onto a CPU.  Also, as this increases the price decreases

5
New cards

Identify and describe the meaning of common file extensions.

Common file extensions are letters that follow a file to tell what operating system the file falls under.

  • Text Files: .txt (plain text), .docx (Microsoft Word), .pdf (Portable Document Format)

  • Image Files: .jpg/.jpeg (JPEG image), .png (Portable Network Graphics), .gif (Graphics Interchange Format)

  • Audio Files: .mp3 (MP3 audio), .wav (Waveform Audio)

  • Video Files: .mp4 (MPEG-4 Video), .avi (Audio Video Interleave)

  • Executable Files: .exe (Windows executable), .app (Mac application)

  • Compressed Files: .zip, .rar (compressed archives)

  • Code Files: .py (Python script), .html (HTML document), .java (Java source code)

6
New cards

Navigate the file structure within the computer, including locating, opening, and saving files in different directories.

In the computer there is a root directory which is the topmost hierarchy, this is the operating system (Windows).  From this there are sub directories which house more specific files.  There are paths of saving information is each directory.  An absolute path goes all the way from the root directory to find a file, while a relative path only goes from the current directory the user is in.  Files can be saved by going to each directory and saving them there.

7
New cards

Convert between binary and decimal numbers

So for each place do the number times 2 to the power of the place. To go from decimal to binary divide by 2 and the remainder is the number until you get to zero then read in the reverse order.

8
New cards

Calculate how many values can be represented with b bits

For every number of bits, square that number.  So, if I have 5 bits, I can have 2^5 unique combination.

9
New cards

Calculate how many bits are needed to represent a given number of unique values

Find the power of 2 needed to encompass the number of representations needed.  So if I need 48 combos, I need 6 bits of info because 2^6 = 64 and 2^5= 32 so it must be 6 bits.

10
New cards

Convert between bits, bytes, kilobytes, megabytes, and gigabytes

1 byte is 8 bits.  A kilobyte is 2^10 which is 1024 bytes.  For further units such as mega or giga just multiply or divide by 1024.  So 1 megabyte is 1024^2, and 1 gigabyte is 1024^3.

11
New cards

Explain how characters are encoded in ASCII and UNICODE

ASCII uses 8 bits per character and UNICODE uses 8,16, or 32. Each character has a unique set of binary numbers.

12
New cards

Identify the key characteristics of an algorithm

It must be an ordered set of executable steps that are unambiguous and free of omissions and contradictions that will result in the accomplishment of an objective.

Or

A set of detailed instructions for accomplishing a task.

13
New cards

Explain how algorithmic reasoning is broadly applicable

Algorithmic reasoning is broadly applicable because it helps solve problems, optimize processing, and automate tasks.

14
New cards

How should algorithms be constructed to solve problems of varied complexity

Write down a logic design such though a recipe is being followed to outline completely what needs to be done to achieve an end result, then implement is.

15
New cards

Define Artificial Intelligence (AI)

Artificial Intelligence is the simulation of human intelligence by machines

16
New cards

Summarize how the Turing test has shaped AI

Turing test is the ability for an AI’s output to be indistinguishable from that of a human.  It is the measurement of being able to say if a computer is intelligent.

17
New cards

Differentiate between narrow and general AI

General AI can exhibit human cognitive abilities and can think and accomplish task on its own including logical thinking and performance in uncertain conditions and being able to learn on its own.

Narrow AI can model human intelligent behavior but can only operate within a pre-defined range of functions.  Can’t think for itself, can only learn when provided with data, and can only perform the task it was designed for.

18
New cards

Outline the types of problems AI can (and can potentially) help humans solve

Classification, Clustering, Optimization, Abnormality Detection, Estimation/Prediction, Ranking/Recommendation, and Data Generation.

19
New cards

Describe and differentiate between each phase in the "Sense-Think-Act" cycle

Sense is the detection of information about its surroundings.  Thinking is finding the best move to do in the current state.  Acting is performing that action.

20
New cards

Differentiate between AI decision making techniques such as decision trees, search trees, and finite state machines

Decision trees are a series of if statements that the AI goes through to decide what to do.  Search for trees though.  Finite state machines determine a state it should be on based on the surroundings, like a guard being passive until it sees the player.  Search tress are branches of decisions the AI can choose from and when they choose the best state that branches out.

21
New cards

Define the concept of a game state

A game state is a snapshot of a game at a given point and the configuration of all the pieces of that game at a time.

22
New cards

Define the concept of a heuristic for Artificial Intelligence

A heuristic is a simplified way of approximating how good a certain state is more quickly compared to an optimized algorithm that considers every outcome of a state. 

23
New cards

Differentiate between depth-first and breadth-first search

Analyzing a game state layer by layer for decisions where is looks at all the decisions for a certain level. Breadth-first search depends on how far we choose for the AI to pick.  Depth-first searches chooses one linage and goes as far down it can for one input then does that for all possible choices.  It checks for all possible outcomes.

24
New cards

Use rule-based AI strategies to solve a discrete game

This would be like if car in front, go left, or go right, or for pong, for x position of ball, go to x position of paddle.

25
New cards

Define "model", "instance", "feature", and "label" in the context of machine learning

A model is a representation of what a machine learning system has learned from the training data and can make useful predications of new data.  A feature is a value that can be used to make a prediction, a column in a data set.  A label is the answer or the result of an instance.  It represents the concept that the model is being trained to classify.  An instinct is a row in a dataset, a specific example.

26
New cards

Compare and contrast Supervised and Unsupervised learning

Unsupervised learning is good with unlabeled data and its job is to cluster data for a person to determine if it is useful. Supervised learning is with labeled data that it then used to identify relationships between and predict the label by only looking at the features.  The wine and beer example.

27
New cards

Describe and differentiate between the steps required for supervised learning

1.       Gathering data- determining what information needs to be collected

2.        Preparing data- putting the data in an order and such a manner that makes sense

3.       Choosing a model- Choosing what kind of algorithms work the best

4.       Training the model- Giving the data to the model and letting it learn

5.       Evaluating the model- Test the model against new model to see if the model has learned concepts, not memorized data

6.       Tuning- Tweaking the settings to increase the accuracy of the algorithm like learning rate or how much time the algorithm can go through the data

7.       Predicting: using the model to do work

28
New cards

Describe the limitations with current AI and ML systems.

  1. Narrow focus, can only do one task

  2. High Cost of Creation

  3. Hidden Biases

  4. Ambiguous Responsibility, whose fault is it when AI fails?

  5. Lack of Interpretability, inability to understand what the AI actually learned

29
New cards

Describe the Ethical Limitations of using machine learning algorithms.

Theres no agreed upon ethical farmwork for AI. Generally, AI needs to have transparency, accountability for who has ownership over it, reliability, and uphold high standards of predictability. Especially because AI is important in every aspect of society.

30
New cards

Describe the concept of Explainable AI

AI that can describe how they arrived at their decisions; enabling human users to understand, trust, and manage their AI partners. Decreases a lack of interpretability.

31
New cards

Describe and differentiate between the roles and responsibilities of clients and servers

Client’s job is to make a message, find the IP address of the server and corresponding port, know its own IP and port, and send that message

The servers job is to look at that port that info came in on, forward it to the correct application, create a response, then make a packet with the correct destination IP and port and send its message back to the client.

32
New cards

Describe the role of protocols in network communications

Protocols are defined ways for clients and servers communicate, like a langue they both understand.  TCP protocols are more reliable and makes sure the message is delivered and sends a confirmation message when it does, but it is slow.  Used for things like files and word documents.  UDP is less reliable and just sends a message, better for video and real time applications where it’s okay if a couple messages don’t make it. UDP is much faster.

33
New cards

Describe Internet Protocol (IP) addressing

IP addresses are the unique network location of your device on a network that allows protocols to be sent to the correct locations and sent back.  Like a letter with the correct shipping and return address. They have 4 numbers that each can ONLY range from 0-255. EX; 134.39.125.35:80 the last number is the port.

34
New cards

Describe the concept of logical ports

Logical ports are figurative locations on a computer made by the operating system where applications listen for incoming data, like a mail box where YOU go to check for ONLY mail, not like videos and shit.

35
New cards

Function for HTTP, FTP, and SMTP protocols

HTTP is for web browsing and web pages. FTP is file transfer protocol and is used for sharing files. SMTP is simple message transfer protocol and is used for emails.

36
New cards

Internet Protocol (IP) Routing

using different routers to send a message through various layers of networks. If one router goes down another one can be used to send the information.

37
New cards

Describe and differentiate between the functions of routers and switches

Switches are for message to be sent within a network, and to connect devices within a network. Routers are used to send things in and out of network. If one goes down, the messages can take a different “route” using different routers.

38
New cards

Describe domain name system (DNS)

It is used to convert network names into IP addresses by going through a hierarchy of networks that each know a little piece of information about the network.

39
New cards

Describe the dynamic host configuration protocol (DHCP)

It lets computers request IP addresses when they join a network, like a temporary IP address while they use it.

40
New cards

Describe network address translation (NAT) and its benefits

It takes a bunch of private IP addresses in a network and represents them with just one public IP address. Allows less public IP addresses to be used up.

41
New cards

Describe wireless security technologies

-Blocking a wireless signal with materials

-Encrypting data with a password, like Wi-Fi

-HTTPS which encrypts information being sent

-VPNs (virtual private networks). What the air force uses with CACs as they create encrypted connections before messages are even sent.

42
New cards

Describe the security and privacy challenges inherent in wireless networks

Privacy: data is being broadcasted so anyone can pick it up.

Security: It’s hard to ensure that only “good” people are on the network

43
New cards

Define risk in terms of information security

A risk is a threat of an attacker to exploit a vulnerability to the protection of data and information systems.

44
New cards

Define and differentiate between CIA (confidentiality, integrity, accessibility)

Confidentiality: Means info cannot be accessed by unauthorized parties

Integrity: Means info is accurate and cannot be modified in an unauthorized manner

Availability: Means a user can access the information they are supposed to have access to

45
New cards

Describe and differentiation between external and internal threats

external threats: threats outside of one’s organization, criminals, terrorists, enemy nations, hackers.

internal threats: threats inside of one’s organization, family member, employees, untrained users, spies.

46
New cards

Describe how hashes are used to ensure integrity

They encode messages into characters where any change will be seen. By comparing the message with the hash value, the message can be ensured to be correct. Like a fingerprint.

47
New cards

Describe the difference between symmetrical and asymmetrical encryption

Symmetrical: each person gets the same key that is used to encrypt and decrypt the message. It is faster and takes less keys than asymmetric, but it’s hard to distribute keys, and key compromises pose larger security risks.

Asymmetric: Each person gets 2 different keys, a public and a private key. the message can be encrypted with the public key and may only be opened with the private key and vice versa. The downside is that it is waaaaaay slower, but it is easier to share public keys and is less of a security risk.

48
New cards

Describe the use of public key infrastructure

A system of trust-based models where certificate authorities verify individuals and public keys to information so people can send and receive information to and from the intended people.

49
New cards

Authentications Measures HAK

What you Have- CAC

What you Are- Retina, weight

What you Know- Passwords

50
New cards

Describe the cyber-attack methodology

A systematic method to identify, exploit, and leverage weaknesses to target a system.

51
New cards

Relate the cyber-attack methodology to a cyber-crime.

The Colorado department of Transportaion was attacked along with Regis University.

52
New cards

Describe and differentiate between each phase of the cyber attach methodology

Reconnaissance (passive collection of info from like google or media), Scanning (Active system probing for weaknesses and targets), Gaining access (getting some one’s password or sum), Maintaining Access (using admin privileges to stay unnoticed and in the system), Covering tracks (altering logs to ensure the damage can’t be seen or can’t be traced back. A rootkit can help deleting files and covering tracks).

53
New cards

Describe the role of network mapping and vulnerability identification

Network mapping shows how the whole system is connected and allows the person to see where targets and weaknesses are, and vulnerability identification allows for a target to be picked in the system.

54
New cards

Describe and differentiate between the different types of passwords attacks and its role in the cyber attack methodology.

They are part of the gaining access portion of the methodology. The types are: Brute Force (Trying every possible combo, comparing hashes and the hashes that match are the correct password), Dictionary Attacks (uses facts about the user and words from the English langue, key board patters, then tries to mix up characters in a hope of getting a password, similar to a rainbow table as well.) Rainbow tables use precomputed hashes.

55
New cards

What makes a strong password

Not using English words, making them long, using a large variety of symbols, numbers, and characters, not leaking it. Num passwords = #choicers per character ^ length. So, if I have 26 lower case characters and is 6 characters long, it would be 26^6 possible passwords.

56
New cards

Types of cyberattack methods

Crytopmining Malware, Child P, Payment fraud (credit card skimming, fake keypads), Cyber terrorism, Phishing (the exploitation of human tendencies to trick them into giving access), Ransomware/Banking Trojans (programs to disrupt computer information’s and offer restorative services for a fee).

57
New cards

Relate the different types of malware to the cyber-attack methodology

Malware is primally part of the gaining, maintain access, and coving tracks section of the cyber-attack methodology.

Virus: attached to a host file that the user spreads typically

Worm: Stand-alone malware that spreads without user intervention

Trojan Horse: Malware like virus or worms disguised as or in a legit program

Rootkit: Code designed to hide activities from the user

Logic Bomb: Code that turns on when specific conditions are triggered

Backdoor: code that allows users to bypass authentication measures

Keystroke logger

Spyware: gathers and reports info about the user on a computer

58
New cards

Describe common types of vulnerabilities and how they are exploited

-Humans — Phishing/Social engineering

-Personal Computers — Malware

Servers — denial of service, can’t access the server

Databased — SQL injection (when a person gets access to a web application, they shouldn’t be able to and messes with it) /data handling

Web sites — cross site scripting (when a hacker visits a website and puts in a program into the comment box of a website, that when another user runs the website, something pops up and causes people to freak out and has like a “click here” button that just imputes in more malware)/data handling

Zero-day — A bug the developers don’t know about, sold to people to use and typically kept low key.

DDOS- Denial of service attack

59
New cards

Describe the "Internet of Things" (IoT)

All the things connected to the internet: cars, thermometers, radios, phones, hardware and software.

60
New cards

Compare and contrast how the "Internet of Things" prioritizes usability vs. security.

They are designed to be simple and easy to use, they are not going to have the same level of encryption or passwords on them. Because a lot of things are always connected, they as well can be really easy access points for people to get into, they are gateways.

61
New cards

Describe the vulnerabilities inherent to industrial control systems (ICS)

They were not designed with security in mind. Everything is controlled with these systems. They have assumptions of trust- NO AUTHENTICATION, they are very specific to systems and are difficult or costly to upgrade so they don’t get upgraded and systems that are high risk get kept for long periods of time.

62
New cards

Know key laws that govern actions in the cyber domain

4th amendment: No unreasonable searches

Computer Frad and Abuse Act: No intentional accessing of a computer with-it authorization

Stored Communications Act: Protects against voluntary and compelled disclosure of information by third-party services

Electronic Commuinications Privacy Act: Protects communications while they are IN TRANSIT across communication lines.

63
New cards

Explain how LOAC principles are used to guide planning and execution of military cyber operations

Military Necessity: Needs to achieve valid military objective.

Humanity: Prohibition against unnecessary suffering

Proportionality: Damage much not be excessive

Chivalry: Distinguishment between civilians and combatants.

Distinction: Can’t attack civilian targets

64
New cards

Analyze cyber scenarios for moral and ethical implications

Is malware ethical? - Yes, if its specific enough.

Stuxnet: shut down only Iranian uranium centrifuges. Ethical

NotPetya: Ransomware that encrypted information and demanded payment. Nonethical

Anonymous: Used malware to ID pedophiles and reported them. Ethical but violated laws.

65
New cards

Define Asymmetry of Defense, No Perfect Security, and Defense in Depth

Asymmetry of defense: Attacker only needs to find one weak point, defenders need to protect everything though

No Perfect Security: Can fully protect a network and also allowing it to be useful and accessible.

Defense in Depth: Using multiple tools and techniques to secure a network compared to a single appliance.

66
New cards

Differentiate and describe different network defenses

Firewalls: network device that forwards some network data and filters/denies other data.

Proxy Servers: Makes requests on behalf of other computers. Can filter traffic, faster responses, but may harm encryption

Intrusion Detection Systems (IDS): Detects and notifies if there is bad traffic

Intrusion Preventions Systems (IPS): Detects bad traffic and actively tries to stop it.

Access Controls: Making sure people who should have access only do.

67
New cards

Deferential between firewall allow and deny-lists

Allow lists describe what network traffic IS allowed

Deny lists describe which traffic is NOT allowed

68
New cards

How do proxy severs cache and filter network traffic

They look at network traffic and allow it if it fits into certain criteria.

69
New cards

Differential based signature based and statistical anomaly-based intrusion detection

Signature based looks for specific “known” attacks

Statistical Detection looks for potentially harmful “patterns”, more broad but less specific