1/68
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Describe and differentiate between the components of the Von Neumann Computer architecture
In a Von Neumann Computer it can store and process info. There are 4 parts. Input, CPU, Memory, and output. The input device is what inputs the information. The CPU processes that info based off algorithms (instructions) are stored in memory. The memory houses more data and algorithms as well. The output device is the result of the computer after processing the input. This may be pulling up a file or operating a system like a printer.
Describe the function of each major computer hardware component: motherboard, CPU, memory boards, display card, power supply
The motherboard is the physical piece of material that houses the major components of the computer and connects them. The CPU or central processing unit processes information and carries out commands. Memory boards such as RAM and hard drives store memory for the computer both long term and short term. The display card is responsible for the graphics of the computer and displaying the information. The power supply takes power from a wall outlet and sends it to all areas where it is needed.
Summarize the memory hierarchy and explain the balance between access speed, storage capacity, and cost with regards to computer memory
At the top of the hierarch is the CPU caches and registers (not important for this course). Then Ram, Hard Drive, and Archival memory like DVDs and CDs. As access speed increase, storage capacity decreases and cost increases. So RAM cant store a ton of data, and is expensive but is fast.
Apply Moore's Law to analyze computer performance over time
Moore’s Law is the principle which says that processing power of computers roughly doubles every 2 years due to the number of transistors which can fit onto a CPU. Also, as this increases the price decreases
Identify and describe the meaning of common file extensions.
Common file extensions are letters that follow a file to tell what operating system the file falls under.
Text Files: .txt (plain text), .docx (Microsoft Word), .pdf (Portable Document Format)
Image Files: .jpg/.jpeg (JPEG image), .png (Portable Network Graphics), .gif (Graphics Interchange Format)
Audio Files: .mp3 (MP3 audio), .wav (Waveform Audio)
Video Files: .mp4 (MPEG-4 Video), .avi (Audio Video Interleave)
Executable Files: .exe (Windows executable), .app (Mac application)
Compressed Files: .zip, .rar (compressed archives)
Code Files: .py (Python script), .html (HTML document), .java (Java source code)
Navigate the file structure within the computer, including locating, opening, and saving files in different directories.
In the computer there is a root directory which is the topmost hierarchy, this is the operating system (Windows). From this there are sub directories which house more specific files. There are paths of saving information is each directory. An absolute path goes all the way from the root directory to find a file, while a relative path only goes from the current directory the user is in. Files can be saved by going to each directory and saving them there.
Convert between binary and decimal numbers
So for each place do the number times 2 to the power of the place. To go from decimal to binary divide by 2 and the remainder is the number until you get to zero then read in the reverse order.
Calculate how many values can be represented with b bits
For every number of bits, square that number. So, if I have 5 bits, I can have 2^5 unique combination.
Calculate how many bits are needed to represent a given number of unique values
Find the power of 2 needed to encompass the number of representations needed. So if I need 48 combos, I need 6 bits of info because 2^6 = 64 and 2^5= 32 so it must be 6 bits.
Convert between bits, bytes, kilobytes, megabytes, and gigabytes
1 byte is 8 bits. A kilobyte is 2^10 which is 1024 bytes. For further units such as mega or giga just multiply or divide by 1024. So 1 megabyte is 1024^2, and 1 gigabyte is 1024^3.
Explain how characters are encoded in ASCII and UNICODE
ASCII uses 8 bits per character and UNICODE uses 8,16, or 32. Each character has a unique set of binary numbers.
Identify the key characteristics of an algorithm
It must be an ordered set of executable steps that are unambiguous and free of omissions and contradictions that will result in the accomplishment of an objective.
Or
A set of detailed instructions for accomplishing a task.
Explain how algorithmic reasoning is broadly applicable
Algorithmic reasoning is broadly applicable because it helps solve problems, optimize processing, and automate tasks.
How should algorithms be constructed to solve problems of varied complexity
Write down a logic design such though a recipe is being followed to outline completely what needs to be done to achieve an end result, then implement is.
Define Artificial Intelligence (AI)
Artificial Intelligence is the simulation of human intelligence by machines
Summarize how the Turing test has shaped AI
Turing test is the ability for an AI’s output to be indistinguishable from that of a human. It is the measurement of being able to say if a computer is intelligent.
Differentiate between narrow and general AI
General AI can exhibit human cognitive abilities and can think and accomplish task on its own including logical thinking and performance in uncertain conditions and being able to learn on its own.
Narrow AI can model human intelligent behavior but can only operate within a pre-defined range of functions. Can’t think for itself, can only learn when provided with data, and can only perform the task it was designed for.
Outline the types of problems AI can (and can potentially) help humans solve
Classification, Clustering, Optimization, Abnormality Detection, Estimation/Prediction, Ranking/Recommendation, and Data Generation.
Describe and differentiate between each phase in the "Sense-Think-Act" cycle
Sense is the detection of information about its surroundings. Thinking is finding the best move to do in the current state. Acting is performing that action.
Differentiate between AI decision making techniques such as decision trees, search trees, and finite state machines
Decision trees are a series of if statements that the AI goes through to decide what to do. Search for trees though. Finite state machines determine a state it should be on based on the surroundings, like a guard being passive until it sees the player. Search tress are branches of decisions the AI can choose from and when they choose the best state that branches out.
Define the concept of a game state
A game state is a snapshot of a game at a given point and the configuration of all the pieces of that game at a time.
Define the concept of a heuristic for Artificial Intelligence
A heuristic is a simplified way of approximating how good a certain state is more quickly compared to an optimized algorithm that considers every outcome of a state.
Differentiate between depth-first and breadth-first search
Analyzing a game state layer by layer for decisions where is looks at all the decisions for a certain level. Breadth-first search depends on how far we choose for the AI to pick. Depth-first searches chooses one linage and goes as far down it can for one input then does that for all possible choices. It checks for all possible outcomes.
Use rule-based AI strategies to solve a discrete game
This would be like if car in front, go left, or go right, or for pong, for x position of ball, go to x position of paddle.
Define "model", "instance", "feature", and "label" in the context of machine learning
A model is a representation of what a machine learning system has learned from the training data and can make useful predications of new data. A feature is a value that can be used to make a prediction, a column in a data set. A label is the answer or the result of an instance. It represents the concept that the model is being trained to classify. An instinct is a row in a dataset, a specific example.
Compare and contrast Supervised and Unsupervised learning
Unsupervised learning is good with unlabeled data and its job is to cluster data for a person to determine if it is useful. Supervised learning is with labeled data that it then used to identify relationships between and predict the label by only looking at the features. The wine and beer example.
Describe and differentiate between the steps required for supervised learning
1. Gathering data- determining what information needs to be collected
2. Preparing data- putting the data in an order and such a manner that makes sense
3. Choosing a model- Choosing what kind of algorithms work the best
4. Training the model- Giving the data to the model and letting it learn
5. Evaluating the model- Test the model against new model to see if the model has learned concepts, not memorized data
6. Tuning- Tweaking the settings to increase the accuracy of the algorithm like learning rate or how much time the algorithm can go through the data
7. Predicting: using the model to do work
Describe the limitations with current AI and ML systems.
Narrow focus, can only do one task
High Cost of Creation
Hidden Biases
Ambiguous Responsibility, whose fault is it when AI fails?
Lack of Interpretability, inability to understand what the AI actually learned
Describe the Ethical Limitations of using machine learning algorithms.
Theres no agreed upon ethical farmwork for AI. Generally, AI needs to have transparency, accountability for who has ownership over it, reliability, and uphold high standards of predictability. Especially because AI is important in every aspect of society.
Describe the concept of Explainable AI
AI that can describe how they arrived at their decisions; enabling human users to understand, trust, and manage their AI partners. Decreases a lack of interpretability.
Describe and differentiate between the roles and responsibilities of clients and servers
Client’s job is to make a message, find the IP address of the server and corresponding port, know its own IP and port, and send that message
The servers job is to look at that port that info came in on, forward it to the correct application, create a response, then make a packet with the correct destination IP and port and send its message back to the client.
Describe the role of protocols in network communications
Protocols are defined ways for clients and servers communicate, like a langue they both understand. TCP protocols are more reliable and makes sure the message is delivered and sends a confirmation message when it does, but it is slow. Used for things like files and word documents. UDP is less reliable and just sends a message, better for video and real time applications where it’s okay if a couple messages don’t make it. UDP is much faster.
Describe Internet Protocol (IP) addressing
IP addresses are the unique network location of your device on a network that allows protocols to be sent to the correct locations and sent back. Like a letter with the correct shipping and return address. They have 4 numbers that each can ONLY range from 0-255. EX; 134.39.125.35:80 the last number is the port.
Describe the concept of logical ports
Logical ports are figurative locations on a computer made by the operating system where applications listen for incoming data, like a mail box where YOU go to check for ONLY mail, not like videos and shit.
Function for HTTP, FTP, and SMTP protocols
HTTP is for web browsing and web pages. FTP is file transfer protocol and is used for sharing files. SMTP is simple message transfer protocol and is used for emails.
Internet Protocol (IP) Routing
using different routers to send a message through various layers of networks. If one router goes down another one can be used to send the information.
Describe and differentiate between the functions of routers and switches
Switches are for message to be sent within a network, and to connect devices within a network. Routers are used to send things in and out of network. If one goes down, the messages can take a different “route” using different routers.
Describe domain name system (DNS)
It is used to convert network names into IP addresses by going through a hierarchy of networks that each know a little piece of information about the network.
Describe the dynamic host configuration protocol (DHCP)
It lets computers request IP addresses when they join a network, like a temporary IP address while they use it.
Describe network address translation (NAT) and its benefits
It takes a bunch of private IP addresses in a network and represents them with just one public IP address. Allows less public IP addresses to be used up.
Describe wireless security technologies
-Blocking a wireless signal with materials
-Encrypting data with a password, like Wi-Fi
-HTTPS which encrypts information being sent
-VPNs (virtual private networks). What the air force uses with CACs as they create encrypted connections before messages are even sent.
Describe the security and privacy challenges inherent in wireless networks
Privacy: data is being broadcasted so anyone can pick it up.
Security: It’s hard to ensure that only “good” people are on the network
Define risk in terms of information security
A risk is a threat of an attacker to exploit a vulnerability to the protection of data and information systems.
Define and differentiate between CIA (confidentiality, integrity, accessibility)
Confidentiality: Means info cannot be accessed by unauthorized parties
Integrity: Means info is accurate and cannot be modified in an unauthorized manner
Availability: Means a user can access the information they are supposed to have access to
Describe and differentiation between external and internal threats
external threats: threats outside of one’s organization, criminals, terrorists, enemy nations, hackers.
internal threats: threats inside of one’s organization, family member, employees, untrained users, spies.
Describe how hashes are used to ensure integrity
They encode messages into characters where any change will be seen. By comparing the message with the hash value, the message can be ensured to be correct. Like a fingerprint.
Describe the difference between symmetrical and asymmetrical encryption
Symmetrical: each person gets the same key that is used to encrypt and decrypt the message. It is faster and takes less keys than asymmetric, but it’s hard to distribute keys, and key compromises pose larger security risks.
Asymmetric: Each person gets 2 different keys, a public and a private key. the message can be encrypted with the public key and may only be opened with the private key and vice versa. The downside is that it is waaaaaay slower, but it is easier to share public keys and is less of a security risk.
Describe the use of public key infrastructure
A system of trust-based models where certificate authorities verify individuals and public keys to information so people can send and receive information to and from the intended people.
Authentications Measures HAK
What you Have- CAC
What you Are- Retina, weight
What you Know- Passwords
Describe the cyber-attack methodology
A systematic method to identify, exploit, and leverage weaknesses to target a system.
Relate the cyber-attack methodology to a cyber-crime.
The Colorado department of Transportaion was attacked along with Regis University.
Describe and differentiate between each phase of the cyber attach methodology
Reconnaissance (passive collection of info from like google or media), Scanning (Active system probing for weaknesses and targets), Gaining access (getting some one’s password or sum), Maintaining Access (using admin privileges to stay unnoticed and in the system), Covering tracks (altering logs to ensure the damage can’t be seen or can’t be traced back. A rootkit can help deleting files and covering tracks).
Describe the role of network mapping and vulnerability identification
Network mapping shows how the whole system is connected and allows the person to see where targets and weaknesses are, and vulnerability identification allows for a target to be picked in the system.
Describe and differentiate between the different types of passwords attacks and its role in the cyber attack methodology.
They are part of the gaining access portion of the methodology. The types are: Brute Force (Trying every possible combo, comparing hashes and the hashes that match are the correct password), Dictionary Attacks (uses facts about the user and words from the English langue, key board patters, then tries to mix up characters in a hope of getting a password, similar to a rainbow table as well.) Rainbow tables use precomputed hashes.
What makes a strong password
Not using English words, making them long, using a large variety of symbols, numbers, and characters, not leaking it. Num passwords = #choicers per character ^ length. So, if I have 26 lower case characters and is 6 characters long, it would be 26^6 possible passwords.
Types of cyberattack methods
Crytopmining Malware, Child P, Payment fraud (credit card skimming, fake keypads), Cyber terrorism, Phishing (the exploitation of human tendencies to trick them into giving access), Ransomware/Banking Trojans (programs to disrupt computer information’s and offer restorative services for a fee).
Relate the different types of malware to the cyber-attack methodology
Malware is primally part of the gaining, maintain access, and coving tracks section of the cyber-attack methodology.
Virus: attached to a host file that the user spreads typically
Worm: Stand-alone malware that spreads without user intervention
Trojan Horse: Malware like virus or worms disguised as or in a legit program
Rootkit: Code designed to hide activities from the user
Logic Bomb: Code that turns on when specific conditions are triggered
Backdoor: code that allows users to bypass authentication measures
Keystroke logger
Spyware: gathers and reports info about the user on a computer
Describe common types of vulnerabilities and how they are exploited
-Humans — Phishing/Social engineering
-Personal Computers — Malware
Servers — denial of service, can’t access the server
Databased — SQL injection (when a person gets access to a web application, they shouldn’t be able to and messes with it) /data handling
Web sites — cross site scripting (when a hacker visits a website and puts in a program into the comment box of a website, that when another user runs the website, something pops up and causes people to freak out and has like a “click here” button that just imputes in more malware)/data handling
Zero-day — A bug the developers don’t know about, sold to people to use and typically kept low key.
DDOS- Denial of service attack
Describe the "Internet of Things" (IoT)
All the things connected to the internet: cars, thermometers, radios, phones, hardware and software.
Compare and contrast how the "Internet of Things" prioritizes usability vs. security.
They are designed to be simple and easy to use, they are not going to have the same level of encryption or passwords on them. Because a lot of things are always connected, they as well can be really easy access points for people to get into, they are gateways.
Describe the vulnerabilities inherent to industrial control systems (ICS)
They were not designed with security in mind. Everything is controlled with these systems. They have assumptions of trust- NO AUTHENTICATION, they are very specific to systems and are difficult or costly to upgrade so they don’t get upgraded and systems that are high risk get kept for long periods of time.
Know key laws that govern actions in the cyber domain
4th amendment: No unreasonable searches
Computer Frad and Abuse Act: No intentional accessing of a computer with-it authorization
Stored Communications Act: Protects against voluntary and compelled disclosure of information by third-party services
Electronic Commuinications Privacy Act: Protects communications while they are IN TRANSIT across communication lines.
Explain how LOAC principles are used to guide planning and execution of military cyber operations
Military Necessity: Needs to achieve valid military objective.
Humanity: Prohibition against unnecessary suffering
Proportionality: Damage much not be excessive
Chivalry: Distinguishment between civilians and combatants.
Distinction: Can’t attack civilian targets
Analyze cyber scenarios for moral and ethical implications
Is malware ethical? - Yes, if its specific enough.
Stuxnet: shut down only Iranian uranium centrifuges. Ethical
NotPetya: Ransomware that encrypted information and demanded payment. Nonethical
Anonymous: Used malware to ID pedophiles and reported them. Ethical but violated laws.
Define Asymmetry of Defense, No Perfect Security, and Defense in Depth
Asymmetry of defense: Attacker only needs to find one weak point, defenders need to protect everything though
No Perfect Security: Can fully protect a network and also allowing it to be useful and accessible.
Defense in Depth: Using multiple tools and techniques to secure a network compared to a single appliance.
Differentiate and describe different network defenses
Firewalls: network device that forwards some network data and filters/denies other data.
Proxy Servers: Makes requests on behalf of other computers. Can filter traffic, faster responses, but may harm encryption
Intrusion Detection Systems (IDS): Detects and notifies if there is bad traffic
Intrusion Preventions Systems (IPS): Detects bad traffic and actively tries to stop it.
Access Controls: Making sure people who should have access only do.
Deferential between firewall allow and deny-lists
Allow lists describe what network traffic IS allowed
Deny lists describe which traffic is NOT allowed
How do proxy severs cache and filter network traffic
They look at network traffic and allow it if it fits into certain criteria.
Differential based signature based and statistical anomaly-based intrusion detection
Signature based looks for specific “known” attacks
Statistical Detection looks for potentially harmful “patterns”, more broad but less specific