intel q2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/53

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

54 Terms

1
New cards

Cyberspace

The digital realm formed by interconnected networks where data, communication, and operations take place.

2
New cards

ICANN

Internet Corporation for Assigned Names and Numbers; manages domain names and IP addresses.

3
New cards

IETF

Internet Engineering Task Force; sets technical rules and standards for the Internet.

4
New cards

W3C

World Wide Web Consortium; develops web standards to ensure the long-term growth of the web.

5
New cards

TCP/IP

Transmission Control Protocol/Internet Protocol; the common language used by devices to communicate over the Internet.

6
New cards

Identity (in cyberspace)

Your online name or account, such as a username or email.

7
New cards

Authentication

Process of proving identity, typically through passwords, codes, or biometrics.

8
New cards

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to systems.

9
New cards

Phishing

Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity in electronic communication.

10
New cards

DDoS (Distributed Denial of Service)

An attack that overwhelms a website with traffic to make it unavailable.

11
New cards

APT (Advanced Persistent Threat)

A prolonged and targeted cyberattack where perpetrators remain undetected to steal data.

12
New cards

PKI (Public Key Infrastructure)

A system that manages digital certificates and public-key encryption to secure data and verify identities.

13
New cards

Cyber Attack

Intended to cause disruption or damage to systems, services, or data.

14
New cards

Cyber Exploitation

Covertly accessing systems to extract information without damaging them.

15
New cards

Jus ad Bellum

Refers to the legal justification for going to war, applied to cyber as whether an operation constitutes force.

16
New cards

Jus in Bello

Laws governing how warfare should be conducted, including principles of necessity and proportionality.

17
New cards

Law of Armed Conflict (LOAC)

Covers both jus ad bellum and jus in bello; includes issues like attribution and accountability in cyber conflicts.

18
New cards

Offensive Cyber Operations

Actions taken to disrupt or destroy adversaries' systems.

19
New cards

Defensive Cyber Operations

Measures to detect, respond, and recover from cyberattacks.

20
New cards

Executive Order 12333

Authorizes U.S. intelligence agencies to conduct surveillance and collect foreign intelligence.

21
New cards

USA Patriot Act of 2001

Expanded U.S. surveillance capabilities post-9/11, including provisions for tracking cybercriminals.

22
New cards

Title 50

Covers intelligence activities often under civilian control, including SIGINT by the CIA.

23
New cards

Title 10

Covers military operations under the Department of Defense, more open and regulated.

24
New cards

Cyber Power

The ability to use cyberspace to create strategic effects across peace, crisis, and conflict scenarios.

25
New cards

Resilience as Strategy

Focus on resilience in cybersecurity, including anticipation, absorption of shocks, and recovery capabilities.

26
New cards

OODA Loop

A decision-making process consisting of Observe, Orient, Decide, and Act, applied to situational awareness in cyber contexts.

27
New cards

Technical Vulnerabilities

Weaknesses in systems that can be exploited to gain unauthorized access or cause damage.

28
New cards

Cybercriminals

Individuals or groups who seek profit through cyberattacks, fraud, or theft.

29
New cards

Hacktivists

Individuals who use cyberattacks for political or social causes.

30
New cards

Censorship and Privacy Issues

Conflicts arising from different countries' varying rules regarding censorship and data privacy.

31
New cards

Primary Cyber Threats

Nation-states, cybercriminals, hacktivists, and insider threats that pose risks in cyberspace.

32
New cards

Cyber Warfare

Formal conflict that involves cyber operations with the intent to harm or disrupt.

33
New cards

Infrastructure Protection

Measures taken to safeguard critical infrastructure from cyber threats.

34
New cards

Standing Rules of Engagement (SROE)

Guidelines for military personnel on how to act during operations. In cyber, they define when and how U.S. forces may engage in digital conflict.

35
New cards

What is the inherent right of self-defense under the SROE?

applies at all levels—national, collective/allied forces, unit, and individual—and allows response to hostile acts or hostile intent.

36
New cards

core principles of the Standing Rules of Engagement (SROE)?

  • Necessity: There must be a hostile act or intent.

  • Use of Force: Deadly force must be necessary.

  • Proportionality: Response must be decisive and proportional to the attack.

  • Identification: Sometimes required, sometimes not.

37
New cards

how do the SROE apply to cyber operations?

  1. Defensive

  2. Hybrid

  3. Offensive

38
New cards

What is Informatized Warfare?

Warfare that seeks to unify forces through digital and networked systems.

39
New cards

What is Intelligentized Warfare?

A modern form of warfare that integrates artificial intelligence and autonomous systems.

40
New cards

What is Cyberware?

A type of warfare conducted entirely in cyberspace using cyber tools.

41
New cards

What is Electronic Warfare?

The use of electromagnetic spectrum in combat to disrupt enemy communications or radar.

42
New cards

What does C5I stand for?

Command, Control, Communication, Computer, Cyber, and Intelligence.

43
New cards

What is the first stage in cyber operations?

Target Identification: The attacker identifies and researches targets, looking for vulnerabilities or susceptible people.

44
New cards

second phase of cyber operations?

The attacker gathers information about the target organization, its systems, and people—often through social media or public events.

45
New cards

3rd phase of cyber ops

Gaining Access: This stage involves the attacker successfully executing malicious code to infiltrate the target environment. This can happen through techniques such as spear phishing, exploiting vulnerabilities in Internet-facing systems, or social engineering. It mirrors the "Initial Compromise" phase of the cyber attack lifecycle.


46
New cards

4th phase of cyber ops

Hiding Presence: Once inside the network, the attacker seeks to conceal their activities and remain undetected. This could involve installing backdoors, covering tracks, or employing techniques to evade detection. This relates to the "Maintain Presence" phase, as maintaining stealth is crucial for the attacker’s ongoing activities.

47
New cards

5th cyber ops

Establishing Persistence: In this phase, the attacker ensures they have ongoing, undisturbed access to the compromised systems. This could involve installing multiple variants of malware, utilizing VPNs, or using other methods to ensure continued access over time. This phase corresponds to the "Establish Foothold" and "Maintain Presence" stages.

48
New cards

6th cyber ops

Execution: The attacker achieves their objective, such as stealing sensitive data, intellectual property, or personally identifiable information (PII). This stage is equivalent to the "Complete Mission" phase, where the attacker completes their goals, whether stealing data or disrupting services.

49
New cards

7th cyber ops

Assessment: After the mission, the attacker may assess the outcome of their actions, ensure they have all the information or access they need, and determine if further actions are necessary. This can be seen as an evaluation phase, ensuring the mission was successful and preparing for any further stages if needed.

50
New cards

layers of cyber space

physical, syntatic, sematic

51
New cards

1.       Physical:

actual tangible parts

52
New cards

syntatic

instructions/code/software

53
New cards

semantic

info and data

54
New cards
  • Insider threats

  • – Employees or insiders misusing access.