Cyber Analytics

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/63

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

64 Terms

1
New cards

Ransomware attacks have risen due to...

•….because the barriers to entry are decreasing

•….the operations are scalable

•….improved skillsets

2
New cards

Number of ransomware actors is increasing due, How?

because the barriers to entry are decreasing (through AI)

- the operations are scalable (adapt and grow)

-improved skillsets

3
New cards

Ransomware and AI

- Raised skill level
-Better use of English language in communications
-The skilled actors are now even better. The unskilled actors now have basic skills quickly

4
New cards

What attack is preferred by nation-state actors?

Ransomware

5
New cards

What state-sponsored activity is on the rise by Iran

malware and ransomware operations

6
New cards

AI as a threat

- Use of AI and ML to automate and enhance their capabilities, making attacks more sophisticated and adaptive

7
New cards

AI as a Tool

Using the same tools that equip attackers with advanced capabilities can also serve useful in cyber defenses.

8
New cards

What is IoT (Internet of Things)

a network of physical objects that can connect to the internet and exchange data

9
New cards

Motivations of a Cyber Criminal

• Financial Gain
• Recognition and Achievement
• Insider Threats
• Political Motivation (Hacktivists)
• State Actors
• Corporate Espionage

10
New cards

Nation State Actors

Might look to steal military intelligence, intellectual property, and other types of sensitive information held by government organizations, contractors, and other businesses

11
New cards

Foreign Intelligence Surveillance Act of 1978 (FISA)

regulates certain types of foreign intelligence collection including certain collection that occurs with compelled assistance from U.S. telecommunications companies.

12
New cards

What happened with FISA after 9/11

Bush II authorized a secret terrorist surveillance program (TSP) outside of FISA for collecting telephone and internet data to be used in the war on terror.

13
New cards

NIST Core Framework

Recover
•Identify
•Protect
•Detect
•Respond

14
New cards

AI vs ML

Machine learning is a subset of Artificial Intelligence

15
New cards

Why is ML not AI?

ML helps to create the basis of core blocks of AI but it there is much more parts to the make up of AI. AI can achieve near-human-level intelligence

16
New cards

Why are Virtual Machines (VMs) important?

a powerful tool for all cybersecurity professionals. The terminal allows a user
to manipulate files, create users, and run terminal programs to perform certain tasks.

17
New cards

Worm

Trojan

Spyware

Adware

Ransomware

Malware

18
New cards

There is a No "one size fits all" and security in US? (True/False)

True

19
New cards

Examples of sector specific privacy laws

COPPA: Children's Online Privacy Protection Act

FERPA: Family Educational Rights & Privacy Act

HIPPA: Health Insurance Portability and Accountability Act

20
New cards

New AI Executive Order

International AI unity: 28 countries uniting for responsible AI development.

Ethical innovation drive: ensure AI innovation is matched with strong ethical practices

21
New cards

What is Linux?

An open-source operating system

22
New cards

Where is Linux Prevalent?

-500 super computers run on some variant of Linux

-84% of enterprise business runs on Linux

-Linux is used by 71.9% of all the websites whose operating system is known

-96.3% of the world's top 1 million websites were powered by Linux

-Android phones and Kindles run Linux

23
New cards

Why is Linux considered to be a good operating system?

extremely stable (rarely crashes)

-very fast

-less expensive

24
New cards

a command interpreter that allows you to type commands from the keyboard to interact with the operating system kernel

Linux shell

25
New cards

Displays file contents

cat

26
New cards

Full path from the root directory

Absolute Path

27
New cards

Path relative to the current directory

Relative Path

28
New cards

../ is an example of what kind of path

Relative Path

29
New cards

Steganography

writing hidden message in a way that prevents those who don't know that it is there from seeing it

30
New cards

What kind of security is Steganography

security by obscurity

31
New cards

Hashing

Algorithm that takes a block of data and returns a fixed size value.

32
New cards

Pros about Hashing

• Easy to compute
• Infeasible to generate
• Infeasible to modify
• Infeasible to find two different messages

33
New cards

Security by Obesity

a cyber approach where a system is made excessively large or complex to make it harder for attackers to find and exploit vulnerabilities.

34
New cards

Goals of Cryptography

○ Confidentiality: Ensuring data is accessible only to authorized users.

○ Integrity: Ensuring data has not been altered.

○ Authentication: Verifying the identity of users or systems.

○ Non-repudiation: Preventing the denial of an

35
New cards

Symmetric

The same key is used for both encryption and decryption

36
New cards

Asymmetric

Uses a public key for encryption and a private key for decryption

37
New cards

What type of encryption is AES

Symmetric

38
New cards

What type of encryption is RSA

Asymmetric

39
New cards

A substitution cipher where each letter in the plaintext is shifted by a certain number

Caesar Cipher

40
New cards

A = ? in Caesar Cipher

0

41
New cards

Vigenère Cipher Weakness

frequency analysis due to its repetitive key pattern, allowing attackers to determine the key length, break it into smaller Caesar ciphers

42
New cards

A technique used to break ciphers by analyzing the frequency of characters or symbols in a cyber text

Frequency analysis

43
New cards

Quantum Cryptography

encryption that uses quantum mechanics to secure data, promising theoretically unbreakable encryption.

Photons are a way to overcome speed factor of computersr

44
New cards
<p><span>What is the difference between Supervised vs Unsupervised Learning?</span></p>

What is the difference between Supervised vs Unsupervised Learning?

Supervised learning uses labeled data, unsupervised learning identifies patterns without labels

<p>Supervised learning uses labeled data, unsupervised learning identifies patterns without labels</p>
45
New cards

A security system that detects and alerts administrators about potential security breaches in the network

Intrusion Detection System (IDS)

46
New cards

A security system that actively blocks or prevents malicious traffic in real time

Intrusion Prevention System (IPS)

47
New cards

Firewalls 

A security device that monitors and controls incoming and out going network traffic

48
New cards

Access Control 

a form of authorization by which you can control which users, roles, or hosts in the organization can access each segment of the network 

49
New cards

Authentication

Verifying the identity of users or systems

50
New cards

network security

he broad practice of protecting computer networks and network-accessible endpoints from malice, misuse and denial

51
New cards

In Network Attackers 

when attackers are operating within the trusted bounds of your infrastructure

52
New cards

Data-Centric Security

Emphasizes the security of the data itself, meaning that even if a database is breached, the data might not be of much value to an attacker

53
New cards

Honeypot

Decoy systems set up to attract and analyze attackers, gathering intelligence on their tactics and techniques

54
New cards

Wireshark 

A tool for network traffic analysis, capturing and displaying data packets that are transmitted across a network 

55
New cards

What kind of attacks include breaches, spoofing, pivoting, and denial of service (DoS)

Active

56
New cards

do not initiate communication with nodes in the network and do not interact with or modify network

passive

57
New cards

Bot traffic 

Malicious network traffic generated by botnets (infected devices controlled by attackers) that can be used in DDoS attacks.

58
New cards

R syntax 

The set of rules that define the structure of statements in the R programming language

59
New cards

A table-like data structure in R that allows storing different types of data in each column.

dataframes

60
New cards

A programming concept where a block of code is executed repeatedly based on a condition (e.g., for, while

Loops

61
New cards
62
New cards
63
New cards
64
New cards