HACS208 Extended Flashcards (dupe)

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/165

flashcard set

Earn XP

Description and Tags

Link to original: https://quizlet.com/844339546/flash-cards/

166 Terms

1
New cards

The Definition for the Term "cyber" includes the interplay between humans and humans

True

2
New cards

Public Policy is strictly limited to the laws passed at the federal, state, or local level

False

3
New cards

According to Director of National Intelligence, James Clapper, how are the threats of cyberattacks best described?

Threats to US national and economic security are increasing in size, scale, and severity of impact

4
New cards

Which of the following is NOT considered a cyber threat actor?

Hobbyists who are curious about how technology works and reports vulnerabilities to organizations and authorities

5
New cards

Russia is considered a medium tier cyber threat

False

6
New cards

APT is an acronym for

Advanced Persistent Threat

7
New cards

The origin and evolution of the Internet was a product of

None of the above (Professors, Private Sector, and the Government)

8
New cards

What is the key protocol that is leveraged to "provide the map" between networks?

BGP

9
New cards

The global telecommunication infrastructure is managed by nation states who come to agreement on where to invest and who should have access

False

10
New cards

Which definition best describes the Internet Exchange Point (IEX)

The physical infrastructure through which Internet service providers (ISPs) and content delivery networks (CDNs) exchange internet traffic between their networks

11
New cards

Which definition best describes an Autonomous Systems?

A collection of connected Internet Protocol (IP) under the control of one or more network operators

12
New cards

One major limitation of terrestrial microwave technology for use in long haul communications is

The curvature of the Earth prevents long distance communications, without the need for a repeater

13
New cards

The OSI model is

A representation of how information from a user is encapsulated, transmitted, and received across networks, and the global telecommunications infrastructure

14
New cards

The government was the only actor in scaling the internet for wide adoption by the 1990s

False

15
New cards

Which description best describes The Internet Corporation for Assigned Names and Numbers (ICANN)?

Internationally organized non-profit responsible for coordinating the maintenance and procedures of several databases related to the namespace on the internet

16
New cards

Regional Internet Registries are

Both A and C (A = Managed by ICANN, C = A core part of the internet that helps domain names with internet protocol addresses)

17
New cards

OceanLotus is a hacking group that is best described as a

A nation state group that was highly focused on acquiring information against economic and political targets

18
New cards

Writing an exploit to leverage a vulnerability in the Windows 10 OS would be included in which phase of the Lockheed Martin Cyber Kill Chain?

Weaponization

19
New cards

The size and complexity of an organization's publicly facing internet presence is known as the firm's

Attack Surface

20
New cards

Spearphishing is a tactic in which part of the Lockheed Martin Kill Chain Model?

Delivery

21
New cards

Investigating the organizational chart of a target is which part of the Lockheed Martin Kill Chain Model?

Reconnaissance

22
New cards

IT System Administrators often can easily identify who attackers are and submit their identities to law enforcement for prosecution

False

23
New cards

The Onion Network is a

A series of servers who route traffic through devices, peeling away encrypted layers of routing information to use in anonymous internet browsing or proxy to another server

24
New cards

A hacker who defaces a government website to protest the arrest of a political prisoner would be considered what type of threat actor?

Hacktivist

25
New cards

The use of _____ often makes it difficult for victims of cyber attack to identify the threat actor involved.

Proxies

26
New cards

The Target, Home Depot, or Eddie Bauer cyber events are examples of what type of attack in the taxonomy presented in the course

Exploitation of Sensor

27
New cards

The specific attack on a Ukraine Power grid in which 27 substations were taken off line was an example of

Physical Attack

28
New cards

The OSI Data Model utilizes the concept of ______ to move data from one point of the Earth to another

Encapsulation

29
New cards

The effects of cyber attack against specific industries can be best described as

Both B and D (B = Varying in the types of exploitative and disruptive category types across all sectors, D = Varying in number across all sectors in the economy)

30
New cards

A firm's stock price that falls 20% after a cyber event is an example of a

A Secondary Effect

31
New cards

According to international law, a country DOES NOT have an obligation to take measures to ensure the establishment of international telecommunications infrastructure that is required for the rapid and uninterrupted international telecommunications

False

32
New cards

According to the taxonomy what kind of cyber event was the Maersk line attack?

Data Attack

33
New cards

How would you describe the $300M dollar loss by Maersk Line to a Policy Maker utilizing the model in the class?

Secondary Effect

34
New cards

Degradation to a customers logistic supply chains would be an example of a

Second Order Effect

35
New cards

Fancy Bear is a threat actor that is best categorized as what type of threat actor?

Either C or D (C = APT, D = Nation State)

36
New cards

The Introduction of Senate Bill 2594, the "Super Computer Network Study Act" of 1986, the former president Al Gore helped

bring together industry, academia, and government in a joint effort to accelerate development and deployment of gigabit networking

37
New cards

The 2018 Nuclear Posture Review introduced which of the following considerations into US nuclear policy?

Use of significant non-nuclear attacks on the country might be ground for the employment of nuclear weapons

38
New cards

The definition of the Internet as a global information system includes all EXCEPT the following

includes the technology required to store and manipulate content in corporate networks

39
New cards

Bringing government policy makers, civil society (i.e. NGO, and the private sector to govern/manage a problem is known as

multi-stakeholder governance

40
New cards

Which of the following is a not a statue (i.e. a law) which deals with cybersecurity issues?

Tallinn Manual Rule 61

41
New cards

Cyber def

The electronic world created by interconnected networks of information technology and the information on those networks. It is a global commons where... people are linked together to exchange ideas, service, and friendship

42
New cards

Cybersecurity def

The organization and collection of resources, processes, and structures used to protect cyberspace and cyberspace-enabled systems

43
New cards

Threat Landscape def

Involves: Internet, hackers, tactics, techniques, and procedures (TTP), effects, attack surfaces, attribution

44
New cards

Factors in evolution of internet

  • Evolutionary process

45
New cards
  • Multiple players and stakeholders

46
New cards
  • Academic inspiration

47
New cards
  • Key government support

48
New cards
  • Private sector ingenuity

49
New cards

History and evolution of the internet (detailed)

  1. Ideological origins

50
New cards
  1. Govt support and prototyping to build a prototype (ARPANET)

51
New cards
  1. Privatizing and scaling the internet

52
New cards
  1. Govt research support

53
New cards

ARPANET

The first packet-switched network, the predecessor to the Internet.

54
New cards

Birth of the modern internet

Goal: allow networks to independently communicate with one another; previous work on internet protocol (IP) and transmission control protocol (TCP) is adopted universally in 1984

55
New cards

Internet as a global commons Trends (early 2000's)

  1. Cloud computing

56
New cards
  1. Mobile Computing

57
New cards

Encapsulation def

Instructions for data to be packaged, routed, and transmitted

58
New cards

OSI Model def

Open systems interconnection model; a way to think about the communications functions independent of the technology or structure

59
New cards

OSI Model Layers

7 Application

60
New cards

6 Presentation

61
New cards

5 Session

62
New cards

4 Transport

63
New cards

3 Network

64
New cards

2 Data Link

65
New cards

1 Physical

66
New cards

Application Layer

  • Acts as an interface between your computer and the programs on it and the network you want to communicate on

67
New cards
  • Translating human domain names into computer friendly IP addresses is done by the DNS protocol

68
New cards

Network Layer

  • Information that deals with routing is done at the network layer

69
New cards
  • Locations on the internet are established by internet protocol

70
New cards
  • Autonomous systems are large networks that manage thousands of internet protocol addresses

71
New cards
  • Autonomous systems maintain peering relationships

72
New cards

Physical Layer

  • Moves data encoded on different points on the electromagnetic spectrum

73
New cards
  • Fiber optics help traverse long distances

74
New cards
  • Microwave used for point to point transmission

75
New cards
  • Satellites used to move data over radio waves

76
New cards
  • Internet Exchange Points (IXP) physically connect networks together in accordance to logical peering relationships

77
New cards

Internet

Collection of networks working together to transmit, receive, manipulate, and process information for a variety of purposes

78
New cards

Governance def

The process by which we manage the technical, informational, and organizational problems that arise from the complexity of the Internet; multiple stakeholders are involved

79
New cards

Technical Rule Making Bodies

  • Internet Architecture Board

80
New cards
  • Internet Engineering Task Force

81
New cards
  • Internet Research Task Force

82
New cards

World Wide Web Consortium (W3C)

  • An international community of organizations and the public work to develop web standards

83
New cards
  • Develops protocols and guidelines for web development purposes (CSS, HTML, etc)

84
New cards

Tallinn Manual

Sets out rules for conducting and responding to cyberwarfare

85
New cards

Attack Surface def

The point at which an attacker can research, scan, exploit, and enter your organization; the publicly identifiable pieces of your network exposed to a potential attacker

86
New cards
  1. Website

87
New cards
  1. Internet connected sensors (Webcam)

88
New cards
  1. File servers

89
New cards

Cloud computing: security concerns

  1. Privileged User Access: Company data processed

90
New cards

outside of the organization brings a degree of risk

91
New cards
  1. Regulatory Compliance: Customers are ultimately

92
New cards

responsible for the integrity of their data regardless

93
New cards

of where it resides.

94
New cards
  1. Data Location: When you use cloud services you

95
New cards

don't always know where your data is physically

96
New cards

located

97
New cards
  1. Data Segregation: Organizational data is collocated

98
New cards

with other systems

99
New cards
  1. Recovery: Cloud providers need to be able to

100
New cards

articulate recovery procedures in case of total failure