1/165
Link to original: https://quizlet.com/844339546/flash-cards/
The Definition for the Term "cyber" includes the interplay between humans and humans
True
Public Policy is strictly limited to the laws passed at the federal, state, or local level
False
According to Director of National Intelligence, James Clapper, how are the threats of cyberattacks best described?
Threats to US national and economic security are increasing in size, scale, and severity of impact
Which of the following is NOT considered a cyber threat actor?
Hobbyists who are curious about how technology works and reports vulnerabilities to organizations and authorities
Russia is considered a medium tier cyber threat
False
APT is an acronym for
Advanced Persistent Threat
The origin and evolution of the Internet was a product of
None of the above (Professors, Private Sector, and the Government)
What is the key protocol that is leveraged to "provide the map" between networks?
BGP
The global telecommunication infrastructure is managed by nation states who come to agreement on where to invest and who should have access
False
Which definition best describes the Internet Exchange Point (IEX)
The physical infrastructure through which Internet service providers (ISPs) and content delivery networks (CDNs) exchange internet traffic between their networks
Which definition best describes an Autonomous Systems?
A collection of connected Internet Protocol (IP) under the control of one or more network operators
One major limitation of terrestrial microwave technology for use in long haul communications is
The curvature of the Earth prevents long distance communications, without the need for a repeater
The OSI model is
A representation of how information from a user is encapsulated, transmitted, and received across networks, and the global telecommunications infrastructure
The government was the only actor in scaling the internet for wide adoption by the 1990s
False
Which description best describes The Internet Corporation for Assigned Names and Numbers (ICANN)?
Internationally organized non-profit responsible for coordinating the maintenance and procedures of several databases related to the namespace on the internet
Regional Internet Registries are
Both A and C (A = Managed by ICANN, C = A core part of the internet that helps domain names with internet protocol addresses)
OceanLotus is a hacking group that is best described as a
A nation state group that was highly focused on acquiring information against economic and political targets
Writing an exploit to leverage a vulnerability in the Windows 10 OS would be included in which phase of the Lockheed Martin Cyber Kill Chain?
Weaponization
The size and complexity of an organization's publicly facing internet presence is known as the firm's
Attack Surface
Spearphishing is a tactic in which part of the Lockheed Martin Kill Chain Model?
Delivery
Investigating the organizational chart of a target is which part of the Lockheed Martin Kill Chain Model?
Reconnaissance
IT System Administrators often can easily identify who attackers are and submit their identities to law enforcement for prosecution
False
The Onion Network is a
A series of servers who route traffic through devices, peeling away encrypted layers of routing information to use in anonymous internet browsing or proxy to another server
A hacker who defaces a government website to protest the arrest of a political prisoner would be considered what type of threat actor?
Hacktivist
The use of _____ often makes it difficult for victims of cyber attack to identify the threat actor involved.
Proxies
The Target, Home Depot, or Eddie Bauer cyber events are examples of what type of attack in the taxonomy presented in the course
Exploitation of Sensor
The specific attack on a Ukraine Power grid in which 27 substations were taken off line was an example of
Physical Attack
The OSI Data Model utilizes the concept of ______ to move data from one point of the Earth to another
Encapsulation
The effects of cyber attack against specific industries can be best described as
Both B and D (B = Varying in the types of exploitative and disruptive category types across all sectors, D = Varying in number across all sectors in the economy)
A firm's stock price that falls 20% after a cyber event is an example of a
A Secondary Effect
According to international law, a country DOES NOT have an obligation to take measures to ensure the establishment of international telecommunications infrastructure that is required for the rapid and uninterrupted international telecommunications
False
According to the taxonomy what kind of cyber event was the Maersk line attack?
Data Attack
How would you describe the $300M dollar loss by Maersk Line to a Policy Maker utilizing the model in the class?
Secondary Effect
Degradation to a customers logistic supply chains would be an example of a
Second Order Effect
Fancy Bear is a threat actor that is best categorized as what type of threat actor?
Either C or D (C = APT, D = Nation State)
The Introduction of Senate Bill 2594, the "Super Computer Network Study Act" of 1986, the former president Al Gore helped
bring together industry, academia, and government in a joint effort to accelerate development and deployment of gigabit networking
The 2018 Nuclear Posture Review introduced which of the following considerations into US nuclear policy?
Use of significant non-nuclear attacks on the country might be ground for the employment of nuclear weapons
The definition of the Internet as a global information system includes all EXCEPT the following
includes the technology required to store and manipulate content in corporate networks
Bringing government policy makers, civil society (i.e. NGO, and the private sector to govern/manage a problem is known as
multi-stakeholder governance
Which of the following is a not a statue (i.e. a law) which deals with cybersecurity issues?
Tallinn Manual Rule 61
Cyber def
The electronic world created by interconnected networks of information technology and the information on those networks. It is a global commons where... people are linked together to exchange ideas, service, and friendship
Cybersecurity def
The organization and collection of resources, processes, and structures used to protect cyberspace and cyberspace-enabled systems
Threat Landscape def
Involves: Internet, hackers, tactics, techniques, and procedures (TTP), effects, attack surfaces, attribution
Factors in evolution of internet
Evolutionary process
Multiple players and stakeholders
Academic inspiration
Key government support
Private sector ingenuity
History and evolution of the internet (detailed)
Ideological origins
Govt support and prototyping to build a prototype (ARPANET)
Privatizing and scaling the internet
Govt research support
ARPANET
The first packet-switched network, the predecessor to the Internet.
Birth of the modern internet
Goal: allow networks to independently communicate with one another; previous work on internet protocol (IP) and transmission control protocol (TCP) is adopted universally in 1984
Internet as a global commons Trends (early 2000's)
Cloud computing
Mobile Computing
Encapsulation def
Instructions for data to be packaged, routed, and transmitted
OSI Model def
Open systems interconnection model; a way to think about the communications functions independent of the technology or structure
OSI Model Layers
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
Application Layer
Acts as an interface between your computer and the programs on it and the network you want to communicate on
Translating human domain names into computer friendly IP addresses is done by the DNS protocol
Network Layer
Information that deals with routing is done at the network layer
Locations on the internet are established by internet protocol
Autonomous systems are large networks that manage thousands of internet protocol addresses
Autonomous systems maintain peering relationships
Physical Layer
Moves data encoded on different points on the electromagnetic spectrum
Fiber optics help traverse long distances
Microwave used for point to point transmission
Satellites used to move data over radio waves
Internet Exchange Points (IXP) physically connect networks together in accordance to logical peering relationships
Internet
Collection of networks working together to transmit, receive, manipulate, and process information for a variety of purposes
Governance def
The process by which we manage the technical, informational, and organizational problems that arise from the complexity of the Internet; multiple stakeholders are involved
Technical Rule Making Bodies
Internet Architecture Board
Internet Engineering Task Force
Internet Research Task Force
World Wide Web Consortium (W3C)
An international community of organizations and the public work to develop web standards
Develops protocols and guidelines for web development purposes (CSS, HTML, etc)
Tallinn Manual
Sets out rules for conducting and responding to cyberwarfare
Attack Surface def
The point at which an attacker can research, scan, exploit, and enter your organization; the publicly identifiable pieces of your network exposed to a potential attacker
Website
Internet connected sensors (Webcam)
File servers
Cloud computing: security concerns
Privileged User Access: Company data processed
outside of the organization brings a degree of risk
Regulatory Compliance: Customers are ultimately
responsible for the integrity of their data regardless
of where it resides.
Data Location: When you use cloud services you
don't always know where your data is physically
located
Data Segregation: Organizational data is collocated
with other systems
Recovery: Cloud providers need to be able to
articulate recovery procedures in case of total failure