What does OSI stand for?
Open Systems Interconnection
What information on a digital image can be used against you?
Where does a cell phone get cell coverage from?
Cell Phone Provider
signal broadcasting from a device
What is more secure HTTP or HTTPS?
HTTPS
What does VPN stand for?
Virtual Private Network
What are considerations when choosing a VPN?
Is it allowed in an area, does the VPN audit, is it from a 3rd party.
What does IMEI stand for?
International Mobile Equipment Identity
What are the three areas of the CIA Triad?
Confidentiality, Integrity, Availability
What are the 7 layers of the OSI model?
Physical, Data, Network, Transport, Session, Presentation, Application
What information does your phone share?
Location, Connections, Apps, "User Dependent"
International Mobile Subscriber Identity
What is Steganography?
Hiding information within an image
What layers of the OSI do general users only see and interact with?
Physical (Layer 1)
Transport Control Protocol
What is a supply chain attack?
A supply chain attack is a type of cyberattack that targets trusted third-party vendors to infiltrate an organization's systems, often by injecting malicious code into software or compromising hardware components.
How does the cell phone provider guarantee service to their customers?
Having more cell towers=more cell coverage.
What does OSINT stand for?
Open-Source Intelligence
Name a vulnerability and how it can be leveraged against you on the physical layer of the OSI model.
Secure Boot being disabled, bypassing security of booting from a separate OS.
What is the difference between TCP an UDP connections?
TCP is a connection-oriented protocol, UDP is connectionless protocol
What is the best tool for data protection?
The end user
What is the name of the timing control on cell phone towers that updates your location?
T3212 timer controls
How does social media affect someone's identity?
Digital Persona (Pattern of Life)
What is a virtual machine?
Software based OS not from the physical computer