What is the goal of of a team during competition?
The goal of the competition is to harden the system in the provided time and find all the errors and mistakes.
What are the Do's of cyber ethics
Do think about the social consequences of the program you are writing or the system you are designing.
Do always use a computer in ways that ensure consideration and respect for your fellow humans.
What is the CIA Triad and what does stand for?
People that process technology and it includes police, rules, producers, and maintaining security.
Stands for maintaining Confidentiality, Integrity, and Availability.
What is Malware?
Malicious software designed and written to:
Steal information
Spy on users
Gain control of computers
What are the different components of a network.
Servers - Computers dedicated to managing shared resources
Switches - Controls traffic within a network
Router - Controls traffic between networks
Firewall - Screen incoming and outgoing traffic for anomalies and potential threats
What are the 2 names for the simulated computer that we compete on?
Virtual Machine
Image
What are the Don'ts of cyber ethics?
Do not use a computer to harm other people.
Do not interfere with other people's computer work.
Do not snoop around in other people's computer files.
Do not use a computer to steal.
Do not use a computer to bear false witness.
Do not copy or use proprietary software for which you have not paid.
Do not use other people's computer resources without authorization or proper compensation.
Do not appropriate other people's intellectual output.
What is confidentiality?
What is integrity?
What is Availability?
Making sure only approved users have access to data
Data integrity: assurance that information has not been tampered with or cropped between source and the end user
Source Integrity: assurance that the sender of the information is who it's supposed to be
What are examples of Malware?
Examples:
Viruses
Trojan horse
Zombies aka bots
Botnet
Keylogger
Spyware:
What is authentication and authorization?
Authentication- Verifying the user identity
Authorization- Determining whether a user is allowed to access certain resources
What are the different types of PII?
Social security number
Credit card number
Date of Birth
Email address
Mailing address
Student ID number
What are the proper responses to cyber bullying?
Do not respond to any messages, posts or emails
Block offenders
Document and report the behavior so it can be addressed
Flag the content so other people aren’t hurt by it
Provide screenshots or records of bullying
Tell a trusted adult
What are the different types of phishing?
Phishing - fraud attempts perpetrated by random attackers against a wide number of users
Spear phishing - fraud attempts targeted at specific people based on their membership or affiliation with a the spoofed group
Vishing: Attempts to manipulate people into giving up PII over the phone
Smishing: Attempts to manipulate people into giving up PII by text message (SMS)
What do we use when making passwords and what do they stand for.
CLOUDS
C-complex
L-lengthy
O-only you
U-unique
D-different
S-short-term
What are two disadvantages and advantages of both windows and Linux-Unbuntu operating systems
Linux’s disadvantages is that it’s a harder for newer computer people to use because it's a lot more complex and advantages are its customizable and less targeted by hackers
Windows disadvantages are that its targeted more since its really popular, and advantages they are organizable and overall it's a lot cheaper
Who does our cyber security advice apply to?
Anyone who uses technology on a daily basis.
What is cyber hygiene?
Basic computer practices that keep computers and data safe.
What are the indicators of phishing?
Grammar mistakes
All caps
Signed by company and not and individual
Suspicious emails and links attached
What do we not use when making passwords.
SUN
S-simple
U-user-id
N-name
What is risk matrix?
It tells you the impacts of the probability of a computer attack.
What do we definitely not do in cyber patriots?
Don't pretend to be someone else
Do not use abusive or threatening language
Do not obtain personal info about someone
What can you do to show cyber hygiene?
- lock your computer when in public places
- shield your computer when typing passwords
- don't let strangers use your computer
- keep sensitive information in secure places
What is Cyber Vulnerability?
something that could allow a cyber threat to get into a system easily without any amount of damage from trivial to extreme
What is a cyber threat and what are some examples.
An attacker or piece of malware that desires and/or is able to cause harm to a target
Examples
Social engineering - manipulating people into giving personal information (like phishing)
Physical - dumpster diving and shoulder surfing
Cyber Patriots is not important and people just do it for fun. True or False?
FALSE