Basics
Cyber Ethics, Cyber Bullying and Cyber Hygiene
CIA Triad, Phishing and Cyber Vulnerability
Cyber Threat, Malware, and Passwords
Components of a Network, Risk Matrix, authentication, authorization, and Linux-Unbuntu operating systems
100

What is the goal of of a team during competition?

The goal of the competition is to harden the system in the provided time and find all the errors and mistakes.

100

What are the Do's of cyber ethics

  • Do think about the social consequences of the program you are writing or the system you are designing.

  • Do always use a computer in ways that ensure consideration and respect for your fellow humans.

100

What is the CIA Triad and what does stand for?

People that process technology and it includes police, rules, producers, and maintaining security. 

Stands for maintaining Confidentiality, Integrity, and Availability. 

100

What is Malware?

Malicious software designed and written to:

  • Steal information

  • Spy on users

  • Gain control of computers

100

What are the different components of a network.

  • Servers - Computers dedicated to managing shared resources

  • Switches - Controls traffic within a network

  • Router - Controls traffic between networks

  • Firewall - Screen incoming and outgoing traffic for anomalies and potential threats

200

What are the 2 names for the simulated computer that we compete on?



Virtual Machine

Image

200

What are the Don'ts of cyber ethics?

  • Do not use a computer to harm other people.

  • Do not interfere with other people's computer work.

  • Do not snoop around in other people's computer files.

  • Do not use a computer to steal.

  • Do not use a computer to bear false witness. 

  • Do not copy or use proprietary software for which you have not paid.

  • Do not use other people's computer resources without authorization or proper compensation.

  • Do not appropriate other people's intellectual output.

200

What is confidentiality?

What is integrity?

What is Availability? 

  • Making sure only approved users have access to data

  • Data integrity: assurance that information has not been tampered with or cropped between source and the end user

  • Source Integrity: assurance that the sender of the information is who it's supposed to be

  • Ensuring data is accessible by approved users when needed

200

What are examples of Malware?

Examples:

  • Viruses 

  • Trojan horse 

  • Zombies aka bots 

  • Botnet 

  • Keylogger

  • Logic/time bomb
  • Spyware:

200

What is authentication and authorization?

Authentication- Verifying the user identity

Authorization- Determining whether a user is allowed to access certain resources

300

What are the different types of PII?

  • Social security number

  • Credit card number

  • Date of Birth

  • Email address

  • Mailing address

  • Student ID number

300

What are the proper responses to cyber bullying?

  • Do not respond to any messages, posts or emails 

  • Block offenders 

  • Document and report the behavior so it can be addressed

  • Flag the content so other people aren’t hurt by it

  • Provide screenshots or records of bullying

  • Tell a trusted adult

300

What are the different types of phishing?

  • Phishing - fraud attempts perpetrated by random attackers against a wide number of users

  • Spear phishing - fraud attempts targeted at specific people based on their membership or affiliation with a the spoofed group

  • Vishing: Attempts to manipulate people into giving up PII over the phone

  • Smishing: Attempts to manipulate people into giving up PII by text message (SMS)

300

What do we use when making passwords and what do they stand for.

CLOUDS

C-complex

L-lengthy 

O-only you

U-unique

D-different

S-short-term

300

What are two disadvantages and advantages of both windows and Linux-Unbuntu operating systems

  • Linux’s disadvantages is that it’s a harder for newer computer people to use because it's a lot more complex and advantages are its customizable and less targeted by hackers

  • Windows disadvantages are that its targeted more since its really popular, and advantages they are organizable and overall it's a lot cheaper

400

Who does our cyber security advice apply to?

Anyone who uses technology on a daily basis.

400

What is cyber hygiene?

Basic computer practices that keep computers and data safe.

400

What are the indicators of phishing?

  • Grammar mistakes 

  • All caps 

  • Signed by company and not and individual 

  • Suspicious emails and links attached

400

What do we not use when making passwords.

SUN

S-simple

U-user-id

N-name

400

What is risk matrix?

  • It tells you the impacts of the probability of a computer attack.


500

What do we definitely not do in cyber patriots?

  • Don't pretend to be someone else 

  • Do not use abusive or threatening language 

  • Do not obtain personal info about someone 

500

What can you do to show cyber hygiene?

- lock your computer when in public places 

- shield your computer when typing passwords 

- don't let strangers use your computer 

- keep sensitive information in secure places

500

What is Cyber Vulnerability?

something that could allow a cyber threat to get into a system easily without any amount of damage from trivial to extreme

500

What is a cyber threat and what are some examples.

An attacker or piece of malware that desires and/or is able to cause harm to a target

Examples

Social engineering - manipulating people into giving personal information (like phishing)

Physical - dumpster diving and shoulder surfing



500

Cyber Patriots is not important and people just do it for fun. True or False?

FALSE

M
e
n
u