Computer hardware
Operating Systems
Ethics
Security
Misc
100

What are the main components of a computer

CPU, RAM, storage (HDD/SSD), motherboard, GPU, power supply.

100

what is an operating system 

fundamental software that manages a computer's hardware and software resources, acting as a bridge between the user and the hardware.

100

Ethical Hacking

Using hacking techniques with consent to identify and address security vulnerabilities.

100

Protection of sensitive information

Cyber security aims to safeguard confidential data, including personal information, financial records, and intellectual property.

100

MISP

A freely available open-source platform designed to collect, store, distribute, and share cyber security indicators and threats. It's used by incident analysts, security professionals, and malware reversers to share structured information effectively.

200

What is the purpose of the CPU?

Central Processing Unit, the brain of the computer, executes instructions.

200

what does an operating system do 

manage and control all the hardware and software resources, enabling users to interact with the device and run programs efficiently.

200

Confidentiality

Protecting sensitive information and maintaining privacy are crucial. 

200

Defense against cyberattacks

This includes protecting against malware, phishing scams, ransomware, and other malicious attacks.

200

MISC

A collaborative group in Marin County, California, that helps share information security best practices, resources, and technical expertise among community partners.

300

What is RAM

Random Access Memory, short-term memory for active processes. 

300

what are 5 operating system 

ios, android, windows, manOS, chrome.

300

Transparency

Being open about data collection, usage, and access control.

300

 Maintaining system integrity and availability

Cyber security ensures that computer systems and networks function reliably and are not compromised or disrupted by unauthorized access or attacks.

300

Miscellaneous Attacks

In cybersecurity contexts, "misc" can also refer to a category of attacks that don't fit neatly into other, more defined types. These might include attacks that exploit vulnerabilities in web servers, firewalls, or proxy servers, or attacks that take advantage of how web browsers handle JSON data.

400

What is the difference between an HDD and an SSD?

HDD (Hard Disk Drive) uses spinning platters, while SSD (Solid State Drive) uses flash memory.

400

What security is provided by operating systems?

investors by corporations and governments

400

Risk Assessment

Conducting thorough assessments to identify potential vulnerabilities and threats.

400

Incident response and recovery

Cyber security also involves having plans in place to respond to and recover from cyberattacks and data breaches.

400

General Usage

Misc" is also sometimes used as a general term for a category of items, tasks, or issues that are not easily categorized. For example, a "misc" field in a log might contain information that doesn't fit into other predefined categories, such as a filename associated with a vulnerability.

500

What does the GPU do?

performing mathematical calculations at high speed, particularly for tasks related to graphics and video processing

500

the 5 main features of an operating system 

process management, memory management, file system management, device management, and user interface.

500

Continuous Learning

Staying updated on evolving cyber threats and ethical considerations.

500

Protecting personal

Cyber security safeguards individuals and organizations from the risks of data breaches and identity theft.

500

What is MISC in cyber security

Management Information Security Committee, or MISC, is a management-level data protection and cybersecurity committee headed by the organization's CEO

M
e
n
u