Cybersecur-ITY
Chapter 1
Chapter 4
Chapter 4: Electric Boogaloo
Chapter 5
100

Timely and reliable access to or use of information by authorized users (1.1)

What is availability?

100

The right of an individual to control the distribution of information about themselves (1.1)

What is privacy?

100

This is used to control traffic flow on networks and often to connect similar networks - it can be wired or wireless, can connect multiple switches, and is smarter than a hub or switch (4.1)

What is a router?

100

A standard that defines wired connections of networked devices to ensure disparate devices can communicate over the same cables (4.1)

What is ethernet?

100

An algorithm that uses one key to encrypt and a different key to decrypt the input plaintext (5.1)

What is asymmetric encryption?

200

The assurance that data has not been altered in an unauthorized manner (1.1)

What is data integrity?

200

One method of authentication, with examples including passwords, passphrases, and possibly even answers to questions (i.e. mother's maiden name) (1.1)

What is "something you know"?

200

A computer that provides information to other computers on a network (4.1)

What is a server?

200

A network typically spanning a single floor or building (commonly a limited geographical area) (4.1)

What is a local area network? (LAN)

200

The concept of system capabilities to detect and prevent the unauthorized use and transmission of information (5.1)

What is data loss prevention? (DLP)

300

A measure of the importance assigned to information by its owner for the purpose of denoting its need for protection (1.1)

What is sensitivity?

300

An individual or group that attempts to exploit vulnerabilities to cause or force a threat to occur (1.2)

What is a threat actor?

300

The process and act of converting a message from plaintext to ciphertext (4.1)

What is encryption?

300

An address consisting of four octets that was the standard protocol for transmission of data from source to destination in packet-switched communications networks/systems (4.1)

What is IPv4?

300

Tactics to infiltrate systems via email, phone, text, or social media, often by impersonating someone (5.4)

What is social engineering?

400

The maintenance of a known good configuration and expected operational function as the system processes the information (1.1)

What is system integrity?

400

Anything of value in need of protection, including both tangible (information systems and intangible (intellectual property) items (1.2)

What is an asset?

400

A wired device used to connect multiple devices in a network (4.1)

What is a hub?

400

The standard communication protocol for sending and receiving emails (4.1)

What is Simple Mail Transport Protocol? (SMTP)

400

A phishing attack that attempts to trick highly placed officials or private individuals with sizeable assets into authorizing large fund wire transfers to previously unknown entities (5.4)

What is a whaling attack?

500

A measure of the degree to which an organization depends on the information or information system for the success of a mission or business function (1.1)

What is criticality?

500

A weighted factor based on a subjective analysis of the probability that a given threat is capable of exploiting a given vulnerability or set of vulnerabilities (1.2)

What is likelihood of occurrence?

500

The ends of a network communication link (often a client and a user) (4.1)

What are endpoints?

500

The TCP/IP layer that permits data to move among devices (4.1)

What is the transport layer?

500

A type of security awareness activity that focuses on building proficiency in specific skills or actions, including sharpening perception or judgment (5.4)

What is a training activity?

M
e
n
u