The practice of managing risks related to the storage, processing and transmission of our information and data.
What is Information Assurance?
The collection of information provided by our senses.
What is Observe?
Game apps may request and give away these kind of PII.
What is location or contacts?
The act of executing weaponized software after delivery.
What is Exploitation?
This intends to promotes a sense of fairness by creating rules of acceptable behavior and practices to help identify what is also unacceptable.
What are ethics?
Software written to steal information, spy on users, and gain control of computers.
What is Malware?
The analysis of information to form the most correct perspective of the situation.
What is Orient?
PII stands for this.
What is personally identifiable information?
This common action on objective involves removing data from the target victim.
What is exfiltration?
Behaving ethically is not always easy, but is this?
What is necessary?
This is frequently referred to as the 5th Domain after land, sea, air, and space.
What is Cyber?
You perform this step in the OODA Loop when you have selected the best course of action.
What is Decided?
T/F It is an easy process to remove information that has been posted on the internet.
False
Collecting publicly available information from websites and gathering emails.
What is Reconnaissance?
Do not use these without authorization or proper compensation.
What are other people's computer resources?
Actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.
What is the cyber warfare?
With regards to the OODA Loop, this step involves performing the decision.
What is Act?
These items should never be shared online.
What are: Passwords, Social Security numbers, Student ID number, Birthplace?
The act of manipulating a compromised systems.
What is command and control (C2)?
Do think about these when writing programs or designing a system.
What are social consequences?
What are the two additional pillars that the DoD adds to the CIA triad (confidentiality, integrity, availability)?
What are authentication and non-repudiation?
This Lt. Col faught in the Korean Conflict and coined the OODA Loop concept.
Who is Lt Col John Boyd?
T/F Posts limited to only your friends, cannot be copied and pasted or shared with screenshots.
False.
The act of combining exploitation software or code with information gathered via the recon step?
What is weaponization?
These two traits may be required to admit when making a wrong decision and correct a mistake and to stand up to bullies.
What is humility and courage?