Cyber Warfare
OODA Loop
Social Media Savvy
Cyber Kill Chain
Cyber Ethics
100

The practice of managing risks related to the storage, processing and transmission of our information and data.

What is Information Assurance?

100

The collection of information provided by our senses.

What is Observe?

100

Game apps may request and give away these kind of PII.

What is location or contacts?

100

The act of executing weaponized software after delivery.

What is Exploitation?

100

This intends to promotes a sense of fairness by creating rules of acceptable behavior and practices to help identify what is also unacceptable.

What are ethics?

200

Software written to steal information, spy on users, and gain control of computers.

What is Malware?

200

The analysis of information to form the most correct perspective of the situation.

What is Orient?

200

PII stands for this.

What is personally identifiable information?

200

This common action on objective involves removing data from the target victim. 

What is exfiltration? 

200

Behaving ethically is not always easy, but is this?

What is necessary?

300

This is frequently referred to as the 5th Domain after land, sea, air, and space.

What is Cyber?

300

You perform this step in the OODA Loop when you have selected the best course of action.

What is Decided?

300

T/F It is an easy process to remove information that has been posted on the internet.

False

300

Collecting publicly available information from websites and gathering emails.

What is Reconnaissance? 

300

Do not use these without authorization or proper compensation.

What are other people's computer resources?

400

Actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.

What is the cyber warfare?

400

With regards to the OODA Loop, this step involves performing the decision.

What is Act?

400

These items should never be shared online.

What are: Passwords, Social Security numbers, Student ID number, Birthplace?

400

The act of manipulating a compromised systems.

What is command and control (C2)?

400

Do think about these when writing programs or designing a system.

What are social consequences?

500

What are the two additional pillars that the DoD adds to the CIA triad (confidentiality, integrity, availability)?

What are authentication and non-repudiation?

500

This Lt. Col faught in the Korean Conflict and coined the OODA Loop concept. 

Who is Lt Col John Boyd?

500

T/F Posts limited to only your friends, cannot be copied and pasted or shared with screenshots.

False.

500

The act of combining exploitation software or code with information gathered via the recon step?

What is weaponization? 

500

These two traits may be required to admit when making a wrong decision and correct a mistake and to stand up to bullies. 

What is humility and courage?