Misaki's favorite smell.
What is New Mexico rain?
Clear the terminal screen.
What is clear?
The tracking, analyzing, and countering of digital security threats.
What is cyber intelligence?
This is a computer program that spreads or self-replicates and requires user interaction to activate.
What is a virus?
The amount of layers in the OSI model.
What is 7?
Jeff wants to transform between this thing and a human for the rest of his life.
What is a satellite?
Display the current working directory.
What is pwd?
Name 2 Types of Intelligence.
What is (1) Strategic; (2) Operational; (3) Technical; and (4) Tactical?
Emails with bad grammar, all words beginning with an upper-case letter, a link to click so that you can update your information, or a request for personal information are all indicators of these.
What are email scams or phishing attempts?
Detection of, resilience against, response to and recovery from incidents.
What is cybersecurity?
This mentor claims to have been punched in the face by a ghost.
Who is Martin?
Change the current directory.
What is cd?
Planning & Direction, Collection, Processing, Analysis & Production, and Dissemination.
What is the CIA 5 Step Intelligence Process?
An eavesdropping attack that occurs when attackers insert themselves into a two-party transaction.
What is man-in-the-middle?
The three interrelated layers of cyberspace.
What is blue, red, and gray cyberspace?
Lara's most memorable trip.
Temporarily elevates privileges allowing users to complete sensitive tasks without logging in as the root user
What is sudo?
They are responsible for coordinating and conducting impact assessments of controlled unclassified information (CUI) compromises.
Who is the Damage Assessment Management Offices (DAMOs)?
Beware of these types of programs that track every stroke you make while typing in an effort to glean your password.
What is keylogging?
An extra layer of security used to verify account login attempts.
What is two factor authentication?
Your favorite mentor.
Who is all of them?
Check the connectivity between two nodes.
What is ping?
An additional element that a Threat Impact Assessment brings in addition to a Damage Assessment of lost data.
What is (1) In depth threat picture derived from multiple sources; (2) Adversary strategic approach – Threat threads; (3) Intelligence & vulnerability gaps; and (4) Prioritized protection strategy?
It is usually contained in a valid program and usually offers the promise of something you might be interested in, such as a screen saver or photograph, but is designed to give hackers access to your computer or files.
What is a Trojan Horse?
Is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.
What is Insider threat?