The principles of CIA
What is: Confidentiality, Integrity, Availability ?
The first "D"
What is Deter ?
The most effective "E"
What is Education?
Keep it ...
What is Simple?
Most common vulnerability in a router
What is leaving the default username and password?
To keep information whole and valid
What is Integrity?
Looking at log-files and using anti-virus devices, is an example of this
What is Detection
Hiring a team of cyber-security employees is a great way to ... rules on your network.
What is Enforce?
Security by blocking websites.
What is Security by Limiting?
The difference between Data and Information.
What is Information is Data with Context?
To keep information on a need-to-know basis.
What is Confidentiality?
Once you detect the intruder you would report their location in order to ...
What is Detain
Designing your network ahead of time is a great way to... engineer a more secure network.
What is Engineering?
Security by hiding your SSID number?
What is Security by Obscurity?
The difference between UDP and TCP.
What is TCP creates a handshake while UDP shouts at you?
How much access there is to the information.
What is Availability?
Incorporating multiple-layers of security such as: firewalls and canaries are way to...
What is Delay
The Gen-cyber camp is a great way to ... students.
What is Educate?
Just like an orgre...
What is Security by Layering?
This is the original concept that ip addresses were based on.
What is the Postal System?
The end goal that we try to protect.
What is Information?
This is a government organization that you can notify if hacked.
What is the U.S Postal Service?
In installing our Raspberry Pi's, we managed to ... a new system to our specifications.
What is Engineer?
A system including: Cisco, Apache, and Palo Alto technology is an example of...
What is Security by Diversity?
This term refers to an ethical a computer hacker who specializes in penetration testing to ensure the security of organization.
What is a White Hat Hacker?