מושגים 2.0 Flashcards

1
Q

לוחמה קיברנטית

A

לוחמה וירטואלית, לוחמה בעולם הסייבר

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

מאפייני המרחב הקיברנטי

A

1.רשתות מחשבים וירטואליות
2.אנשים
3.טלפונים חכמים
4.תשתיות פיזיות: התקני אחסון, מעגלים חשמליים וכוליי
5.נקודות קצה פיזיות: מערכות שליטה ובקרה
6.רשתות פרטיות, ייעודיות וציבוריות

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

סוגים שונים של לוחמה במרחב הסייבר

A
  1. לוחמת שליטה ובקרה
  2. לוחמה מבוססת מודיעין
  3. לוחמה אלקטרונית
  4. לוחמת מידע (לוחמה פסיכולוגית)
  5. תקיפה של מערכות מידע אזרחיות
  6. לוחמה שמטרתה להשיג עליונות כלכלית
  7. הפעלה של אמצעים עתידניים
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

תקיפה של תשתיות קריטיות (דוגמאות)

A
  • אנרגיה וחשמל
  • מערכת מים
  • גרעין
  • תחבורה
  • בנקים ובורסה
  • רשתות צבאיות
  • מאגרי מידע חיוניים
  • EGOV
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

מעבד

A

CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

עיבוד

A

PROCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

קלט

A

RECIEVE
(input)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

פלט

A

“give”/spit out
(output)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DOS

A

Disk Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

KERNEL

A

root code= nucleus
admin properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Shell

A

wall between user and root code
it both seperates and connects the user with the program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Alan Turing

A
  • born 1912
  • british
  • mathematician and one of the founders of computer science
  • suicidal gay Nazi
  • invented turing machine, turing test and helped create the “Enigma”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Enigma

A

During World War II, the Germans used the Enigma, a cipher machine, to develop nearly unbreakable codes for sending secret messages. The Enigma’s settings offered 150,000,000,000,000,000,000 possible solutions, yet the Allies were eventually able to crack its code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Turing test

A

s a deceptively simple method of determining whether a machine can demonstrate human intelligence (first Captcha)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

חוק מור

A
  • named after Gordon Moore- co-founder of Intel
  • the ability of a processor will double over 18 months until it reaches its potential limits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

שערים לוגיים

A

A logic gate is a device that acts as a building block for digital circuits. They perform basic logical functions that are fundamental to digital circuits. Most electronic devices we use today will have some form of logic gates in them. For example, logic gates can be used in digital electronics such as smartphones and tablets or in memory devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

acceptable logic gates

A

AND, NAND (not)
OR, NOR (not)
XOR, XNOR
buffer= מה שנכנס זהה למה שיוצא
inventor= מה שיוצא יהיה הפוך ממה שנכנס

binary code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BIOS

A

(basic input/output system) is the program a computer’s microprocessor uses to start the computer system after it is powered on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

פרוטוקול

A

BINARY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

תווך

A

wired, wireless and ?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

difference between MAC and IP addresses

A

The MAC address designates the physical location of a device within a local network, whereas the IP address signifies the device’s global or internet-accessible identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

protocol IP

A

“speed mail”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IP address rules

A

0-255.0-255.0-255.0-255
each number must be between 0-255 and must be up to 4 digits

24
Q

MAC

A

Media Access Control
16 decimal
24 bit

25
Q

חברת המידע

A

an information society is a society or subculture where the usage, creation, distribution, manipulation and integration of information is a significant activity. Its main drivers are information and communication technologies, which have resulted in rapid growth of a variety of forms of information.

26
Q

RMA

A

A revolution in military affairs (RMA) is a hypothesis in military theory about the future of warfare, often connected to technological and organizational recommendations for military reform.

27
Q

לוחמה בסייבר- תקיפה

A
28
Q

לוחמה בסייבר- הגנה

A
29
Q

CNE

A

Computer Network Exploitation

30
Q

CNA

A

Computer Network Attack

31
Q

CND

A

Computer Network Defense

32
Q

CNC

A

Computer Network Crime

33
Q

CNI

A

Computer Network Influence

34
Q

APT

A

Advanced Persistant Threat-
usually sponsored by nations or very large organizations. Examples of APTs include Stuxnet,

35
Q

Rootkits

A

A rootkit is software used by cybercriminals to gain control over a target computer or network. Rootkits can sometimes appear as a single piece of software but are often made up of a collection of tools that allow hackers administrator-level control over the target device.

36
Q

תולעות

A

virus/ bug
(literally means “worm”)

37
Q

3 types of cyber-crimes

A
  1. real world crimes- dark web
  2. classic cyber crimes- id theft, blackmail, etc.
  3. computer on computer crime- hacking, viruses, bugs, etc.
38
Q

שרשרת אספקה

A

outside source-> privatization-> private ownership-> costs-> transfer to others

39
Q

effect of globalization on supply chains

A
  1. increase in the usage of parts required (raw material)
  2. changes to chain of supply made them less secure
40
Q

how to fix supply chain problem

A
  1. famaliarize with suppliers
  2. rate suppliers by importance
  3. decide who is bad/ privy to potential security threats\
  4. run a cyber security test on each supplier
41
Q

מורכבות

A

complexity

42
Q

מפוזרות

A

scattered

43
Q

חוליות לוגיות

A

logical links

44
Q

הנדסה חברתית

A

In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional “con” in that it is often one of many steps in a more complex fraud scheme.[1] It has also been defined as “any act that influences a person to take an action that may or may not be in their best interests.

45
Q

SCADA

A

Supervisory Control and Data Acquisition (SCADA)
systems are used for controlling, monitoring, and analyzing industrial devices and processes. The system consists of both software and hardware components and enables remote and on-site gathering of data from the industrial equipment.

46
Q

PLC

A

A PROGRAMMABLE LOGIC CONTROLLER (PLC) is an industrial computer control system that continuously monitors the state of input devices and makes decisions based upon a custom program to control the state of output devices.

47
Q

RTU

A

A remote terminal unit (RTU) is a microprocessor-controlled electronic device that interfaces objects in the physical world to a distributed control system or SCADA (supervisory control and data acquisition) system by transmitting telemetry data to a master system, and by using messages from the master supervisory system to control connected objects.[1] Other terms that may be used for RTU are remote telemetry unit and remote telecontrol unit.

48
Q

פרויקט 2050

A

when the chinese believe they will be fully finished taking over the world. Mwahahaha

49
Q

american doctrine on cyber

A

All major military decisions can be influenced by AI and tech but a human must make all final real world decisions AKA drop the bombs

50
Q

מדריך טאלין

A

A guidebook of suggestions written for NATO but not required by law (vague threats meaning if anyone breaks it, could enact article 5 of NATO) this is where it holds its power.

51
Q

אמנת בודפשט

A

Establish a list of rules for all countries for punishments on cyber crimes

52
Q

5 eyes (countries)

A

Anglo countries IE: Australia, England, USA, New Zealand, Canada

53
Q

RSA

A

The RSA algorithm (Rivest-Shamir-Adleman) is the basis of a cryptosystem – a suite of cryptographic algorithms that are used for specific security services or purposes

54
Q

אירוע הפריצה RSA

A

Stole information on F35 from Lockheed martin

55
Q

arab winter

A

The Arab Winter is a term referring to the resurgence of authoritarianism and Islamic extremism in some Arab countries in the 2010s in the aftermath of the Arab Spring protest

56
Q

FLAME

A

Flame, also known as Flamer, sKyWIper, and Skywiper, is modular computer malware discovered in 2012 that attacks computers running the Microsoft Windows operating system. The program is used for targeted cyber espionage in Middle Eastern countries. Created by Russia

57
Q

Shamoon

A

Shamoon, also known as W32.DistTrack, is a modular computer virus that was discovered in 2012, targeting then-recent 32-bit NT kernel versions of Microsoft Windows. The virus was notable due to the destructive nature of the attack and the cost of recovery. Created by the Iranian pigs