Cybersecurity Flashcards
(26 cards)
1960
First user accounts and associated passwords
Computers were the size of a room
1970
ARPANET was born; Advanced Research Projects Agency Network
Distant Computers could now be connected with one another
Hackers became a thing now
1980
Internet arrives this decade
1990
People became more exposed to viruses and malware
Hackers were everywhere
2000
Money moved to digital and so did big businesses
2010
Very first state backed attacks
Introduction of the GDPR (General Data Protection Regulation)
IT vs OT?
Information technology
Operation technology
Priorities of Information Technology in order HIGHEST to LOWEST?
Availability, Integrity, Confidentiality
- Confidentiality
- Integrity
- Availability
What are 3 priorities of Operational technology in order HIGHEST to LOWEST?
Availability, Integrity, Confidentiality
- Availability
- Integrity
- Confidentiality
Give an example of an Information technology and operational technology?
IT: Smart phones
OT: Temperature sensor
3 characteristics of an Inter-Integratic Circuit? (I^2CC)
- Can connect up to 127 peripherals
- Flexibility is inbuilt
- Single master with a multi-slave system
There are two types of devices for AFDX architecture. What are they?, see page 11 for the diagram of how a switch leads to an end system
Switch: Forwards Frames to End-systems + Traffic policing and filtering
End System: Network applications send/receive data to/from the network
What is Jitter?
Variation in time from a source sending to a receiving node
Study page 19 the risk assessment diagram. Redraw the diagram to memorise the layout
Done?
What is the IIOT?
Industrial Internet of Things
What is NIS2?
A directive that protects the EU from cybersecurity threat, as the IIOT is considered to be becoming more important and valuable i.e. bridging the gap between the physical and digital realms
What does Article 21 of NIS2 refer to?
Addresses cyber threats e.g. supply chain security
What is meant by an iterative process?
A process that never ends like:
Evaluate and assess, maintain and implement
What is meant by secure by design
Designing the architecture, communication, access and compliance to be secure
What is defense in depth?
Segmentation, DMZ
What is meant by requirements?
Things for example Identify and authenticate and system integrity
What is Maturity?
Initial, Managed, Defined, Improving
What are systems in aircraft with ground links?
ACARS (Aircraft Communication And Reporting System)
HF / VHF
GPS / ILS
What are the 3 parts of EASA part IS?
- Objective?
- Scope?
- Activity?
- To protect the safety of aviation systems
- Information technology systems
- Identify and Manage Risks