Cybersecurity Flashcards

(26 cards)

1
Q

1960

A

First user accounts and associated passwords

Computers were the size of a room

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1970

A

ARPANET was born; Advanced Research Projects Agency Network

Distant Computers could now be connected with one another

Hackers became a thing now

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

1980

A

Internet arrives this decade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

1990

A

People became more exposed to viruses and malware

Hackers were everywhere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2000

A

Money moved to digital and so did big businesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

2010

A

Very first state backed attacks

Introduction of the GDPR (General Data Protection Regulation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IT vs OT?

A

Information technology

Operation technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Priorities of Information Technology in order HIGHEST to LOWEST?

Availability, Integrity, Confidentiality

A
  1. Confidentiality
  2. Integrity
  3. Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are 3 priorities of Operational technology in order HIGHEST to LOWEST?

Availability, Integrity, Confidentiality

A
  1. Availability
  2. Integrity
  3. Confidentiality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give an example of an Information technology and operational technology?

A

IT: Smart phones

OT: Temperature sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 characteristics of an Inter-Integratic Circuit? (I^2CC)

A
  1. Can connect up to 127 peripherals
  2. Flexibility is inbuilt
  3. Single master with a multi-slave system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

There are two types of devices for AFDX architecture. What are they?, see page 11 for the diagram of how a switch leads to an end system

A

Switch: Forwards Frames to End-systems + Traffic policing and filtering

End System: Network applications send/receive data to/from the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Jitter?

A

Variation in time from a source sending to a receiving node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Study page 19 the risk assessment diagram. Redraw the diagram to memorise the layout

A

Done?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the IIOT?

A

Industrial Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is NIS2?

A

A directive that protects the EU from cybersecurity threat, as the IIOT is considered to be becoming more important and valuable i.e. bridging the gap between the physical and digital realms

17
Q

What does Article 21 of NIS2 refer to?

A

Addresses cyber threats e.g. supply chain security

18
Q

What is meant by an iterative process?

A

A process that never ends like:

Evaluate and assess, maintain and implement

19
Q

What is meant by secure by design

A

Designing the architecture, communication, access and compliance to be secure

20
Q

What is defense in depth?

A

Segmentation, DMZ

21
Q

What is meant by requirements?

A

Things for example Identify and authenticate and system integrity

22
Q

What is Maturity?

A

Initial, Managed, Defined, Improving

23
Q

What are systems in aircraft with ground links?

A

ACARS (Aircraft Communication And Reporting System)
HF / VHF
GPS / ILS

24
Q

What are the 3 parts of EASA part IS?

  1. Objective?
  2. Scope?
  3. Activity?
A
  1. To protect the safety of aviation systems
  2. Information technology systems
  3. Identify and Manage Risks
25
Examples of things EASA Part IS concerns itself with?
Airworthiness, Air Crew, aerodromes, airspace, air operations etc.
26
For EASA part IS, what are the priorities in order? confidentiality, Availability, Integrity
1. Confidentiality 2. Integrity 3. Availability