Final Flashcards

1
Q

Offensive cyber tools

A

Spearfishing, denial of service, ransomware, wiper malware, zero-day exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wiper malware

A

malicious software designed to delete data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

zero-day exploits

A

flaw in software or operating system that can be exploited with no detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Nation-state threats

A

russia, china, iran, and north korea

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

russian criminal and hacking groups

A

DarkSide, REvil, Evil Corp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Russian cyber operators

A

GRU, FSB, SVR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

GRU

A

Russia’s premier military intelligence agency, physical and virtual world operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SVR

A

Russia’s premier foreign intelligence agency, operates with a traditional foreign intelligence focus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

FSB

A

Russia’s premier domestic intelligence agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Executive branch cyber roles and responsibilities

A

Protect and promote, regulate and oversee, detect and disrupt, prosecute and penalize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Protect and promote

A

Department of Homeland Security
Department of State

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Regulate and Oversee

A

Federal Trade Commission
Federal Communications Commission
Department of Commerce
Office of Management and Budget
Election Assistance Commission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Detect and Disrupt

A

DoD (CYBERCOM)
FBI
Intel Community (NSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Prosecute and Penalize

A

Department of Justice
Department of treasury

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(Cyber) Military Options

A

Military, Diplomatic, economic and regulatory, homeland security and law enforcement, state and local government, private sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Classic security concepts

A

Escalation, Retaliation, coercion, deterrence, attribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

U.S. cyber operations doctrine

A

Swift consequences, persistent engagement, defend/hunt forward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ways to address climate change

A

new/improved technology
laws and regulations
economic incentives
social and psychological incentives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

programmable thermostats (PT)

A

technical potential: 10-15% reductions in energy use
No difference in energy use among homes with and without a PT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Behavioral wedge

A

17 types of household actions that don’t require new regulation, could save 123 million metric tons of CO2 per year by 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Behavioral plasticity

A

The proportion of current non-adopters that could potentially be induced to take action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Initiative feasibility

A

the likelihood that a change agent will adopt and then implement a mitigation initiative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

UK Behavioral insights team

A

2010: started in cameron administration as part of gov
2013: partially privatized company with global offices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Social and behavioral sciences team

A

Started by obama white house 2015 (subcommittee of national science and technology council)
Disbanded under Trump (members moved to other gov offices and left for private companies)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Injunctive norms
how people should behave
26
descriptive norms
how people actually behave
27
The boomerang effect example
marked pieces of petrified wood in park
28
The Big Mistake
advocates/policymakers often try to highlight the frequency of bad behavior because they want to fix it
29
climate of silence (not talking about climate change)
only 25% of americans regularly discuss climate change
30
Behavioral spillover
the effects of an intervention on subsequent behaviors not directly targeted by that intervention
31
Negative spillover
threat to behavioral approach, could undermine policy support, may need more exclusive focus on regulatory or price-based approaches s. voluntary approaches
32
positive spillover
virtuous escalator, foot in the door effect, self-perception theory
33
Negative spillover
single action bias, rebound/takeback effects, moral licensing
34
moral hazard
fear that non-mitigation approaches to climate change will undermine support for mitigation
35
risk compensation hypothesis (moral hazard)
learning about geo-engineering/adaptation--> reduces concern about climate change--> reduces support for mitigation
36
Risk salience hypothesis (reverse moral hazard)
learning about geo-engineering/adaptation--> increases awareness/concern about climate change --> increases support for mitigation
37
Technological approaches to climate change
adaptation
38
Adaptation, geoengineering
sea walls/flood prevention Upgrades to electrical grids/air conditioning Agricultural changes (irrigation, changing crops)
39
Geoengineering
solar geo-engineering and carbon dioxide removal
40
solar geoengineering
reflect sunlight/heat back to space
41
Carbon dioxide removal
capture and store atmospheric carbon
42
Measured variables
Mediator, DV, Moderator
43
Mediator
perceived threat of climate change
44
DV
support for climate change mitigation policies
45
Moderator
political ideology
46
policy action
set of conditions seen as a problem definition of problem has emerged and received attention in important public arenas people are calling for action or intervention
47
What is the role of science or research in defining social problems and then in deciding how best to intervene with policy?
Evidence-based policy
48
Evidence-based policy
the development, implementation, and evaluation of effective programs and policies through application of principles of scientific reasoning Evidence= the available body of facts or information indicating whether a belief or proposition is true or valid
49
How does scientific information get to people who make policy decisions?
formal education and training scientific journals media legislative aids and other staff lobbyists social action and advocacy groups expert testimony government research
50
Politics
the process by which groups of people make decisions social relations involving authority or power
51
sources of interpersonal power
legitimate, reward, expert, and referent power
52
legitimate power
formal power or authority
53
Reward power
power to reward others who comply with preferences about decisions and actions
54
Expert power
power comes from expertise/knowledge
55
Referent power
power comes from others wanting to emulate or be loyal to group/individual
56
what are barriers to a strong link between science and policy?
Scientific process limitations scientific results are hard to communicate timing: info not always available when decisions need to be made study results often contradict each other Interpretation of same results can vary Data collection/surveillance systems are designed in ways that value certain types of info over others
57
Goal: Evidence-Based policy
scientists produce high-quality evidence findings are translated and disseminated policymakers use it wisely and appropriately
58
Reality: policy-based evidence
scientist produce high-quality evidence findings are translated and disseminated advocates and policymakers cherry pick results to support agendas; ignore other evidence
59
Policy analysis
client-oriented advice relevant to public decisions and is informed by data/evidence and social values
60
types of policy analysis
prospective policy analysis descriptive policy analysis
61
Prospective policy analysis
also called ex ante, pre hoc, anticipatory - predictive and prescriptive analysis
62
Predictive analysis
projection of future states resulting from adopting particular alternatives
63
Prescriptive analysis
recommends actions because they will bring about a particular result
64
Descriptive policy analysis
also called ex-post, post hoc, retrospective - retrospective analysis and evaluative analysis
65
retrospective analysis
descriptive interpretation of past policies; descriptive focus on what was implemented
66
Evaluative analysis
summative program evaluation; were the purposes of the policy achieved; did the policy have an impact?
67
two main types of prospective policy analysis
policy options analysis policy miscrosimulation models - types of economic analysis - sensitivity analysis
68
Basic steps in policy options analysis
1. Verify, define, detail the problem 2. Establish Evaluation Criteria 3. Identify alternative policies 4. Evaluate alternative policies 5. Distinguish among alternatives 6. Monitor implemented policy
69
Gostin framework
1. significant risk based on objective science 2. Intervention effectiveness by showing reasonable fit between means and ends 3. Economic costs are reasonable when compared with probable benefits 4. Human rights burdens are reasonable when compared with probable benefits 5. Benefits costs and burdens are fairly distributed so that services are provided only when needed and regulatory burdens are imposed only where a risk to community health exists
70
Classic Framework for Policy Options Analysis
1. Establishing the Context: verify/define the problem 2. Establish evaluation criteria 3. Identify alternative policies 4. Evaluate the alternative policy options 5. Distinguish among alternatives 6. Implement and monitor policy
71
4 types of simulation models
Microsimulation discrete event simulation agent-based modeling and simulation system dynamics simulation
72
policy microsimulation models
computer forecasts that attempts to imitate or mimic the operation of gov programs/policies on individual units in the population under different sets of assumptions/interventions
73
cost-benefit analysis
to determine which of alternative interventions, designed to achieve the same or differ4ent objectives, produces the greatest net benefit in terms of money
74
cost-effective analysis
to determine which alternative interventions designed to achieve the same objective; produces the most of desired outcome for a given level of expenditure
75
sensitivity analysis
a test of whether uncertainty about the value of a variable significantly influences the conclusion of an analysis
76
Potential results of a sensitivity analysis
1. Demonstrate that a conclusion depends significantly on a particular assumption 2. Demonstrate that an assumption does not significantly affect a study's conclusion 3.Establish a minimum or maximum value a variable must have for an intervention to appear worthwhile
77
Core pillars of the public sector
economy, efficiency, effectiveness, equity
78
program
an organized response to eliminate or reduce a social problem where the response includes one or more objectives, performance of one or more activities, and the expenditure of resources
79
Policy
A course or principle of action adopted or proposed by a gov, business, or other type of organization
80
program evaluation
the process that leads to judgements about the worth, effectiveness and efficiency of programs and strategies
81
Different types of program evaluation
summative, process evaluation
82
summative evaluation
did the intervention achieve?: - Impact evaluation: mediators along path - Outcome evaluation: end/long-term aims
83
Process evaluation
focuses on implementation of a policy or program (was the policy/program implemented with the quality, content, coverage intended?)
84
Internal validity
the research design allows for assessments about the effects of an intervention without the threat of rival hypotheses or alternative explanations
85
Threats to internal validity
history, maturation, testing, instrumentation, loss to follow up, regression to the mean, differential selection
86
External validity
the ability to generalize the findings of a research study outside of the population included in the research and the specific way in which the research was conducted