ewfef
Repudiation of Origin
A false denial of an entity sending or creating something
Denial of Receipt
A false denial that an entity receives info
delay
A temporary inhibition of service
Counter intel
Activities done to thwart information from being stolen, gathered, or sabotaged by other people, while also gathering information.
Jamming
Broadcasting a strong signal to override a secure target
Intel
Collected Useful information from within or outside an organization that involves threats to the organizations people, interests, etc.
Spoofing
Cybercriminals use deception to appear as someone they're not in order to penetrate a defense system/scam you and etc.
Ethics are not what?
Feelings, Religion, Law, Norms, and Science
GEOINT
Geospatial Intelligence
HUMINT
Human Intelligence
IMINT
Imagery Intelligence
MASINT
Measurement and Signature Intelligence
OSINT
Open Source Intelligence
SIGINT
Signals intelligence
Tampering
Unauthorized changing of info
Denial of service
a long-term inhibition of service
Snooping and Eavesdropping
collecting info by listening in to nearby conversations without the speakers noticing.
Ethics are what?
standards and practices that are moral and fair
For visual Comms make sure to____
· Be clear with what you are trying to achieve · Only include what important · Consider data ink ratio · Round numbers · Be consistent · List the metric
What are the best ways to communicate using plots/graphs?
· Use color, diagrams, etc. · Readable · Consistency · Be careful of copyright · Spell check · Less words- Bullet points, etc.
What 3 important things do you need to know for Effective Technical Communication? (oral/written)
· What is expected of me? · What is the purpose of this paper/speech? · Who is my audience?