Intro to Cyber Security
there are ___ bits in a byte
8
I can get ___ different numbers from 3 bits
8 2 x 2 x 2 000, 001, 011, 111, 010, 100, 110, 101
Standard
A detailed written definition of how software and hardware are to be used
POLICY
A short written statement that defines a course of action that applies to the entire organization
What is the purpose of the CIA Triad?
Balanced Decision Making in Cyber Security
What does the CIA in the CIA Triad stand for?
Confidentiality Integrity Availability
a ____ can provide the fingerprint of a file
Hash
What are the 7 domains of IT infrastructure? (select the correct 7)
LAN-to-WAN Domain User Domain Systems/ Application Domain WAN Domain LAN Domain Work Station Domain Remote Access Domain
Half a byte is a
Nybble
Highest Level Document. It's typically short and you must comply with it
Policy
Must follow this document, unless you document exceptions
Standard
Guideline
Suggested course of action for using the policy, standard, or procedure
A user can easily change their own computer's MAC or IP address.
True
One of the CISSP domains includes Physical Security True or False
True
Common Threats in User Domain
-Lack of user awareness -User apathy toward policies -User violating security policy -User inserting CD/DVD/USB with personal files
What is 255 (Base 10) in binary (show your work)?
1111 1111
What is 11111111 (binary) in decimal (show your work)?
255
an IPv4 address is ____ bytes
4
What is Cybersecurity?
Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
I create a hash of a file with SHA-1. I create a hash of a file with MD-5. These two hashes should be the same because the files are identical.
False
I take a SHA-1 hash of a file. I compress the file using zip. I take a hash of the zip'd file. These two hashes should be the same because the data within the file can be exactly recovered and there is no change to it.
False
the file size of "mary had a little lamb" as a text file will be nearly the same size as "mary had a little lamb" stored as a .doc file (in word).
False
Preferred way of doing things- but you don't have to follow it
Guideline
ipconfig /all can provide both _____ address and ______addresses
MAC address and IP address
What is integrity in Cyber Security?
Maintain valid, uncorrupted, and accurate information. 1. Data is not altered 2. Data is Valid 3. Data is Accurate
Depending on your company culture, you must follow this document (e.g. utilities always follow it / them)
Procedure
What is confidentiality?
Protecting information against unauthorized access and use.
What is availability?
System / data is there when you want it.
CISSP stands for Certified Information System Security Professional True or false?
True
I take the MD-5 hash of a file. I change the name of the file and hash it again. these two hashes will be identical even though the name of the file has been changed.
True
The CIA Triad is included in one of the CISSP Domains True or False
True
The User is the Weakest Domain True or False
True
The total employed in the cyber security workforce is almost 1M! True or False
True
https://haveibeenpwned.com/ can tell me if one of my accounts has been compromised (e.g. user ID and password stolen) True or False
True
https://www.cyberseek.org/heatmap.html can provide information on the types of cyber security jobs available by State! True or False
True
you can hide information in a word document that the word program won't see True or False
True
Procedure
Written instructions for how to use the policy and standard
which of the below DOES NOT describe non-repudiation?
agreement between two people that a third party is in error
What are the 5 pillars of Information Assurance and Security?
non-repudiation Authentication Integrity Availability Confidentiality
Pillars of Information Assurance
◦C- confidentiality ◦I - integrity ◦A- availability ◦N- non-repudiation A- authentication