Cyberspace Fundamentals Flashcards
List two pieces of information used for targeting in the LNL
IP Adress
Port
Three key considerations for cyberspace operations
Payload is the capability that performs action on the target
Vulnerability is the weakness of the target
Access is the physical connection
Describe 3 classes of payload
Exploit (gain access)
Persistence (maintain access)
Actions on objective (effects)
List the four vulnerability classes and give an example of each
Technical- software flaws
Human factor- social engineering, insider threat
Misconfiguration- guest account unsecure
Supply chain- malicious hardware/ software introduced
Describe how data is moved within the logical network layer
Data is segregated into packets then moved between networks