Cyberspace Fundamentals Flashcards
1
Q
List two pieces of information used for targeting in the Logical Network Layer of cyberspace.
A
Internet Protocol (IP) & Ports
2
Q
List the three key considerations when planning cyberspace operations.
A
Payload, Vulnerability, and Access (P.V.A)
3
Q
Describe three classes of payloads in cyberspace and the effects each payload achieves.
A
1) Exploit-Gain access
2) Persistence-Maintain Access
3) Actions on Objects-Effects
4
Q
List each of the four vulnerability classes and give an example of each class.
A
1) Technical-Software Flaws
2) Human Factor-Social engineering, insider threat
3) Misconfiguration-guest account unsecure
4) Supply Chain-Malicious hardware/software introduced in supply chain