Cyberwarfare Flashcards

1
Q

What is cyber resilience?

A

Ability to continuously deliver the intended outcome despite adverse cyber events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What kind of approaches can we take to assess cyber resilience?

A

Metrics-based, model-based, and tiered based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What tools are developed in a metrics-based approach of assessing cyber resilience?

A
  1. Individual Metrics
  2. Indicies
  3. Dashboards
  4. Decision Analytics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What tools are developed in a model-based approach of assessing cyber resilience?

A
  1. Process
  2. Statistical / Bayesian
  3. Networks
  4. Game-theoretical
  5. Similations / Agent Based
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does the resilience tiered approach work?

A

There are three tiers (from top to bottom): tier 1, tier 2, and tier 3. If we go down this ladder, there is an increase in model complexity data needs, but going up the ladder decreases resource capital expenditures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does accountability consist of?

A
  1. Design and maintain cybersecurity strategy
  2. Define and maintain cyber resilience requirements
  3. Assess Cybersecurity compliance
  4. Evangelize Cybersecurity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Cyberwarfare?

A

Cyber warfare is any intended to compel an opponent to fulfil our national will, executed against the software controlling processes within an opponent system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are cyberwarfare strategies?

A
  1. Attain and maintain cyber superiority and cyber interdiction of kinetic operations
  2. Concentrate on neutralising enemy cyberattack and cyber reconnaissance capabilities, followed by suppressing enemy cyber defenses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the cyberwarfare ethical principles?

A
  1. Justified and overridable use
  2. Just and transparent systems and processes
  3. Human moral responsibility
  4. Meaningful human control
  5. Reliable AI systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the assumption in the Cyber Routing Activity Theory?

A

Crime can be committed by anyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of crypto-currencies in ransom?

A
  1. Advanced
  2. Anonymity
  3. More widely accepted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the ransomware dilemma’s?

A
  1. Backup
  2. Threat Intelligence
  3. Insurance
  4. Financial exposure
  5. Legal implications
  6. Negotiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly