Q1 NATIONALS Flashcards

1
Q

Ukrainian power network

A
  • cyber attack in 2015
  • caused power outages for several hours
  • “ransom ware” –software designed to block user’s access to data, sometimes by encrypting it– infection that affected many hospitals in the U.K. I’m late 2016
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples of hacking US

A

Theft data on the F-35 joint strike fighter, the F-22 raptor fighter jet, and the MV-22 osprey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does hacking the US help opponents

A
  • Reduces cost
  • accelerates their weapon systems development programs
  • undermines US military, technological, and commercial advantage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the psychological consequences of cypher threats

A

Distort perceptions of the targeted victim and other audiences through the anonymous delivery of manipulative content that seeks to gain influence or foment confusion distrust
Information taken through cyber espionage can be leaked intact or selectively altered in content
For example Russian actors have seeded falsified information into social media and news feeds and websites in order to sow downy and confusion, erode father in democratic institutions, and attempt to protest western governments as inherently corrupted or dysfunctional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

China-Us bilateral joint statement

A

In 2014 china and us made a joint statement, affirming that no country should conduct or support cyber-enabled theft of intellectual property with the intent of providing competitive advantages to companies or commercial sectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cyber warfare

A

As of late 2016 more than 30 nations are developing offensive cyber attack capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Russia

A

Poses a major threat to US government military, diplomatic, commercial, -‘d critical infrastructure
Russian intelligence actors have masqueraded as third parties, hiding behind false online personals design to cause the victims to misattribute the source of the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

China

A

Beijing continues to conduct cyber espionage against the US Government, our allies and US companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Terrorist

A

Terri sit groups- Al-Qa’ida, hizballah, HAMA, and Islamic state of Iraq and the Levant– continue to use the internet to collect intelligence, coordinate operations, raise fund, spread propaganda, and invite action.
Groups like the Taliban also use internet-based technology for similar purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cyber threats

A

Cyber threats has become increasingly diverse, sophisticated, and dangerous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly