StudyGuide Flashcards

1
Q

Name the three components to the collection of resources known as the World Wide Web distinguished by the way that the resources are accessed and indexed.

A

HTML, HTTP, URLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define the visible web

A

Is a collection of resources accessible through HTTP and compatible protocols with index search engines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define the deep web

A

Is a invisible result: its inaccessibility by search engines, and its a part internet that is not indexed by search engines. (Normally behind paywalls)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define the Dark Web

A

Designed to be conceal from search engines and casual web uses (only through anonymity) services such as Tor or I2P

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name one dark web domain

A

.onion or .garlic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name 2 Dark Web services

A

TOR ( TORPROJECT.ORG)
I2P

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What was the motivation behind the dark web?

A

COMPLETE Anonymization of information exchange on internet (encryption: sender/servers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List two uses of the dark net that you find acceptable

A

Anonymity and untraceable location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the two technologies were critical to the operation of Silk Road

A

Tor and bitcoin technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is principle of dumb pipe?

A

Network providers provide equal access and pricing to all content providers and customers without regard to the nature of that content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is “fait-based approach” to net neutraility”?

A

The ability of broadband providers to self-regulate and maintain an open and neutral internet without the need for extensive government regulations.
- No bandwidth throttling
- No preferential allocation of bandwidth
- No Traffic shaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is evidence that there were cases of “broadband providers blocking customers from accessing the content, application or service of their choice?”

A

Many Cases:
T-Mobile Binge On (2015) - Throttling: reduce bandwidth resolution

Comcast and Bit Torrent (2007- US broadband p2p)

Verizon and Throttling fire Deportment (OIO)

AT&T and Facetime (unlimited data plans)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three prohibition listed in the 2010 FCC Open Internet Order

A

No blocking,
No unreasonable Discrimination,
Transparency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the real reason behind broadband providers opposition to Net Neutrality as the FCC defines it.

A

Interferes with the ability of broadband providers to maximize corporate profits and for this reason faces strong opposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How did the FCC change the regulations of broadband providers in 2015?

A

Reclassification as Title II Service Providers:

Net Neutrality Rules: No blocking, no paid prioritization, Transparency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is regulatory capture?

A

Government regulatory agency, originally established to act in the public interest and regulate industries, ends up being heavily influenced or controlled by the industries or companies it is supposed to oversee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List 1 research focus that seem reasonable to you?

A
  • Impact of Neoliberalism on Internet Policies
  • Media and Public Perception of Net Neutrality
  • Historical Analysis of Internet Regulation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What was the government position on the merit of Project Truthy?

A

The NSF and government support weren’t in a position to detriment the “truth” of Project Truthy, though FCC chairman Ajit Pai and Fox News used deception and misinformation to fuel tribalism. (CHECK IT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____ target of the alleged recent Russian hack on our election infrastructure?

A

A developer - who was selling software about voting machine hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Is the greater threat to the integrity of the US electron system foreign or domestic?

A

domestically is more potential as threat of election interference than foreign entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

According to political scientist Dov Levin which country has interfered with the most national elections over the past 50 years.

A

USA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

According to political scientist Dov Levin, the US and USSR/Russia interfered with what percentage of the 937 competitive national elections between 1946 and 2000?

A

117

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Where did the Russians find the greatest impact in the 2016 election?

A

Trolling, Fake news/(misinformation campaigns)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the “Fake News phenomenon?

A

The widespread dissemination of false or misleading information presented as legitimate news

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Provide 2 of the 3 examples of governmental use of propaganda to control global and domestic public over the past century given in the articles

A

Radio Free Europe (RFE)
Radio Library (RL)
China 50 cent party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

According to the author, which country perfected the art of “misinformation campaigns.

A

USA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How many ports are potentially accessible on a modern computer?

A

131,072

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What ports are associated with legacy NetBios API?

A

135, 137-139

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the terms that IANA uses to refer to the following port ranges? 1)_________________
0-1023

A

Well Known

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

_________________1024-49151

A

Registered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

_________________49152-65535

A

Dynamic/ or Private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

(T / F) IANA approves ports based on the application and intended use

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

(T / F) IANA does not endorse the use of a port or service even if the application is approved.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

(T / F) There is little or no control over the use of a registered port

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

(T / F) Registered ports are controlled by IANA whereas unregistered ports aren’t

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

(T / F) Port 445 is associated with Windows NetBios API

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

(T / F) NetBios and SMB can be disabled in the Windows Registry

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

(T / F) NetBios and SMB can be unbound from the network interface

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

(T / F) NetBios and SMB can be blocked at a network firewall.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

(T / F) ports 135-139 are never used on Unix computers.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

(T/F) Telnet and FTP services are relatively harmless so their ports should be left open.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the popular netizen refrain regarding trolling?

A

“Don’t feed the trolls”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

How does the article define “online trolling”?

A

Practice of anonymously interrupting normal and customary information exchange in order to lure the recipient not reacting to the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

How is online trolling different from other interference technologies like signal jamming, network blocking, network filtering, etc.?

A

Attempts to either engage or inflame the receiver, usually through misinformation, lies, distortions, and so on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is one of the main goals of trolling?

A

provoke a reaction and manipulate opinions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Trolling is a part of the Internet’s ________________ space.

A

negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

List two examples of pedestrian online trolling

A
  • Shit posting
  • hit and run posting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Define kakistocracy

A

Rules by the least competent, corrupt and mortally unfit individuals (worst or least qualified to govern)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Define pathocracy

A

Rule of individuals with personality disorder, psychopaths’ and narcissists: (leading authoritarian or destructive governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

List five different types of trolling defined in the article:

A

1) Ad hominem Trolling:

2) Nuisance Trolling:

3) Provocation trolling

4) Snag trolling

5) Proxy Trolling:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Why is online trolling so effective at manipulating public opinion?

A

Very Easy to escape undetected and can cause emotional manipulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

List and explain the 4 categories of trolling stimulus & response.

A

1) ~TROLL/~TROLL (ordinary exchange):

2) ~TROLL/TROLL (troll/trollop insertion):

3) TROLL/~TROLL (sucker/victim):

4) ROLL/TROLL (troll warfare):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is the definition of a phishing attack used in the article?

A

Attempt to get people to click on information/website by acting as a trust-worth agent

54
Q

What is the most common tactic used in phishing?

A

unauthorized (victim) bank, Emails- reveal won a prize

55
Q

According to the article, phishing is a subset of two larger problems. What are they?

A

Social engineering
Identify theft

56
Q

According to the article, phishing shares many characteristics with two similar techniques. Describe them?

A
  • Pharming
  • Abuse of alternate data streams.
57
Q

In what year did the first phishing attack take place?

A

January 1996

58
Q

What are the basic strategies (minimum requirements) of effective phishing according to the article?

A

bulk mailing tool,

standard email,

ghost (fake) website

database of email addresses

59
Q

Here are five telltale signs of a phishing attack in the HTML fragment below that were discussed in class. List and briefly explain three of them.

“<x-html></x-html>

<html><p><font><a><map><area></area></map><img></img></a></a></font></p>
<p><font>Barbie Harley Davidson in 1803 in 1951
AVI </x-html>”
</font></p></html>

A

1) “href=http://218.1.73.124/…/e3b/></map><img” implies and insecure connection theres also “dots of laziness.”

2) SRC=cid:part1.04050500.04030901@support_id_314202457@ebay.com email is part of a html code rather than being separate

3) “color = “#FFFFF3”” font is completely white to blend with the background

60
Q

The article discussed several URL obfuscation techniques. List 3.

A
  • URL Shortening Service: bitly or TnyUrl
  • Subdomain Spoofing: mimic legit domains
    Unicode/
  • homograph attack: Change letter to different ex) “bаnk.com” with a Cyrillic “а” instead latin.
61
Q

List three examples of non-standard URL representations

A

(domain name)

(ip address)

(dotted octal)

62
Q

Give an example of a Unicode URL exploit

A

get a real url → changes what the pc sees → goes to the fake website

Enter url: www.trustsite.com
pc goes: fakesite.com/fakepage.html

63
Q

Give an example of how HTML can be used to conceal a URL:

A

Utilizing the anchor <a> tag’s attributes, specifically the “href” attribute:</a>

<a>Click here to claim your prize!</a>

64
Q

Give an example of how a numeric domain tail may be used to give the appearance of a legitimate URL or an actual IP address:

A
  • name spoofing with unicode

A: https://www.paypal-192.168.1.1.com

65
Q

Give an example how bogus authentication may be used to obscure an actual URL

A

Bogus authentication is a technique used by malicious actors to trick users into revealing their credentials or personal information by creating fake login screens that appear legitimate.
*********
Subject: Urgent: Action Required - Account Verification

Dear [User],
We have noticed suspicious activity on your account. To secure your account, please click the following link and verify your identity.
[Verify Your Account]

https://www.bankingservices-secure.com/login
Thank you for choosing [Bank Name].

Sincerely,
[Bank Name] Support
———————————————————————-
When you hover your mouse over the link, you see that the URL displayed in the status bar is indeed www.yourbank.com/verify, reinforcing the appearance of authenticity.
However, in reality, the link doesn’t lead to your bank’s website. Instead, it directs you to a malicious website controlled by the attacker

66
Q

What data was leaked in the Equifax breach?

A

personal data

67
Q

What was the nature of the vulnerability in the Equifax hack?

A

vulnerability in the Apache Struts Server software

68
Q

What was the specific attack vector?

A

The parser had incorrect exception handling during file uploads

69
Q

According to Forbes Magazine, what penalties did the CEO of Equifax receive from the Board of Directors?

A

A “forced” retirement with a $90 million dollar payout

70
Q

To what extent was information about the Struts vulnerability known before the attack?

A

very well known, was announced earlier in March: By many major security-breach reporting sites.

71
Q

Was Equifax aware that a patch was available for the Struts vulnerability? If so how much time did they delay in applying the patch?

A

They were aware since March 8 2017, but didn’t apply it for THREE months

72
Q

What was the educational and training background of the Equifax CIO?

A

Degree in Russian History

73
Q

viii. What was the education and training background of the Equifax CISO?

A

Degree in Music Composition

74
Q

Describe the “too big to fail era”?

A

when a company is so large their failure would hurt the economy: So, they must be supported by the government when facing failure

75
Q

Are credit reporting companies held liable for data loss?

A

No

76
Q

What was the “payload” of the SCDOR hack?

A

Email phish bait containing a link to online malware

77
Q

Why was there no Computer Information Security Officer overlooking the Department of Revenue’s security practices.

A

They felt that the $100,000 salary was too expensive

78
Q

(T / F) The SCDOR hack used 33 unique pieces of malware and data management utilities

A

T

79
Q

(T / F) According to the FBI, the perpetrators of the SCDOR hack were the Chinese

A

F

80
Q

Was the Sony hack “one of the most vicious and malicious cyberattacks that we’ve known certainly in recent history”

A

no,
It doesn’t even qualify for second or third tiered echelons of cyber attacks.

81
Q

What did FBI Director James Comey offer in terms of justification of his accusation?

A

Regarding how he knew it was North Korea, he said “Trust me.”

82
Q

Has there been any confirmable evidence offered by the government that identifies the source of the hack?

A

No

83
Q

(Fill in the blank) “humans tend to be _________________________ in that they search for the simplest explanation of events consistent with their disposition, biases, and world view.”

A

Cognitive misers

84
Q

Name three sources that state sponsors may use to obtain cyber weaponry

A

State sponsored agencies,

Multimillion dollar greyware market

individual hackers

85
Q

When people try to attribute some crime/hack/attack/etc. to someone else, the first principle should be what?

A

Cui bono - (“what agendas are hidden?”)

86
Q

(T / F) In general claims of cyber attribution are testable and repeatable?

A

F

87
Q

(T / F) Evidence used for cyber attribution have to abide by the rules of evidence

A

F

88
Q

Which of the following would be considered totally reliable network forensic data:
{IP address, MAC address}

A

None , both can be spoofed

89
Q

Is it possible that a forensic investigator might have biometric evidence of a cybercrime
conducted by a skilled cyberwarrior? Is it likely?

A

It is possible, but not likely

90
Q

The Payeck GPS starter interrupt system is used for what purpose?

A

Financing and used car dealerships can immobilize the car if payments become delinquent

91
Q

The label that the author uses to describe the irrational belief in the security of a computing/network system that was not build around a robust security model.

A

Faith-based security

92
Q

What vehicle telematics component was exploited by the FBI in operation G-Sting?

A

OnStar

93
Q

Why did the Ninth Circuit Court rule that the Operation G-Sting convictions were illegal?

A

Tampering with OnStar violated the OnStar terms of service

94
Q

What type of computer appliances are “never optimal for security-sensitive applications?”

A

RF (Radio Frequency)

95
Q

What is the name of the tool developed by Samy Kamkar to run replay attacks against keyless entry systems?

A

OwnStar

96
Q

(T / F) The use of rolling code algorithms defeat replay attacks against keyless entry systems.

A

T

97
Q

What is Samy Kamkar’s program that offers replay attacks for RF based keyless entry systems
that use rolling codes?

A

RollJam

98
Q

What information is in principle accessible to Black Box OBD devices?

A

Accelerometer, Speed, GPS

99
Q

Which is more vulnerable to hacking, a modern mobile phone or an modern automobile’s computer system?

A

Automobile’s computer system

100
Q

What is the definition of 911 swatting given in the article?

A

“911 swatting,” is a malicious act that involves making fraudulent 911 calls to cause emergency response teams,

101
Q

The article gives 7 examples of 911 swatting. List 3 of them:

A

Celebrity’s swatting

Gamer swatting(targeting)

Hate swatting/ mean-spirted attacks

102
Q

What is the definition of “criminal doxing” given in the article?

A

the act of maliciously revealing or publishing private and sensitive information about individuals (doxing) with harmful intent, potentially leading to criminal charges.

103
Q

At the time of writing, how was 911 swatting typically prosecuted?

A

No federal statue, but state can range from misdemeanors to felonies based on incident.

104
Q

In terms of ambiguous federal statutes, 911 swatting is similar to what other crime?

A

Domestic terrorism: “Hoax bomb threats whether true or false”

105
Q

At what layer of the TCP/IP protocol does the “magic” of VoIP take place according to the article?

A

application layer of the TCP/IP protocol stack.

106
Q

The article discusses 3 differences between VoIP and most other packet-based applications within the TCP/IP protocol suite. List 2 of them.

A

1) VoIP is vulnerable to spoofing, involving the manipulation of inauthentic caller IDs.

2) VoIP can be used for toll fraud because it’s a revenue-based service.

107
Q

The author mentions some major deficiencies in the Truth in Caller ID Act of 2009. Name one.

A

it focuses on the intent of the source rather than the activity.

108
Q

What were the two rules introduced by the FCC to enable law enforcement agencies to identify the source of 911 calls that took effect in 2020?

A

Kari’s Law and RAY BAUM’S Act (CHECK- LOOKUP)

109
Q

What federal statutes relate to 911 swatting and doxing?

A

Kari’s Law and the Repack Airwaves Yielding Better Access (RAY BAUM’S)

110
Q

What is an air gap?

A

A network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecure networks, such as the internet or an unsecured LAN.

111
Q

What was Operation Olympic Games/Stuxnet?

A

Cyberattack against Iranian uranium enrichment facility at Natanz

112
Q

What exactly did OOG/Stuxnet do?

A

Stuxnet caused damage to Iran’s nuclear program.

113
Q

How did the OOG/Stuxnet attackers cross the air gap?

A

By using a Flame platform Autorun exploit through infected USB drives, which were carried to the Natanz facility and inserted into network computers.

114
Q

Topic: Farewell to Air Gaps
What injection strategies were used?

A

The initial v0.5 injection was accomplished using a Flame platform Autorun exploit through infected USB drives

115
Q

What was the flaw in the Windows Icon Handler within the Windows shell?

A

Windows shell incorrectly parses of .LNK files.

116
Q

Have air gaps ever been an effective deterrent to protecting LAN-based computers?

A

No

117
Q

What implications does OOG/Stuxnet have for IoT? For critical infrastructures?

A

The exploit potential of the Stuxnet family of malware extends to virtually the entire global infrastructure.

Also, critical infrastructures were built around a weak security model; they were built around no security model.

118
Q

What is a zero-day exploit?

A

An exploitation of a software or hardware vulnerability before a developer has the opportunity to patch the vulnerability.

119
Q

Who is the big player in the gray market in cyber-weapons?

A

The NSA

120
Q

What is the US Government’s System Vulnerabilities Equities Policy and Process document?

A

It outlines what the government does when it discovers or purchases malware that could affect the privacy and security of its citizens.

121
Q

What is the approximate going rate for a zero-day exploit?

A

$50,000 to $100,000

122
Q

What is representative money?

A

A guarantee by the issuer that the money may be used as legal tender in its jurisdiction.

123
Q

What is fractional-reserve banking?

A

System in which only a fraction of the deposits in a bank is kept on hand, or in reserve; the remainder is lend.

124
Q

What is money laundering?

A

illegally obtained money, making it appear as if it comes from legitimate sources.

125
Q

Give two examples of a money service business

A
  1. Western Union
  2. Check Cashing Services
126
Q

List two types of traditional money exchange

A
  1. Bank Account
  2. Money Service Business
127
Q

List two types of non-traditional money exchange systems used in money laundering

A
  1. Charities
  2. Hawala Networks
128
Q

What did the so-called Holder Memorandum outline?

A

Collateral Consequences Doctrine; noncriminal settlements like deferred prosecution have become the default for banks that are “too big to jail”

129
Q

The article claims that correspondent accounts, bearer shares, tax havens are inherently criminogenic. What does this mean?

A

It means that these things can lead to crime; they are golden opportunities for future money launderers.

130
Q

Bitcoin, Litecoin, and Peercoin are examples of ____________________________

A

Cryptocurrencies

131
Q

__________ According to the IRS, the domestic US “tax gap” in 2013? Was:

(a) $100million, (b) $1 billion, (c) $450 billion, (d) $1 trillion ??

A

$450 Billion

132
Q

IP/TCP EXAMPLE

4500 0030 df3c 4005 8006 633f d544 d587
e4dd 47a4 0b64 0015 48f3 05b1 0000 0000
7002 2000 50b6 0000 0204 05b4 0101 0402

A

Fill out the following information:
What is the IP version number?

What is the IP packet header length?

What type-of-service flags are set?

What is the total length of the packet?

What is the ID number?

What IP flags are set?

What is the offset of this fragment?

What is the TTL value?

What is the embedded protocol?

What is the header checksum?

What is the SRC IPaddress?

What is the DST IP address?

What is the SRC port of the embedded header?

What is the DST port of the embedded header?

What is the sequence number?

What is the acknowledgement number?

What is the header length (offset)?

What flags are set?

What is the window size?

What is the checksum?

Is there a value for the urgent pointer?