Test 1 Flashcards
Categories of Cyber Crime
People, property and the government
US National cyber strategy (1)
Build and maintain a ready force capable of conducting cyber operations
US National cyber strategy (2)
Defend DOD information networks, secure data, and mitigate risks
US National cyber strategy (3)
Prepare to defend from disruptive or destructive attacks
US National cyber strategy (4)
Build and maintain viable cyber options and plan to use them
US National cyber strategy (5)
Build and maintain robust alliances
What was Robert Morris charged with?
Computer Fraud and Abuse Act
5 Principles for Protecting Data (1)
Take Stock
5 Principles for Protecting Data (2)
Scale Down
5 Principles for Protecting Data (3)
Lock it Up
5 Principles for Protecting Data (4)
Pitch it
5 Principles for Protecting Data (5)
Plan Ahead
LAN
local area network
PAN
personal area network
WAN
wide area network
GAN
global area network
SAN
storage area network
VPN
virtual private network
Router
device that allows the ability to segment a network
Switch
connects various devices to a single network
Hub
connects various computers to a single network
Node
the computer
Edge
the connection between two nodes
Switching
data being transferred over network
Circuit Switching
safe option but slower
Packet Switching
faster but more expensive
HTTP
hyper text transfer protocol