(Test 1) Cyberspace Domain Orientation Flashcards
List the two pieces of information used for targeting in the logical network layer of cyberspace
1) Internet Protocol Address IP
2) Port
List the three key considerations when planning cyberspace operations
Payload: capability that performs the actions on the target
Vulnerability: Weakness in the garget
Access: Physical connection to the target
Describe the three classes of payloads in cyberspace and effects each payload achieves.
Exploit: Gain access
Persistence: Maintain access
Action on obj: Effect
List each of the four vulnerability classes and give an example of each
Technical: Software flaws
Human Factor: Social Engineering or insider threat
Misconfiguration: Guest account unsecured
Supply Chain: Malicious Hardware / software introduced in supply chain