This class was created by Brainscape user Kris Medina. Visit their profile to learn more about the creator.

Decks in this class (30)

Cyber Domain & Pillars of Cyber Security
What is the cyber domain comprise...,
Cyber aspects layers pingd,
Pillars of cyber security ciana
8  cards
Risk
Risk,
Impact,
Vulnerability
9  cards
Computer Architecture
Central processing unit cpu,
Random access memory ram,
Hard drive hdd
5  cards
Policy & Law
Define policy,
Define law,
Computer fraud and abuse act cfaa
8  cards
Digital Data-Bits & Bytes & Files
What is a bit,
What is a number system,
Different kinds of number systems
10  cards
Operating Systems & File Systems
What are some os services 3,
Ways to access services 3,
Describe a gui
5  cards
Web and HTML
What is the world wide web,
Hypertext transfer protocol,
What is the internet
8  cards
Basic Shell Commands
Windows dir,
Unix ls,
Windows cd
21  cards
JavaScript Vulnerabilities
Uss yorktown incident,
Mim 104 patriot incident,
F 22 raptor incident
8  cards
Cyberspace as a Human Domain
Vulnerability of the 2015 swift b...,
Vulnerability of the 2015 opm hack,
Vulnerability of the 2016 dnc hack
16  cards
Client-Side Scripting: Part 1
Static pages,
Dynamic pages,
Two ways to add dynamism
7  cards
Client-Side Scripting: Part 2
What is an element scripting,
What is an attribute,
9  cards
Human Factors
Two kinds of error,
What is a slip,
What is a mistake
7  cards
Server Side Scripting
What is server side scripting,
How does a server side script work,
What is input validation
4  cards
18 - TCP/IP Stack: Intro and Physical Layer
What is a network,
Is the internet a network,
What is a host
14  cards
19 - TCP/IP Stack: Data Link Layer
What does lan stand for,
Describe the lan,
What does wan stand for
10  cards
20 - TCP/IP Stack: Network Layer
What is the network layer,
What is an ip address,
What is a server log
6  cards
21 - TCP/IP Stack: Transport Layer
What is the transport layer,
Two types of messages at the tran...,
What is a port
9  cards
22 - TCP/IP Stack: Application Layer
What is the application layer of ...,
Examples of programs that run thr...,
What does the dynamic host config...
4  cards
23 - Network Security
Define network security,
What are the three key components,
What are the three key components...
8  cards
24 - Wireless Networks
What is the main difference betwe...,
What two layers of the tcp ip sta...,
What is 80211
9  cards
25 - Symmetric Encryption
What is symmetric encryption,
What is symmetric encryption,
What cyber pillar does encryption...
4  cards
26 - Digital Forensics
What is digital forensics,
What are the three stages of digi...,
What is locards exhange principle
3  cards
27 - Asymmetric Encryption
What is asymmetric encryption,
What does a generic key pair cons...,
What two pillars of cybersecurity...
6  cards
Hashing and Passwords
What is hashing,
What are some hashing properties,
What are some common hash functions
9  cards
Notable 12 Week Acronyms
Lan,
Wan,
Mac
12  cards
28 - Cyber Reconnaissance
In order to attack a system you n...,
What are the different barriers t...,
Describe the network barrier
8  cards
29 - Cyber Attack
What is a dos denial of service a...,
What is a ddos distributed denial...,
What is a brute force attack
5  cards
30 - Cyber Defenders
Who are the uss top adversaries,
What four communities make up the...,
What is the command thats in char...
4  cards
31 - Cyber Defense
What are the three general securi...,
Explain least privilege,
How can we execute defense in depth
4  cards

More about
USNA Cyber

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Kris Medina's USNA Cyber flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Cyber Security
  • 19 decks
  • 2726 flashcards
  • 91 learners
Decks: Security Risk Management Srm, Security Assessment And Testing Ant, Software Development Security Dev, And more!
Cyber-Security
  • 23 decks
  • 663 flashcards
  • 409 learners
Decks: Computer Fraud And Abuse, Wireless, Radio Frequency Fundamentals, And more!
Cyber Security
  • 27 decks
  • 612 flashcards
  • 10 learners
Decks: Unit 2 Module 3, Unit 2 Module 4, Unit 3 Module 1, And more!
Cyber Trans
  • 12 decks
  • 809 flashcards
  • 51 learners
Decks: Block 4, Block 5, Block 5 C, And more!
Make Flashcards