“RAM”?
Random Access Memory
“ROM”?
Read Only Memory
Difference in RAM and Storage (as human equivalent)
RAM=short-term memory
Storage=long-term memory
Purpose of IEEE
Creating standards for electronics manufacturing
Complexity principle (re: compromise)
More complicated = less likely
Principle of ‘security’
Security exists only so far as the ability to prevent threats.
Outline Log4j attacks.
Hackers exploiting vulnerability in Java in the back end to access a user’s command line.
What is Catfishing?
-Attacker poses as attractive person online
-Defrauds victim who is now in love with them
Define ‘Advanced Persistent Threat’ (3)
Difference between LAN and WAN.
LAN = Router looks inside to groups of devices;
WAN = LANs connected by Internet Service Providers.
Define ‘Source Code’.
A text listing of commands to be compiled or assembled into an executable program.
Language used to write (most) operating systems.
C
Outline ‘Supply Chain Attack’ (3)
What is a Boolean Operator? (2)
Examples of Boolean Operators (3) and their functions (3).
Search for scissors on Italian websites using Google Dorking.
“scissors” site:.it
Search for A-Level Mathematics Results on the UCAS website only.
“A-level mathematics results” site:ucas.com
Search for cybersecurity, but only for results related to hacking.
“cybersecurity” AND “hacking”
What is a Hazard?
Potential issue that may lead to vulnerability.
What is a Vulnerability?
Actual weaknesses open to exploit.
What is a Risk?
Potential exposure to breach and the impacts of breach.
Give examples of Cybersecurity hazards (3)
Give examples of Cybersecurity (3)
Give examples of things breaches can impact (5)