IR Cyber Flashcards

?
What does DDOS mean
Distributed Denial of Service
1 of 35
What did the cyber strikes disable in Estonia?
media outlets, state services and broadcasting companies
2 of 35
On the 10th May, what did the the incumbent defence minister consider the attack to be?
A national emergency
3 of 35
Name of incumbent Estonian defence minister?
Jaak Aaviksoo
4 of 35
What did Jaak Aaviksoo refer to the effective blockade of Estonia as?
An infoblockade
5 of 35
Which votes had the Russian state allegedly interfere with?
Brexit referendum, French presidential elections and, most infamously – the election of Donald Trump
6 of 35
Which US institutions was "confident" in its accusation that the Russian state formally and illegally interfered with the US elections through DNC hacking?
US Department of Homeland Security
7 of 35
What did the Russians hack during the US election?
Democratic National Committee’s email and communication outlets
8 of 35
Why did the US Department of Homeland Security beleive it to be Russia?
“…only Russia’s senior-most officials could have authorized these activities”
9 of 35
In what year did a congressional advisory group identify China’s cyber-espionage capability as "the single greatest risk to the security of American technologies,"
2007
10 of 35
What are the Chinese infamous for hacking?
prolific offenders in the theft of intellectual property, ranging from scientific to military targets.
11 of 35
What was the name of the most famous Chinese hacking scandel in recent years?
‘Titan Rain’
12 of 35
Who did 'Titan Rain' strike?
US Défense Intelligence Agency and UK Ministry of Defence
13 of 35
Since what year had the Chinese been attacking the US Défense Intelligence Agency and UK Ministry of Defence?
2003
14 of 35
In what year did N.Korea hack Sony Entertainment?
2014
15 of 35
Why is it easier for smaller nations to access cyber capabilities?
growing ease of access, understanding and capability makes it an effective offensive capability
16 of 35
What is the name of the former CIA employee who leaked classifed documents detailing the US global survielence program?
Edward Snowden
17 of 35
In what year did Edward Snowden leak the classified documents?
2013
18 of 35
How many classified documents did Edward Snowden leak?
50,000 - 200,000
19 of 35
What was the additional political implication of the Snowden leak?
presenting authorities states such as China as the victims, thus justifying even greater posturing efforts by the Chinese states, creating greater global tension.
20 of 35
Between which years did the Dutch hackers infiltrate the US military systems in Iraq
1990 - 1991
21 of 35
How many military terminals did the Dutch hackers access?
32 terminals - some of which being used directly to coordinate Operation Desert Storm
22 of 35
What infomation did the Dutch hackers gain access to?
files, e-mails, weapon and missile operation systems and information detailing the EXACT locations of US ground forces and naval vessels
23 of 35
What did the Dutch hackers do once they obtained their info?
removed their trace from the system log to cover their hacking
24 of 35
What did the Dutch hackers try to do with their info?
Sell it to the Iraqi forces
25 of 35
Why couldnt the 5 Dutch hackers be arrested?
Hacking was illegal in the Netherlands at the time
26 of 35
Estimated death toll of IS and Boko Haram combined?
55,000+
27 of 35
Why are IS and Boko Haram a threat?
Represent an ideology directly opposed to those around them, regionally and internationally. It is this same ideology which is intent on attacking the core beliefs, values and principles of the states who challenge their illegitimate control
28 of 35
IS and Boko Haram attack examples?
From Charlie Hebdo, the Chibok Kidnappings, to prolonging the civil war in Syria
29 of 35
Obama's quote on nuclear proliferation in his speech to the Nuclear Security Summit in 2016
"Of all the threats to global security and peace, the most dangerous is the proliferation and potential use of nuclear weapons"
30 of 35
Why are nuclear weapons a threat?
Where theres Nukes theres a threat = threat of miscalculation; Rogue states acquiring
31 of 35
Examples of proliferation treaties?
Numerous START (or Prauge Treaty) which cut nuclear warheads; Nuclear Non-Proliferation Treaty = Signed by 191 states;
32 of 35
What are the two states aiming for nuclear capabilities?
N.Korea and Iran
33 of 35
Results of North Korean missile test on Sunday 13th May
Reached an altitude of 2000km and travelled 700km - able to hit Guam
34 of 35
Why are Iran and N.Korea a nuclear threat?
N.Korea - Going against UN sanctions; Iran = Defying NPT Treaty
35 of 35

Other cards in this set

Card 2

Front

What did the cyber strikes disable in Estonia?

Back

media outlets, state services and broadcasting companies

Card 3

Front

On the 10th May, what did the the incumbent defence minister consider the attack to be?

Back

Preview of the front of card 3

Card 4

Front

Name of incumbent Estonian defence minister?

Back

Preview of the front of card 4

Card 5

Front

What did Jaak Aaviksoo refer to the effective blockade of Estonia as?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Other resources:

See all Other resources »See all International relations resources »