107: Cyber Security Flashcards
(15 cards)
107.2a
Define Certification
evaluation of security features
107.2b
Define Accreditation
process in which certification of competency, authority, and credibility is presented
107.2e
Define ATO
Authority To Operate (ATO)
official management decision to operate an Information System (IS)
may be issued for up to 3 years
107.2f
Define IATO
Interim Authority to Operate (IATO)
limited authorization to operate under specific terms and conditions
107.4
Discuss risk management
the process that balances operational and economic costs of protective measures to achieve mission capability
effective risk management reduces risk assumed by all systems to an acceptable level for operational use
107.5a
Describe the confidentiality attribute of cybersecurity
assurance of no unauthorized disclosure of information
107.5b
Describe the integrity attribute of cybersecurity
protection against unauthorized modification or destruction of information
107.5c
Describe the availability attribute of cybersecurity
timely, reliable access to data and information systems for authorized users
107.5d
Describe the Non-repudiation attribute of cybersecurity
proof of data delivery & proof of sender’s identity
107.5e
Describe the Authentication attribute of cybersecurity
assurance of user identity & established validity of a transmission
107.8f
Define Patch
a fix for a vulnerability or an operational enhancement
107.10
Explain the difference between vulnerability and threat
a vulnerability is a weakness; a threat is a possible exploiter of a weakness
107.11
State the duties and responsibilites of the ISSM and ISSO
Information System Security Manager & Officer
Manager: principal advisor on all matters involving IS security
Officer: Supports the ISSM and manages IS configurations
** NIOC Pacific Feb2025 ISSO - Chief Johnson
107.13
Discuss the role and responsibilities of Navy Red and Blue teams
Navy Red does penetration testing of systems and networks to find vulnerabilities (increases offense)
Navy Blue does system hardening of systems and networks (increases defense)
107.15
Explain what constitues PII and the importance of safeguarding
Personally Identifiable Information
any information that could potentially identify a specific person