107 Cyber Security Flashcards

1
Q

Define IA

A

Information Assurance- are measures that protect and defend information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define DCO

A

Defensive cyber operations- passive and active cyberspace operations intended to preserve the ability to utilize friendly cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define OCO

A

Offensive Cyberspace Operations- cyberspace operations intended to project power by force through cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Certification

A

evaluation of the security features of an IS to see if they meet certain security requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accreditation

A

Process where certification on competency, authority, or credibility is presented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NAO

A

Navy Authorizing Official- responsible for authorizing the systems operation based on achieving and maintaining an acceptable risk posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

System Security Plan

A

provides an overview of the security requirements of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ATO

A

Authority to Operate- official decision to authorize the operation of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IATO

A

Interim authority to operate- temporary authorization granted by NAO for an information system based on preliminary results of an evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Configuring Management

A

management of security features and assurances through control of changes to the systems through their lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk Management

A

The process that allows IT managers to balance the operational and economic costs of protective measures and achieve gains in the mission by protecting the IT systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

5 attributes of Cyber Security

A

confidentiality
integrity
availability
non-repudiation
authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

9 categories of computer incidents

A

root level incident
user level incident
denial of service incident
malicious logic incident
unsuccessful activity attempt event
non compliance activity event
reconnaissance event
investigating event
explained anomaly event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DoN World Wide Web security policy

A

everything posted online must be reviewed as to not violate OPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IAVA

A

Information Assurance Vulnerability Alert- addressed severe network vulnerabilities resulting in immediate and sever threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IAVB

A

Information Assurance Vulnerability Bulletin- addresses new vulnerabilities that do not pose an immediate risk

17
Q

CTO

A

Computer Tasking Order- A formal tasking that contains detailed guidance and missions for each component to complete

18
Q

NTD

A

Navy Telecommunications Directive- A widely disseminated naval message detailing directions about a certain IT function that needs to be complied with

19
Q

Service Pack

A

A collection of updates to a software program delivered in the form of a single installable package

20
Q

Patch

A

A fix for a vulnerability or operational enhancement

21
Q

Vulnerability Assessment

A

An examination of the ability of a system to withstand assault

22
Q

Vulnerability VS threat

A

Vulnerability- Weakness in a systems security scheme

Threat- Person, event, or circumstance with potential to cause harm to a system

23
Q

ISSM

A

Information System Security Manager-
The principle advisor on all matters involving the security of an IS under purview

24
Q

ISSO

A

Information System Security Manager-
Supports the ISSM to implement security requirements an mandated NISP and NAO

25
Q

CSWF

A

Cyber Security Work Force

26
Q

CSWF codes

A

Specialties a person is trained for found on TWMS
21-digital forensics
72-ISSO
53- incident response
44- network services

27
Q

Navy Red and Blue Teams

A

Red Team- performs penetration testing of systems/networks to identify vulnerabilities

Blue- performs detection and hardening of systems/networks to preempt attack vectors

28
Q

CCORI

A

Command Cyber Operational Readiness Inspection- Graded event by FLTCYBERCOM every 24 months to evaluate the overall security of a command to include physical technical and administrative

29
Q

Why does the Navy only use “.MIL” email addresses

A

because the DoD has exclusive use of this domain