🔹107 Information Assurance Flashcards

1
Q

🔹5 attributes of IA?

A
– Confidentiality 
– integrity 
– availability 
– non-repudiation
– authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

🔹Define confidentiality

A

Assurance that information is not disclosed to unauthorized individuals, processes or devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

🔹Define Integrity

A

is assurance that information is not modified by unauthorized parties or in an unauthorized manner. Integrity supports the assurance that information is not accidentally or maliciously manipulated, altered or corrupted. Additionally, integrity implies the ability to detect when information has been altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

🔹Define Availability

A

is assurance of timely, reliable access to data and Information systems by authorized users. Availability-focused IA controls protect against degraded capabilities and denial of service conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

🔹Define Non-repudiation

A

Is assurance that the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

🔹Define Authentication

A

Is assurance of the identity of an e-mail message sender or receiver. Authentication supports the validation of e-mail messages and information system access requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

🔹List the 9 categories of computer incidents.

A
1-Root
2-User
3-Unsuccessful Attempt
4-Denial of Service
5-Poor Security
6-Scan/Probe
7-Malicious Logic
8-Investigating
9-Explained Anomaly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

🔹What is the difference between a vulnerability and a threat?

A

Vulnerability - weakness in an IS that could possibly be exploited by a threatening source.
Threat - the potential to adversely affect an IS by unauthorized access, destruction, disclosure, or DoS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

🔹What is an ATO?

A

An ATO is an “Authority To Operate” issued by the DAA or PAA to authorize operation of information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

🔹IAVA

A

IAVA: IA Vulnerability Alerts (IAVA) address severe network vulnerabilities resulting in immediate and potentially severe threats to DON systems and information. Corrective action is of the highest priority due to the severity of the vulnerability risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

🔹IAVB

A

IAVB: Information Assurance Vulnerability Bulletins (IAVB) address new vulnerabilities that do not pose an immediate risk to DON systems, but are significant enough that noncompliance with the corrective action could escalate the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

🔹IAVT

A

IAVT: Information Assurance Vulnerability Technical Advisory: vulnerability notifications (i.e., alerts, bulletins, and technical advisories/notifications) IAW CJCSM 6510.01. USSTRATCOM may direct corrective actions (which may ultimately include disconnection) of any enclave(s), or affected system(s) on the enclave, not in compliance with IAVM program directives and vulnerability response measures (e.g., tasking order or message). USSTRATCOM will coordinate with CC/S/As and field activities to determine operational impact to DOD before instituting disconnection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

🔹What is a service pack?

A

A collection of updates, fixes and/or enhancements to a software program delivered in the form of a single installable package

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

🔹Define IA

A

Information Assurance:

Measures that protect and defend information and information systems thru the 5 attributes of IA. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly