7.4.2.1.1. Insider Threats Flashcards
What is a server-based, web-accessible program part of the Microsoft Office suite?
SharePoint
How many distinct EIM capabilities does SharePoint offer?
4
EIM
Enterprise Information Management
Which SharePoint workflow requests agreement from all involved parties?
Approval Workflow
How many workflow capabilities are available to you on a SharePoint Server?
3
what is a insider/ internal threat?
Threat originating inside a company, government agency, or institution.
What refers to measures and controls taken to deny unauthorized persons information derived from info systems of the US Government related to national security, and to ensure the authenticity of such info systems?
COMPUSEC
An unauthorized user attempts to gain as much info about the network as possible before launching other more serious types of attacks.
Reconnaissance Attack
An individual attempts to gain unauthorized access of computer resources
Access Attack
Is the unauthorized transfer of data outside an organization and is a significant concern with data leakage.
Data Theft / Data Exfiltration
Anyone who has legitimate access to an organization’s internal resources, but exploits this access for personal gain or damage against the organization.
Malicious Insider
Program that replicates by attaching itself to other programs.
Virus
Malicious programs that are carried to your computer by email.
Email-Borne Viruses
Computer software use to prevent, detect, and remove malicious computer viruses
Antivirus
What is one email virus protection?
Scans email transactions for viruses before forwarding to an SMTP Servers for delivery.
Symantec Mail Security for SMTP
What are some Virus Indicators?
- The computer runs more slowly.
- The computer stops responding or locks up often.
- The computer crashes or restarts every few minutes.
- Applications on the computer don’t work correctly.
- Disks or disk drives are inaccessible.
- Unable to print correctly.
- Unusual error messages.
- Menus and dialog boxes are distorted.
What are some Virus Prevention Methods?
- Ensure all software is included in C&A
- Do not use trial or demo software
- Do not allow use of foreign country software not meeting restrictions laid out by Buy American Act and Trade Agreements Act
- Consult contracting prior to purchase
- Only use antivirus tools and signature files obtained from AFNOC/NSD web site
- Ensure only one type antivirus installed at a time
- Don’t use private media in Gov system
- Scan removable and fixed media
- report all attacks
AF Threat Advisory Roles
Provides development and employment support for network sensors and network defense weapons systems
- Provides computer and network threat awareness, analysis, and intelligence support
- Reports to AFNOC and NOSCs all backdoors and unauthorized connections to AF networks discovered during course of Operations
What cyberspace weapon system ensures unfettered access, mission assurance and joint warfighter use of networks and information processing systems to accomplish worldwide operations?
AF Cyber Command and Control Mission System
What is a program?
Set of instructions that are developed and written to perform a specific set of tasks on a computer system
what is low-level languages?
code that is easily and readily executed by the computer without and assistance from any other program
What is High-level languages?
code must be executed through programs such as interpreters or compilers which translate the code in order for the computing machine to understand and process the inputs from the user.
An interpretive, interactive, and functional array programming language
APL
Is a combination of high level and low level languages that supports procedural, generic, object-oriented programming and data abstraction
C++