Chapter 2 Flashcards
(172 cards)
Formal declaration by a designated accrediting authority (DAA) or principal accrediting authority (PAA) that an information system is approved to operate at an acceptable level of risk, based on the implementation of an approved set of technical, managerial, and procedural safeguards.
Accreditation
Identifies the information resources covered by an accreditation decision, as distinguished from separately accredited information resources that are interconnected or with which information is exchanged via messaging.
Accreditation Boundary
For the purposes of identifying the protection level for confidentiality of a system to be accredited, the system has a conceptual boundary that extends to all intended users of the system, both directly and indirectly connected, who receive output from the system.
Accreditation Boundary
Product comprised of a system security plan (SSP) and a report documenting the basis for the accreditation decision.
Accreditation Package
The designated accrediting authority (DAA)
Accrediting Authority
An attack on the authentication protocol where the attack transmits data to a claimant, credential service provider, verifier, or relaying party.
Active Attack
Examples of this attack include MitM, impersonation, and session hijacking.
Active Attack
An adversary with sophisticated levels of expertise and significant resources who is able to use multiple different attack vectors (e,g., cyber, physical, and deception) to achieve its objectives.
APT
Its objectives are typically to establish and extend footholds within the information technology infrastructure of organizations in order to continually exfiltrate information and/or to undermine or impede critical aspects of a mission, program, or organization, or place itself in a position to do so in the future.
APT
Pursues its objectives repeatedly over an extended period of time, adapting to a defender’s efforts to resist it, and with determination to maintain the level of interaction needed to execute its objectives.
APT
Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
Adversary
Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.
Attack
A branching hierarchical data structure that represents a set of potential approaches to achieving an event in which system security is penetrated or compromised in a specific way.
Attack Tree
Ensuring timely and reliable access to and use of information.
Availability
Timely, reliable access to data and information services for authorized users.
Availability
The group responsible for defending an enterprise’s use of information systems by maintaining its security posture against a group of mock attackers.
Blue Team
Must defend against real or simulated attacks (i) over a significant period of time, (ii) in a representative operational context (e.g., as part of an operational exercise), and (iii) according to rules established and monitored with the help of a neutral group refereeing the simulation or exercise.
Blue Team
A security control that is inherited by one or more organizational information systems.
Common Control
An organizational official responsible for the development, implementation, assessment, and monitoring of common controls.
Common Control Provider
The security controls employed in lieu of the recommended controls in the security control baselines described in NIST SP 800-53 and CNSS Instruction 1253 that provide equivalent or comparable protection for an information system or organization.
Compensating Security Control
Disclosure to information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred.
Compromise
Disclosure of classified data to persons not authorized to receive that data.
Compromise
A violation of the security policy of a system such that an unauthorized disclosure, modification, or destruction of sensitive information has occurred.
Compromise
Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
Confidentiality