Chapter 2 Flashcards
Formal declaration by a designated accrediting authority (DAA) or principal accrediting authority (PAA) that an information system is approved to operate at an acceptable level of risk, based on the implementation of an approved set of technical, managerial, and procedural safeguards.
Accreditation
Identifies the information resources covered by an accreditation decision, as distinguished from separately accredited information resources that are interconnected or with which information is exchanged via messaging.
Accreditation Boundary
For the purposes of identifying the protection level for confidentiality of a system to be accredited, the system has a conceptual boundary that extends to all intended users of the system, both directly and indirectly connected, who receive output from the system.
Accreditation Boundary
Product comprised of a system security plan (SSP) and a report documenting the basis for the accreditation decision.
Accreditation Package
The designated accrediting authority (DAA)
Accrediting Authority
An attack on the authentication protocol where the attack transmits data to a claimant, credential service provider, verifier, or relaying party.
Active Attack
Examples of this attack include MitM, impersonation, and session hijacking.
Active Attack
An adversary with sophisticated levels of expertise and significant resources who is able to use multiple different attack vectors (e,g., cyber, physical, and deception) to achieve its objectives.
APT
Its objectives are typically to establish and extend footholds within the information technology infrastructure of organizations in order to continually exfiltrate information and/or to undermine or impede critical aspects of a mission, program, or organization, or place itself in a position to do so in the future.
APT
Pursues its objectives repeatedly over an extended period of time, adapting to a defender’s efforts to resist it, and with determination to maintain the level of interaction needed to execute its objectives.
APT
Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
Adversary
Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.
Attack
A branching hierarchical data structure that represents a set of potential approaches to achieving an event in which system security is penetrated or compromised in a specific way.
Attack Tree
Ensuring timely and reliable access to and use of information.
Availability
Timely, reliable access to data and information services for authorized users.
Availability
The group responsible for defending an enterprise’s use of information systems by maintaining its security posture against a group of mock attackers.
Blue Team
Must defend against real or simulated attacks (i) over a significant period of time, (ii) in a representative operational context (e.g., as part of an operational exercise), and (iii) according to rules established and monitored with the help of a neutral group refereeing the simulation or exercise.
Blue Team
A security control that is inherited by one or more organizational information systems.
Common Control
An organizational official responsible for the development, implementation, assessment, and monitoring of common controls.
Common Control Provider
The security controls employed in lieu of the recommended controls in the security control baselines described in NIST SP 800-53 and CNSS Instruction 1253 that provide equivalent or comparable protection for an information system or organization.
Compensating Security Control
Disclosure to information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred.
Compromise
Disclosure of classified data to persons not authorized to receive that data.
Compromise
A violation of the security policy of a system such that an unauthorized disclosure, modification, or destruction of sensitive information has occurred.
Compromise
Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
Confidentiality
Process of controlling modifications to hardware, firmware, software, and documentation to protect the information system against improper modifications prior to, during, and after system implementation.
Configuration Control
Maintaining ongoing awareness to support organizational risk decisions.
Continuous Monitoring
Actions, devices, procedures, techniques, or other measures that reduce the vulnerability of an information system.
Countermeasures
A time-phased or situation-dependent combination of risk response measures.
Course of Action (COA)
Actions taken through the use of an information system or network that result in an actual or potentially adverse effect on an information system, network, and/or the information residing therein.
Cyber Incident
The prevention of authorized access to resources or the delaying of time-critical operations.
Denial of Service (DOS)
An organization with a defined mission/goal and a defined boundary, using information systems to execute that mission, and with responsibility for managing its own risk and performance.
Enterprise
May consist of all or some of the following business aspects: acquisition, program management, financial management, human resources, security, and information systems, information, and mission management.
Enterprise
A strategic asset baseline that defines the mission, the information necessary to perform them mission, and the transitional process for implementing new technologies in response to changing mission needs.
Enterprise Architecture (EA)
Includes a baseline architecture, target architecture, and sequencing plan.
Enterprise Architecture
The methods and processes used by an enterprise to manage risks to its mission and to establish the trust necessary for the enterprise to support shared missions.
Enterprise Risk Management
Involves the identification of mission dependencies on enterprise capabilities, the identification and prioritization of risks due to defined threats, the implementation of countermeasures to provide both a static risk posture and an effective dynamic response to active threats; and it assesses enterprise performance against threats and adjusts countermeasures as necessary.
Enterprise Risk Management
An observable occurrence in a network or system.
Event
Unauthorized user who attempts or gains access to an information system.
Hacker
The loss of confidentiality, integrity, or availability that could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, individuals, or the national security interests of the Nation.
High Impact
Causes one or more of the following: (i) causes a severe degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced, (ii) results in major damage to organizational assets, (iii) results in major financial loss, and (iv) results in severe or catastrophic harm to individuals involving loss of life or serious life threating injuries.
High Impact
An information system in which at least one security objective (i.e., confidentiality, integrity, or availability) is assigned a FIPS PUB 199 potential impact value of high.
High-impact System
The effect on organizational operations, organizational assets, individuals, other organizations, or the Nation of a loss of confidentiality, integrity, or availability of information or an information system.
Impact
The magnitude of harm that can be expected to result from the consequences of unauthorized disclosure, unauthorized modification, unauthorized destruction, or loss of information or information system availability.
Impact Level
An occurrence that results in actual or potential jeopardy to the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security policies, or acceptable use policies.
Incident
The mitigation of violations of security policies and recommended practices.
Incident Handling
The mitigation of violations of security practices and recommended practices.
Incident Response
Facts and ideas, which can be represented (encoded) as various forms of data.
Information
Knowledge–e.g., data, instructions–in any medium or form that can be communicated between system entities.
Information
Protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.
Information Security
A process to: (i) define an ISCM strategy, (ii) establish an ISCM program, (iii) implement an ISCM program, (iv) analyze data and report findings, (v) respond to findings, and (vi) review and update the ISCM strategy and program.
Information Security Continuous Monitoring (ISCM) Process
The risk to organizational operations, organizational assets, individuals, other organizations, and the Nation due to the potential for unauthorized access, use, disclosure, disruption, modification, or destruction of information and/or information systems.
Information Security Risk
A qualitative measure of the importance of the information based upon factors such as the level of robustness of the information assurance (IA) controls allocated to the protection of information.
Information Value
A security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system or resource without having authorization to do so.
Intrusion
Causes one or more of the following: (i) causes a degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is noticeably reduced, (ii) results in minor damage to organizational assets, (iii) results in minor financial loss, and (iv) results in minor harm to individuals.
Low Impact
The loss of confidentiality, integrity, or availability that could be expected to have a limited adverse effect on organizational operations, organizational assets, individuals, or the national security interests of the Nation.
Low Impact
Elements of organizations describing mission areas, common/shared business services, and organization-wide services.
Mission/Business Segment
Can be identified with one or more information systems that collectively support a mission/business process.
Mission/Business Segment
Causes one or more of the following: (i) causes a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced, (ii) results in significant damage to organizational assets, (iii) results in significant financial loss, and (iv) results in significant harm to individuals that does not involve loss of life or serious life-threatening injuries.
Moderate Impact
The loss of confidentiality, integrity, or availability that could be expected to have a serious adverse effect on organizational operations, organizational assets, individuals, or the national security interests of the Nation.
Moderate Impact
An information system in which at least one security objective (i.e., confidentiality, integrity, or availability) is assigned a FIPS PUB 199 potential impact value of moderate and no security objective is assigned a FIPS PUB 199 potential impact value of high.
Moderate-impact System
An attack that does not alter systems or data.
Passive Attack
The loss of confidentiality, integrity, or availability that could be expected to have a limited (low), serious (moderate), or a severe or catastrophic (high) adverse effect on organizational operations, organizational assets, or individuals.
Potential Impact
A right granted to an individual, program, or process.
Privilege
A group of people authorized an organized to emulate potential adversary’s attack or exploitation capabilities against an enterprise’s security posture.
Red Team
Objective is to improve enterprise cybersecurity by demonstrating the impacts to successful attacks and by demonstrating what works for defenders (i.e., Blue Team) in an operational environment.
Red Team
The act or mitigating a vulnerability or a threat.
Remediation
Portion of risk remaining after security measures have been applied.
Residual Risk
A measure of the extent to which an entity is threatened by a potential circumstance or event.
Risk