Chapter 4 Flashcards
The official management decision given by a senior organizational official to authorize operation of an information system and to explicitly accept the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation based on the implementation of an agreed-upon set of security controls.
Authorization to Operate (ATO)
Types include quantitative, qualitative, or semi-quantitative.
Assessment Approach
Assessment results produced by the application of an assessment procedure to a security control or control enhancement to achieve an assessment objective; the execution of a determination statement within an assessment procedure by an assessor that results in either a satisfied or other than satisfied condition.
Assessment Findings
One of three types of actions (i.e., examine, interview, test) taken by assessors in obtaining evidence during an assessment.
Assessment Method
The item (i.e., specifications, mechanisms, activities, individuals) upon which an assessment method is applied during an assessment.
Assessment Object
A set of determination statements that expresses the desired outcome for the assessment of a security control or control enhancement.
Assessment Objective
A set of assessment objectives and an associated set of assessment methods and assessment objects.
Assessment Procedure
Grounds for justified confidence that a claim has been or will be achieved.
Assurance
A structured set of arguments and a body of evidence showing that an information system satisfies specific claims with respect to a given quality attribute.
Assurance Case
Independent review and examination of records and activities to assess the adequacy of system controls and ensure compliance with established policies and operational procedures.
Audit
Access privileges granted to a user, program, or process or the act of granting those privileges.
Authorization
All components of an information system to be authorized for operation by an authorizing official; excluding separately authorized systems to which the information system is connected.
Authorization Boundary
A senior (federal) official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the nation.
Authorization Official
A test methodology that assumes no knowledge of the internal structure and implementation detail of the assessment object.
Black Box Testing
The set of data that documents the information system’s adherence to the security controls applied.
Body of Evidence
The totality of evidence used to substantiate trust, trustworthiness, and risk relative to the system.
Body of Evidence
The act of reverse-engineering the malicious program to understand the code that implements the software behavior.
Code Analysis
Attempts to recreate the original source code of the program.
Disassembler
Allows the analyst to step through the code, interacting with it, and observing the effects of its instructions to understand its purpose.
Debugger