IA/ Cyber Security Flashcards
Define IA
information operations that protect and defend information systems
Define Cert
the evaluation of a technical and non- technical security features of an information system
Define Accreditation
is the official management decision to operate an information system in a specified environment
Define DAA
the official who assumes formal responsibility for operating a system
Define System Security plan
system security plan is the formal document prepared by the information system owner
ATO
authority to operate
IATO
interim authourity to operate
Risk management
allows IT managers to balance the cost of protective measures while achieving mission capability
Five attributes of IA
confidentiality, authentication, availability, non-repudiation, integrity
Catagories of computer incidents:
malicious logic, user level intrusion, root level intrusion
IAVA
information assurance vulnerability alert
IAVB
information assurance vulnerability bulletin
IAVT
information assurance vulnerability technical advisory
MALICIOUS CODE
ANY CODE THAT IS PART OF A SOFTWARE SYSTEM THAT IS INTENDED TO CAUSE SECURITY BREACHES OR DAMAGE TO A SYSTEM
ZOMBIE
A COMPUTER THAT HAS BEEN COMPROMISED AND USED TO PERFORM MALICIOUS TASKS UNDER REMOTE DIRECTION
BOT
USED TO SPREAD EMAIL SPAM AND LAUNCH DENIAL-OF-SERVICE ATTACKS. SOFTWARE APPLICATION THAT RUN AUTOMATIC TASKS OVER THE INTERNET
BOTNET
COLLECTION OF ZOMBIE WORKSTATIONS RUNNING BOTS (SOFTWARE APPLICATIONS THAT RUN AUTOMATIC TASKS OVER THE INTERNET) TO SPREAD EMAIL SPAM AND LAUNCH DOS
ZERO DAY EXPLOIT
THREAT OR ATTACK THAT EXPLOITS A PREVIOUSLY UNKNOWN VULNERABILITY IN A COMPUTER APPLICATION OR OPERATING SYSTEM THAT DEVELEPORS HAVE NOT HAD TIME TO ADDRESS AND PATCH.
SPYWARE
SOFTWARE THAT AIDS IN GATHERING INFORMATION ABOUT A PERSON OR ORGANIZATION WITHOUT THEIR KNOWLEDGE. SENDS INFORMATION TO OTHER ENITITES.
LOGIC BOMB
A CODE INTENTIONALLY INSERTED INTO A SOFTWARE SYSTEM THAT WILL SET OFF A MALICIOUS FUNCTION WHEN SPECIFIC CONDITIONS ARE MET.
KEYLOGGERS
SOFTWARE THAT LOGS EVERY KEYSTROKE AND WRITES IT TO A FILE.
PRIVELAGE ESCALATORS
USER WHO GAINS ELEVATED ACCESS TO RESOURCES THAT ARE NORMALLY PROTECTED FROM AN APPLICATION OR USE.
DENIAL-OF-SERVICE
AN ATTEMPT TO MAKE A MACHINE OR NETWORK RESOURCE UNAVAILABLE TO ITS INTENDED USERS. PING OF DEATH.
DISTRIBUTED-DENIAL-OF-SERVICE
LARGE SCALE DENIAL OF SERVICE
EXPLOIT
SOFTWARE THAT TAKES ADVANTAGE OF A BUG, GLITCH, OR VULNERABILITY. CAUSES UNINTENDED BEHAVIOUR.
GLOBAL INFORMATION GRID
AN ALL ENCOMPASSING COMMUNICATION PROJECT OF THE UNITED STATES DoD
IAM
IN CHARGE OF IA PROGRAM. OVERSEE ALL IAO’S, IAVA’S, SECURITY MEASURES, EVALUATIONS AND ACCREDITATIONS.
ENSURES SECURITY INTRUCTIONS, GUIDANCE AND SOP’S ARE MAINTAINED AND IMPLEMENTED
IAO
APPLIES EVERYTHING (IN TO EFFECT) THAT THE IAM OVERSEES.
NCDOC (NAVY CYBER DEFENSE OPERATIONS COMMAND)
IN CHARGE OF INCIDENTS, MONITORS NETWORK ACTIVITY FOR MALICIOUS EVENTS.
BLUE TEAM
PROTECT FROM THE INSIDE. TEAM COMES TO THE SHIP AND SCANS THE ENTIRE NETWORK LOOKING FOR VULNERABILITIES. ONCE IDENTIFIED THEY INFORM THE COMMAND, AND THE COMMAND IS RESPONSIBLE FOR FIXING THE DISCREPANCIES. CTN’S
RED TEAM
ATTEMPTS TO PENETRATE IA VULNERABILITES.
INTRUSION DETECTION SYSTEM (IDS)
A DEVICE OR SOFTWARE APPLICATION THAT MONITORS NETWORS OR SYSTEM ACTIVITIES FOR MALICIOUS ACTIVITY OR POLICY VIOLATIONS AND PRODUCES REPORTS TO A MANAGEMENT STATION.
ACTIVE: IDS AUTO-RESPONDS TO THE SUSPICIOUS ACTIVITY BY RESETTING THE CONNECTION OR BY REPROGRAMMING THE FIREWAL TO BLOCK THE TRAFFIC.
INTRUSION PREVENTION SYSTEM (IPS)
SOFTWARE THAT PREVENTS SUSPICIOUS ACTIVITY BY RESETTING THE CONNECTION OR BLOCKING NETWORK TRAFFIC FROM THE MALICIOUS SOURCE.
HOST-BASED SECURITY SYSTEM (HBSS)
SOFTWARE APPLICATIONS USED WITHIN THE DEPARTMENT OF DEFENSE (DOD) TO MONITOR, DETECT, AND COUNTERATTACK AGAINST THREATS TO DOD COMPUTER NETWORKS AND SYSTEMS.
HOST BASED SECURITY SYSTEM (HBSS)
SOFTWARE APPLICATIONS USED WITHIN THE DEPARTMENT OF DEFENSE (DOD) TO MONITOR, DETECT, AND COUNTERATTACK AGAINST THREATS TO DOD COMPUTER NETWORKS AND SYSTEMS.
WINDOWS SERVER UPDATE SERVICES (WSUS) ON SERVERS
A PROGRAM THAT ENABLES ADMINISTRATORS TO MANAGE THE DISTRIBUTION OF UPDATES AND HOT FIXES. THESE ARE RELEASED BY SPAWAR.