IA (mand) Flashcards
Define CERTIFICATION.
eval of the technical and non tech security features of an information system, meets a set of security requirements.
Define ACCREDITATION.
formal declaration by the DESIGNATED APPROVING AUTHORITY (DAA) that the information system is APPROVED TO OPERATE.
What is ATO?
AUTHORITY TO OPERATE
IATO.
temporary authorization granted by the DESIGNATED APPROVING AUTHORITY
RISK MANAGEMENT.
balances the operational and economic cost for protective measures and gains of mission capability protecting the data
5 attributes of IA.
CAAIN
- confidentiality
- integrity
- availability
- non re repudiation
- authentication
Categories of CPU incidents.
9 total/ IM RRUUDE N! INVESTIGATION MALICIOUS ROOT LEVEL RECON USER LEVEL UNSUCCESSFUL DENIAL OF SERVICES EXPLAINED ANOMALY NON COMPLIANCE
IAVA.
Information Assurance Vulnerability Alert: addresses severe network vulnerabilities and potentially severe threats, CORRECTIVE ACTION OF THE HIGHEST PRIORITY
IAVB.
Information Assurance Vulnerability Bulletin: addresses new vulnerabilities and do not pose immediate risk but non compliance could escalate the risk.
IAVT.
Information Assurance Vulnerability Technical Advisory: new risks but classified as low risk
CTO.
Communications Tasking Order- urgent request coming for the Naval Network Warfare Command CDR (NETWARCOM)
Define Service Pack.
single install package for fixing software problems
Difference between Vulnerability and Threat.
Threat is an actual event that can mess up operations and an vulnerability is a weakness in a info system ( but can be fixed)
IAM.
Information Assurance Manager, responsible for the IA program