IDW: Network/IA Flashcards
How many networks do we have onboard?
6: NIPR, SIPR, CENTRIX, JWICS, PPLAN, MCMS
What is defense in depth in regards to IA?
A concept of multi-layered security; multi layers to prove that you are authorized.
What is the biggest threat to the network and how do we mitigate it?
User awareness and training.
What is compliance in regards to patching?
If a computer on the network isn’t fully patched then there’s a loophole that can be exploited.
How does inventory effect compliance?
If you don’t know where a non-compliant computer is, you can’t fix it and have vulnerability.
What is the ISSM and their responsibilities?
Information Systems Security Manager; serves as the point of contact for all command IA matters and implements IA program. Designated in writing by CO.
What is the ISSO and their responsibilities?
Designated system administrator for a system (GCCS, AIS, TMIP). They oversee compliance inventories and other requirements assigned by ISSM.
TASO responsibilities
Share drive folder and file management
SAAR form management
Cyber Awareness training management
Evaluate and report security vulnerabilities and problems
Complete and maintain inventories of all IT equipment
Notify ADP of equipment changes
Train and submit division requests for new equipment.
Ensure electrical safety checks conducted
Inform ADP of personnel changes
Assist with creating Outlook PST files
Assist uses in mapping drives
Assist Combat Systems with (Information Security) IS inspections
Communicate news from meetings with leadership.
What is a network violation?
Auto-forwarding Navy email to commercial email
Bypass firewalls
Use unauthorized software
Relocate or change equipment
Upload/download files
Using personal hardware
Misuse of IT resourcesto adversely reflect on Navy
What are spillage procedures?
Report to CoC, electronic spillage report must go out every 24hrs to every command involved.
What’s NETSEC responsible for?
All data security,assurance policy, network configuration management, spillage reporting
How often is anti-virus done
7 days
What did Private Manning do?
Copied classified classified info and uploaded to Internet.
What did Edward Snowden do?
Copied classified material to external hard drive and released it to the public.
Information Assurance
Practice of assuring information and managing risks related to the use, storage, and transmission of information or data.
Interim Authority To Operate
Has authorized termination date within 180 days; can’t have consecutive IATO totaling more than 360 days.
Authority To Operate (ATO)
Issued for 3 years; DAA authorized to run Information Systems at an acceptable level of risk
Public-key infrastructure (PKI)
Crypto technique that enables users to communicate on an insecure public network verify users identity by digital signatures.
Information Assurance Vulnerability Alert (IAVA)
Announcement of a computer vulnerability notification. IAVA’s require acknowledgement and compliance.
Public-key infrastructure (PKI)
Crypto technique that allows users to securely communicate on an insecure network using digital signatures to verify.
Information Assurance Vulnerability Bulletin (IAVB)
Announcement of a computer vulnerability. IAVBs require acknowledgement.
Information Assurance Vulnerability Technical (IAVT)
Announcement of a computer vulnerability. IAVT require notification only.
Computer Tracking Order (CTO)
Document sent out to change network posture of the fleet.
Information Assurance Manager (IAM)
Responsible for ensuring commands Information Systems are operated, used, maintained and disposed of
Virus
Harmful program in disguise
Worm
Self-replicating sub-viruses
Network Enumeration
Process of extracting valid account or exported resource names from systems using active connections and desires queries
Trojans
Harmful program disguised as a legit application