INFORMATION ASSURANCE Flashcards

107, 214, 307

1
Q

IA

A

Information Assurance; Information operations that protect and defend data and IS by ensuring availability, integrity, authentication, confidentiality and non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ATO

A

Authority to Operate; usually over one year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IATO

A

Interim Authority to Operate; Usually 6 months

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CROSS-DOMAIN TRANSFERS

A

Information must be scanned and verified prior to transferring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5 ATTRIBUTES OF IA

A
Confidentiality
Integrity
Availability
Non-repudiation
Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CONFIDENTIALITY

A

Information or IS have been or may have been accessed, used, copied, or disclosed by someone who was not authorized to have access to the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

INTEGRITY

A

Protection against unauthorized modification or destruction of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AVAILABILITY

A

Information the computing systems used to process the information and the security controls used to protect the information are all available and functioning correctly when the information is needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NON-REPUDIATION

A

Implies that one party of a transaction cannot deny having received a transaction nor can the other party deny having sent a transaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AUTHENTICATION

A

Security measure designed to establish the validity of a transmission, message, or originator, or means of verifying an individual’s authorization to receive specific categories of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

9 CATEGORIES OF COMPUTER INCIDENTS

A
User Level Intrusion
Denial of Service
Malicious Logic
Unsuccessful Activity
Attempt
Non-Compliance Activity
Reconnaissance
Investigating
Explained Anomaly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IAVA

A

Information Assurance Vulnerability Alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IAVB

A

Information Assurance Vulnerability Bulletin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CTO

A

Communication Tasking Order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NTD

A

Navy Telecommunications Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SERVICE PATCHES

A

A collection of updates fixes and/or patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DIFFERENCE BETWEEN VULNERABILITY AND THREAT

A

Vulnerability: refers to the susceptibility of a person, group, society, or system to physical or emotional injury or attack.
Threat: An act of coercion wherein an act is proposed to elicit a negative response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CSI

A

Cyber Security Inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DEFENSE-IN-DEPTH

A

Integrates People and Technology to establish barriers across networks.

20
Q

MALICIOUS CODE

A

Code in any part of software or script that is intended to cause undesired effects, security breaches or damage to a system.

21
Q

GIVE 5 TYPES OF MALICIOUS ACTIVITY

A
Zombie
Bot
Zero Day Exploit
Spyware
Logic Bomb
22
Q

ZOMBIE

A

Computer controlled by another person without user knowledge. Typically used for spam or illegal activities.

23
Q

BOT

A

Malware that gives attacker full control of a computer

24
Q

ZERO DAY EXPLOIT

A

A hole in software that is unknown to the vendor and is exploited by hackers.

25
Q

SPYWARE

A

Software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.

26
Q

LOGIC BOMB

A

A set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects.

27
Q

KEY LOGGERS

A

Tracks key strokes

28
Q

PRIVILEGE ESCALATORS

A

Exploiting a design flaw to gain elevated access

29
Q

EXPLOIT

A

Taking advantage of a vulnerability

30
Q

GLOBAL INFORMATION GRID

A

DoD’s globally interconnected network of information capabilities.

31
Q

MITIGATION

A

Actions taken to reduce the effect of a network attack

32
Q

PENETRATION

A

Unauthorized attack bypassing security

33
Q

PROBE

A

Used to learn about a network

34
Q

PORT SCAN

A

Scans networks for open ports for potential exploitation

35
Q

PKI

A

Public Key Infrastructure

36
Q

Digital Signatures

A

Assures originator (sender) authenticity

37
Q

IAM

A

Information Assurance Manager

38
Q

IAO

A

Information Assurance Officer

39
Q

Electronic Spillage

A

EX: putting SECRET information on UNCLASSIFIED systems.

40
Q

Navy Blue Team

A

Solidifies Naval Networks

41
Q

Navy Red Team

A

Simulates attacks on Naval Networks

42
Q

IDS

A

Intrusion Detection System

43
Q

Two Types of IDS

A

Active – automatically takes action and denies intrusion

Passive – Logs information but does not take action

44
Q

IPS

A

Intrusion Prevention System

45
Q

HBSS

A

Host Based Security System – Detect and counter real time threats

46
Q

Anti-virus

A

Computer software used to detect, prevent and remove malicious software.