INFORMATION ASSURANCE Flashcards
107, 214, 307
IA
Information Assurance; Information operations that protect and defend data and IS by ensuring availability, integrity, authentication, confidentiality and non-repudiation.
ATO
Authority to Operate; usually over one year
IATO
Interim Authority to Operate; Usually 6 months
CROSS-DOMAIN TRANSFERS
Information must be scanned and verified prior to transferring.
5 ATTRIBUTES OF IA
Confidentiality Integrity Availability Non-repudiation Authentication
CONFIDENTIALITY
Information or IS have been or may have been accessed, used, copied, or disclosed by someone who was not authorized to have access to the information.
INTEGRITY
Protection against unauthorized modification or destruction of information.
AVAILABILITY
Information the computing systems used to process the information and the security controls used to protect the information are all available and functioning correctly when the information is needed.
NON-REPUDIATION
Implies that one party of a transaction cannot deny having received a transaction nor can the other party deny having sent a transaction.
AUTHENTICATION
Security measure designed to establish the validity of a transmission, message, or originator, or means of verifying an individual’s authorization to receive specific categories of information.
9 CATEGORIES OF COMPUTER INCIDENTS
User Level Intrusion Denial of Service Malicious Logic Unsuccessful Activity Attempt Non-Compliance Activity Reconnaissance Investigating Explained Anomaly
IAVA
Information Assurance Vulnerability Alert
IAVB
Information Assurance Vulnerability Bulletin
CTO
Communication Tasking Order
NTD
Navy Telecommunications Directive
SERVICE PATCHES
A collection of updates fixes and/or patches
DIFFERENCE BETWEEN VULNERABILITY AND THREAT
Vulnerability: refers to the susceptibility of a person, group, society, or system to physical or emotional injury or attack.
Threat: An act of coercion wherein an act is proposed to elicit a negative response.
CSI
Cyber Security Inspection