INFORMATION ASSURANCE Flashcards
107, 214, 307
IA
Information Assurance; Information operations that protect and defend data and IS by ensuring availability, integrity, authentication, confidentiality and non-repudiation.
ATO
Authority to Operate; usually over one year
IATO
Interim Authority to Operate; Usually 6 months
CROSS-DOMAIN TRANSFERS
Information must be scanned and verified prior to transferring.
5 ATTRIBUTES OF IA
Confidentiality Integrity Availability Non-repudiation Authentication
CONFIDENTIALITY
Information or IS have been or may have been accessed, used, copied, or disclosed by someone who was not authorized to have access to the information.
INTEGRITY
Protection against unauthorized modification or destruction of information.
AVAILABILITY
Information the computing systems used to process the information and the security controls used to protect the information are all available and functioning correctly when the information is needed.
NON-REPUDIATION
Implies that one party of a transaction cannot deny having received a transaction nor can the other party deny having sent a transaction.
AUTHENTICATION
Security measure designed to establish the validity of a transmission, message, or originator, or means of verifying an individual’s authorization to receive specific categories of information.
9 CATEGORIES OF COMPUTER INCIDENTS
User Level Intrusion Denial of Service Malicious Logic Unsuccessful Activity Attempt Non-Compliance Activity Reconnaissance Investigating Explained Anomaly
IAVA
Information Assurance Vulnerability Alert
IAVB
Information Assurance Vulnerability Bulletin
CTO
Communication Tasking Order
NTD
Navy Telecommunications Directive
SERVICE PATCHES
A collection of updates fixes and/or patches
DIFFERENCE BETWEEN VULNERABILITY AND THREAT
Vulnerability: refers to the susceptibility of a person, group, society, or system to physical or emotional injury or attack.
Threat: An act of coercion wherein an act is proposed to elicit a negative response.
CSI
Cyber Security Inspection
DEFENSE-IN-DEPTH
Integrates People and Technology to establish barriers across networks.
MALICIOUS CODE
Code in any part of software or script that is intended to cause undesired effects, security breaches or damage to a system.
GIVE 5 TYPES OF MALICIOUS ACTIVITY
Zombie Bot Zero Day Exploit Spyware Logic Bomb
ZOMBIE
Computer controlled by another person without user knowledge. Typically used for spam or illegal activities.
BOT
Malware that gives attacker full control of a computer
ZERO DAY EXPLOIT
A hole in software that is unknown to the vendor and is exploited by hackers.