INFORMATION ASSURANCE Flashcards

107, 214, 307

1
Q

IA

A

Information Assurance; Information operations that protect and defend data and IS by ensuring availability, integrity, authentication, confidentiality and non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ATO

A

Authority to Operate; usually over one year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IATO

A

Interim Authority to Operate; Usually 6 months

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CROSS-DOMAIN TRANSFERS

A

Information must be scanned and verified prior to transferring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5 ATTRIBUTES OF IA

A
Confidentiality
Integrity
Availability
Non-repudiation
Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CONFIDENTIALITY

A

Information or IS have been or may have been accessed, used, copied, or disclosed by someone who was not authorized to have access to the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

INTEGRITY

A

Protection against unauthorized modification or destruction of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AVAILABILITY

A

Information the computing systems used to process the information and the security controls used to protect the information are all available and functioning correctly when the information is needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NON-REPUDIATION

A

Implies that one party of a transaction cannot deny having received a transaction nor can the other party deny having sent a transaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AUTHENTICATION

A

Security measure designed to establish the validity of a transmission, message, or originator, or means of verifying an individual’s authorization to receive specific categories of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

9 CATEGORIES OF COMPUTER INCIDENTS

A
User Level Intrusion
Denial of Service
Malicious Logic
Unsuccessful Activity
Attempt
Non-Compliance Activity
Reconnaissance
Investigating
Explained Anomaly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IAVA

A

Information Assurance Vulnerability Alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IAVB

A

Information Assurance Vulnerability Bulletin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CTO

A

Communication Tasking Order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NTD

A

Navy Telecommunications Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SERVICE PATCHES

A

A collection of updates fixes and/or patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DIFFERENCE BETWEEN VULNERABILITY AND THREAT

A

Vulnerability: refers to the susceptibility of a person, group, society, or system to physical or emotional injury or attack.
Threat: An act of coercion wherein an act is proposed to elicit a negative response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CSI

A

Cyber Security Inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DEFENSE-IN-DEPTH

A

Integrates People and Technology to establish barriers across networks.

20
Q

MALICIOUS CODE

A

Code in any part of software or script that is intended to cause undesired effects, security breaches or damage to a system.

21
Q

GIVE 5 TYPES OF MALICIOUS ACTIVITY

A
Zombie
Bot
Zero Day Exploit
Spyware
Logic Bomb
22
Q

ZOMBIE

A

Computer controlled by another person without user knowledge. Typically used for spam or illegal activities.

23
Q

BOT

A

Malware that gives attacker full control of a computer

24
Q

ZERO DAY EXPLOIT

A

A hole in software that is unknown to the vendor and is exploited by hackers.

25
SPYWARE
Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
26
LOGIC BOMB
A set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects.
27
KEY LOGGERS
Tracks key strokes
28
PRIVILEGE ESCALATORS
Exploiting a design flaw to gain elevated access
29
EXPLOIT
Taking advantage of a vulnerability
30
GLOBAL INFORMATION GRID
DoD’s globally interconnected network of information capabilities.
31
MITIGATION
Actions taken to reduce the effect of a network attack
32
PENETRATION
Unauthorized attack bypassing security
33
PROBE
Used to learn about a network
34
PORT SCAN
Scans networks for open ports for potential exploitation
35
PKI
Public Key Infrastructure
36
Digital Signatures
Assures originator (sender) authenticity
37
IAM
Information Assurance Manager
38
IAO
Information Assurance Officer
39
Electronic Spillage
EX: putting SECRET information on UNCLASSIFIED systems.
40
Navy Blue Team
Solidifies Naval Networks
41
Navy Red Team
Simulates attacks on Naval Networks
42
IDS
Intrusion Detection System
43
Two Types of IDS
Active – automatically takes action and denies intrusion | Passive – Logs information but does not take action
44
IPS
Intrusion Prevention System
45
HBSS
Host Based Security System – Detect and counter real time threats
46
Anti-virus
Computer software used to detect, prevent and remove malicious software.