Information Assurance & Computer Network Defense Flashcards
What is the ability to rapidly collect, process, and disseminate information while denying these capabilities to adversaries?
Information Superiority
What are the measures that protect and defend information and information systems by ensuring availability integrity, authentication, confidentiality and non-repudiation?
Information Assurance
What consists of actions and operations to defend computer systems and networks from unauthorized activities that degrade mission performance and adversely impact survivability?
Computer Network Defense
What focuses on affecting human decision processes to achieve friendly objectives?
Information Operations
What enables operations and intelligence collection to gather data from target or adversary automated information systems or networks?
Computer Network Exploitation (CNE)
What provides globally interconnected capabilities, processes and personnel for collecting, processing, storing, disseminating and managing information for all DOD war-fighters, policy makers, and support personnel?
Global Information Grid (GIG)
What is an organizational, procedural and technological construct for ensuring information superiority and enabling speed of command for the war-fighter?
NETOPS
What integrates the three primary functions of network management, information dissemination management (IDM) and IA?
NETOPS
What provides visibility of extent and intensity of the activity, traffic, load and throughput potential, as well as detection of significant degradation of service?
Network Management
What does network management enable based on priority, system status and capacity?
Dynamic Rerouting
What integrates an organized, manned, equipped and trained workforce to guard, secure and secure information and information systems by providing the security services/attributes of availability, authentication, confidentiality, integrity and non-repudiation?
Information Assurance
What provides the timely, reliable access to data and services for authorized users?
Availability
What is a security measure designed to establish the validity of a transmission, message or originator, or as a means of verifying an individual’s authorization to access specific categories of information?
Authentication
What provides the assurance the information is not disclosed to unauthorized entities or processes?
Confidentiality
What is the assurance the sender of the data is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the data?
Non-Repudiation
What is the quality of an information system reflecting the logical correctness and reliability of the operating system?
Integrity
Which instruction states all DOD information systems and networks will be certified and accredited IAW with DOD policy and guidance, currently the DOD Information Technology Security Certification and Accreditation Process (DITSCAP)?
DOD Instruction 5200.40
Certification and accreditation (C&A) of information will comply with the requirements of what?
Director of Central Intelligence Directive
Who is responsible for developing and providing US military policy positions and concepts supporting CND and IA?
Chairmen of the Joint Chiefs of Staff
What is the opportunity to make use of an information system (IS) resource?
Access
What limits access to information system resources only to authorized users, programs, processes or other systems?
Access Control