Objective 3d Flashcards
Defined as a weakness in an information system, cryptographic system, or components that could be exploited
Vulnerabilities
Using common, well-known code, software, operating systems, or hardware increases probability an attacker can exploit
Familiarity
Using weak passwords can be easily discovered using brute force
Password Management Flaws
Programs that do not check user input can allow for unintended or direct execution of commands or SQL statements
Unchecked User Inputs
Software packages that scan systems or networks for weaknesses
AF Vulnerability Assessment Tools (VATs)
Automatically identifies configuration vulnerabilities threatening the security of DoD’s computer systems
Assured Compliance Assessment Solutions (ACAS)
Single Console access used by ACAS to manage Nessus scans at the enterprise network level, provides real-time detection of anomalies and critical events
Security Center
Comprehensive vulnerability scanner which performs configuration scans of servers, network devices, and databases to test for specific policy settings and compliance
Nessus
Monitors the network in real-time, searches out new hosts, applications, and vulnerabilities
Passive Vulnerability Scanner (PVS)
DoD information system used to record, track, and disseminate critical vulnerability information
Vulnerability Management System (VMS)
Provide system and network administrators with proactive tools that can be used to identify vulnerabilities before an adversary can find them
Security Scans
Can detect out-of-date software, validate compliance, deviation from security policies.
Scanning
Piece of software designed to update or fix problems with a computer program or its supporting data
Patch
Applied to stand alone machine; time consuming, tedius
Local Patch
Uses an automated means to apply patches or
security fixes. Most efficient
Remote Patch
Change applied to an asset to correct the weakness described by a vulnerability
Security Fix
Prohibits the disclosure of information from a system
of records absent the written consent of the subject individuals unless the disclosure is pursuant of the twelve statutory exceptions
Privacy Act
The intentional misleading or deceitful conduct that
deprives the Government of its resources or rights
Fraud
The extravagant, careless or needless expenditure of
Government resources, resulting from improper or deficient practices, systems, controls or decisions
Waste
The intentional, wrongful or improper use of Government resources
Abuse