Part 1 Flashcards
What is a computer environment connected by one or more internal networks under the control of a single authority and security policy
Enclave
What do enclaves provide?
Cybersecurity capabilities such as boundary defense, key management, incident response, and delivery of common applications such as automation and email.
What is a networking backbone of an enclave responsible for connecting system devices and hosts by providing data transport capabilities such as operational or wide area and backbone networks that provides for the application of cybersecurity controls?
Network Environment
What are local area networks, servers, hosts, operating systems, peripherals, and applications apart of?
Computing Environment
What are the requirments for Cyber Secuity Work Force personnel?
Approved military training
Academic Degrees
Commercial Cyber Security Certificates
Approved Training and credentials
What is an object or person or entity that is a danger to an information system?
Threat
What are Insider Threats?
Junior and non trained personnel
Disgruntled personnel
System Administrators
What are outsider threats?
Nation states Hackers Terrorists Organized crime Industrial competitors Other criminal elements International press
Why do Administrators pose an increased threat?
Access to systems
Administrative passwords
Extensive knowledge of seucrity settings
Extensive training in attack methodologies
Why is it important to disable group accounts?
Group accounts remove non repudiation
What is a weakness that can be exploited in an information system or its components?
Vulnerability
What is the likelihood that a vulnerability can be exploited?
Risk
How to we classify a network’s vulnerabilities?
DISA severity codes I - immediately II - within 90 days III - within 180 days IV - within a year
What does IAVA stand for and what is the priority associated with it?
Information Assurance Vulnerability Alert
High priority
What does IAVB stand for and what is the priority associated with it?
Information Assurance Vulnerability Bulletin
Medium Priority
What does IAVT stand for and what is the priority associated with it?
Information Assurance Vulnerability Technical Advisory
Low priority
What is self propagating and does not require user action?
Worm
What is self replicating and can corrupt or delete data and requires user interaction?
Virus
What is malware that is disguised as a legitimate program, does not replicate, and requires interaction with the hacker?
Trojan
What is a piece of code designed to execute when conditions are met?
Logic bomb
What aquires information by social means?
Social Engineering
What is phishing that appears to be from within the organization?
Spear phishing
What is unsolicitated electronic messages that can be malware?
Spam
What are three types of password attacks
Dictionary attacks- uses all the words in a dictionary or txt file
Hybrid- dictionary using alpha numberic symbols and numbers
Brute force- takes the most time, most powerful cracking method, random generation of passwords and associated hashes
What are the risks asscoiates with Portable Electronic Devices?
Loss/ Theft
Cellular cloning
Bluetooth hacking attempts
Data leaks
What are the risks associated with Embarkables?
Malware
Data leaks / spillage
What is a statement of actions to be taken before, during, and after a disaster or emergency?
Contingency Plan
What are the 4 types of Accreditation decisions?
Authority to Operate (ATO)
Interim Authority to Operate (IATO)
Interim Authorization to Test (IATT)
Denial of Authroization to Operate (DATO)
What is an analysis of threats and vulnerabilities?
Risk assessment
What is an analysis of trade offs?
Risk mitigation
What is reactive or responsive risk management process that facilitates an investigation of and response to an incident?
Evaluation
What is the goal of continual assessment?
To identify and assess risk and bring it to an acceptable level
What SF is used to mark Unclassified material?
SF 710
What SF is used to mark Secret classified material?
SF 707
What SF form is used to mark TS classified material?
SF 706
What is the process of removing information to prevent data loss (discontinued use)?
Sanitizing
What is the process of wiping a hard drive through magnetic means to prevent any means of data extraction using NSA guidlines?
Degausing
What type of data is not retained after removal of an electronical power source?
Volitale
What type of data is retained even when loss of electrical power sources are removed
Non- volitile