Week 1 Flashcards
Computer environment connected to one or more internal networks under control of a single authority.
Enclave
What does an enclave consist of?
- incident detection and response
- key management
- delivery of application
what are two environments of an enclave?
NE: networking environment
CE: computing environment
Give an example of a network environment
Switches, routers, networking backbone
What kind of users are at IAT Level 2 and what do they do?
SYSADMINS. They focus on threats and vulnerabilities
What is a high priority alert that needs to be fixed by a certain date?
IAVA
What are he two categories of threats?
Environmental
Human
What is a vulnerability?
A weakness that has the POTENTIAL to be exploited.
How many DIsA severity codes are there?
4
Which DISA severity code is the most severe?
CAT 1
How many days do you have to fix a CAT 2?
90
How many days do you have to fix a CAT 3?
180
How many days do you have to fix a CAT 4?
1 year
Who tries to exploit vulnerabilities on a system or network?
Hacker
What kind of people encore fear?
Cyber terrorists
What is self replicating and needs to be attached to something in order to affect a system?
Virus
What is self-propagating and does NOT need any user interaction?
Worm
What is a time and code related virus?
Logic bomb
What is an attempt to get credit card details and whatnot via email?
Phishing
What is a prompt to forward emails?
Internet hoax
What are some password crackers,
Dictionary (thesaurus)
Hybrid
What are actions that need to be taken to continue operations if a disaster happens. Before during and after.
Contingency Plan
What are the steps of risk management?
Assessment
Mitigation
Evaluation and continual assessment
What is the first step of risk management?
Assessment
What is the second step of risk management?
Mitigation
What is the third step of risk management?
Evaluation and continual assessment