IDW 107

Card Set Information

IDW 107
2012-06-05 19:39:07
IDW 107

IDW 107
Show Answers:

  1. IA
    • Information Assurance
    • Protect and defend data and Information Systems by ensuring their availability, integrity, authentication, confidentially and non-repudiation
  2. Certification
    Comprehensive evaluation of the technical and non-technical security features
  3. Accreditation
    Official management decisioin to permit operation of an IS in a specified environment
  4. System Security Plan
    Document that describes planned security tasks required to meet system or network security requirements
  5. DAA
    • Designated Approving Authority
    • Authority to formally assume responsibility for operating a system (or network) at an acceptable level of risk
  6. ATO
    • Authority to Operate
    • The formal declaration by the DAA that an Information System is approved to operate in a particular security mode
    • Good for 3 years
  7. Cross-Domain Transfers
    • Moving files between different classifications of networks
    • Buster
  8. Confidentially
    Assurance that information is not disclosed to unauthorized persons or devices
  9. Integrity
    Protection against unauthorized modification or destruction of information
  10. Availability
    Timely, reliable access to data and info services
  11. Non-repudiation
    assurance or proof sender/receiver are who they say they are
  12. Authentication
    Establishes the validity of a transmission, message or originator
  13. Computer Incidents (9)
    • Root Level Intrusion
    • User Level Intrusion
    • Denial of Service
    • Malicious Logic
    • Unsuccessful Activity Attempt
    • Non-Compliance Activity
    • Reconnaissance
    • Investigating
    • Explained Anomaly
  14. IAVA
    • Information Assurance Vulnerability...
    • Alert - High Priority
    • Bulletin - Medium Priority
    • Technical Advisory - Low Priority
  15. CTO
    • Communications Tasking Order
    • mandatory change and how communications are handled
  16. NTD (Navy Telecommunications Directive)
    Naval message giving an order or direction about a certain IT function
  17. Service Pack
    Collection of updates, fixes and/or enhancements to a software program
  18. Difference between a Vulnerability and Threat
    • Vulnerability - weakness that could be exploited by someone or something
    • Threat - circumstances, events, or people with the potential to cause harm to a system