• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/16

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

16 Cards in this Set

  • Front
  • Back
Define IA and mission.
Information Assurance
protect defend data and info systems by ensuring availability, integrity and authentication
certification
eval of technical and non technical security features of info system
accreditation
official management decision to operate system in specific environment
DAA - and their responsibility
(designated approving authority)
1. determine acceptable levels of residual risk
2. determines if system meets accreditation requirements
System Security Plan
agreement to use internet properly
System Security Authorization Agreement
describes planned security tasks
ATO
authority to operate
NIPERNET 24 months
SIPERNET 12 months
IATO
Interim Approval to Operate, no more that 180 days
Configuration Management
accounts for and audits all changes to a site or info system
5 Attributes of IA
1) confidentiality
2) integrity
3) availability
4) non redupiation
5) authentication
9 categories of computer incidents
1) fraud
2) abuse
3) denial service of attack
4) penetration of computer
5)loss or damage of info system
6) intro of computer virus or other malicious codes
7)exploitation of technical vulnerabilities
8)compromise info
vulnerability assessment
testing of network to find weak areas so correction can be made to that area
difference between vulnerability and threat
vulnerability = known possible exploitation
threat= possible intrusion by third party
IATO can last no longer than _____ days.
180
vulnerability assessment
testing of network to find vulnerabilities, so corrections can be made
8 categories of computer incidents
1. fraud
2. abuse
3. denial of service or attacks
4. penetration of computer
5. compromise of info
6. loss or damage of property
7. exploitation of technical and admin. vulnerabilities
8. intro. of computer viruses or malicious codes