• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
Define IA
Information Assurance

tell you how to salf guard data information and computer security
Define Certification
Certification is a comprehensive evaluation of the technical and non-technical security features of an IT system and other safeguards
Define Accreditation
Accreditation is the formal declaration by the Designated Approving Authority that an Information Technology system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk.
Define Designated Approving Authority
The official with the authority to formally assume responsibility for operating a system ( or network) at an acceptable level of risk
System Security Plan
A formal document that provides an overview of the security requirements
Define System Security Authorization Agreement:
Is used as a guide
Define ATO
Authorization To Operate
Good for 3 years
Define IATO
Interim Authorization To Operate
Good for up to a maximum of 180 days
Define Configuration Management (CM)
is the detailed recording and updating of information that describes an enterprise's hardware and software.
What is CROSS DOMAIN TRANSFERS
make a document declassified for another country
What is Risk Management
The Process that provides
Risk Identification
Analysis
Mitigation Planning
Mitigation Plan
Implementation
Tracking
to ensure early identification and handling of risks
Define Confidentiality
Who can see the information
Define Integrity
Who can make Changes on the information
Define Availability
Timely and reliable access to and use of information
Define Non-repudiation
You cant say that you didnt send it
Define Authentication
to proved that it is you
How many Categories of Computer incidents assigned by NCDOC
9
Root Level Intrusion
Incident
an attacker gaineds root (administrative) level access to the system
User Level Intrusions
Incident
an attacker gained user level access to the system and can escalate privileges to root.
Denial of Service
some one make a hardware stop working