• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/14

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

14 Cards in this Set

  • Front
  • Back

Definition of IA

To protect information and Information Systems

5 pillars of IA

C - confidentiality - authorized restrictions on information access and disclosure



I - integrity- information and programs are changed only in a specified and authorized manner



A - authentification- timely and reliable access to data



N - non-repudiation- application that with high insurance can be asserted to be genuine, and that cannot be subsequently refuted



A - availability- measure of confidence that users or processes that access information are who they say they are


Define IAVA

Information assurance vulnerability alert



High priority



Define IAVT

Information assurance vulnerability Technical Advisory



Low priority

Define IAVB

Information assurance vulnerability bulletin



Medium priority

Define CTO

Computer tasking order

Define HBSS

Host based security system



Zombie

System taking directions from a master control computer

Bot

Automated software program that collects information on the web

Zero day exploit

A computer threat that tries to exploit computers application vulnerabilities

Spyware

Programs that work on behalf of a third party

Logic bomb

Any code that is hidden within an application and causes something unexpected to happen

GIG

Global Information Grid

IDS

Intrusion detection system



Active: inactive response taking action based upon attack or threat to reduce potential impact



Passive: most common type of response to many intrusions (logging)