Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
14 Cards in this Set
- Front
- Back
Definition of IA |
To protect information and Information Systems |
|
5 pillars of IA |
C - confidentiality - authorized restrictions on information access and disclosure
I - integrity- information and programs are changed only in a specified and authorized manner
A - authentification- timely and reliable access to data
N - non-repudiation- application that with high insurance can be asserted to be genuine, and that cannot be subsequently refuted
A - availability- measure of confidence that users or processes that access information are who they say they are
|
|
Define IAVA |
Information assurance vulnerability alert High priority |
|
Define IAVT |
Information assurance vulnerability Technical Advisory Low priority |
|
Define IAVB |
Information assurance vulnerability bulletin Medium priority |
|
Define CTO |
Computer tasking order |
|
Define HBSS |
Host based security system |
|
Zombie |
System taking directions from a master control computer |
|
Bot |
Automated software program that collects information on the web |
|
Zero day exploit |
A computer threat that tries to exploit computers application vulnerabilities |
|
Spyware |
Programs that work on behalf of a third party |
|
Logic bomb |
Any code that is hidden within an application and causes something unexpected to happen |
|
GIG |
Global Information Grid |
|
IDS |
Intrusion detection system Active: inactive response taking action based upon attack or threat to reduce potential impact Passive: most common type of response to many intrusions (logging) |