• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/36

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

36 Cards in this Set

  • Front
  • Back
NITO
National Information Technology Office
DMZ
De-Militarized Zone
NIRT
National Incidence Response Team
SAFR RA-5
Security Assurance for the Federal Reserve Risk Assessment 5
Vulnerability Assessment FRISS
Vulnerability Assessment Federal Reserve Information Security Standards
Information Security Remediation Management FRISS
Information Security Remediation Management Federal Reserve Information Security Standards
IP360
A vulnerability scanning tool that is managed by NIRT, and is administered by local information security groups. The tool is used to scan the entire network is servers as a comprehensive “fail safe” to ensure all IP ranges are scanned. IP360 is part of the recurring scanning program
AppDetective
A scanning tool that logs into a database and pulls certain tables and the associated configurations and copies them to a local source to scan for issues based on certain signatures (e.g. default username). AppDetective is part of the recurring or ad hoc scanning program
AppScan
A scanning tool that is designed to scan at the web-based application layer and searches for items such as hidden directories or any other items that can be exploitable through the web-browser. AppScan is part of the ad hoc scanning program.
Nessus
A tool that serves as an augmentation to IP360 and is primarily used during an upgrade or to validate certain findings that may have been brought forth by a NIRT pen test. Nessus is part of the ad hoc scanning program
Ad Hoc Scripts
Certain ad hoc scripts exist that search for vulnerabilities across the network. One example is a script that searches data files on the bank Intranet searching for the world “Restricted” in hopes to locate Restricted FR documents. Another script pulls USB data via BigFix looking for storage devices that are not encrypted. The results of these scripts are then imported into RISC
RISC
Real-Time Information Security Console
JIRA
A proprietary issue tracking product, commonly used for bug tracking, issue tracking, and project management
RDC
Remote Deposit Capture
CMDB
Configuration Management Database
RAN
Research Accessible Network
FRIT
Federal Reserve Information Technology
LIRT
Local Incidence Reporting Team
COBIT
Control Objectives for Information and Related Technology
GEIT
Governance of Enterprise Information Technology
ITGI
Information Technology Governance Institute
ERM
Enterprise Risk Management
ISACA
Information Systems Audit and Control Association
CISO
Chief Information Security Officer
Corporate Governance
The set of processes, customs, policies, laws, management practices, and institutions affecting the way an entity is controlled and managed
Information Technology Governance
A subset discipline of Corporate Governance
PMO
Program Management Office
TECS
Technology Engineering and Computer Services
ESS
Enterprise Search Services
NRAS
National Response Services
EID
Enterprise Identity Management Services
COE
Common Operating Environment
SAM
Software Asset Management
CMS
Collateral Management System
ARC
Accounts, Risk, and Credit
CBAF
Central Business Administration Function