Term
|
Definition
Information Assurance Measures that protect and defend information and information systems |
|
|
Term
|
Definition
evaluation of security features of an IT System |
|
|
Term
|
Definition
formal declaration that IT system is approved to operate |
|
|
Term
|
Definition
Designated Approval Authority |
|
|
Term
|
Definition
formal document of security requirements |
|
|
Term
System Security Authorization Agreement |
|
Definition
|
|
Term
|
Definition
Authorization to operate 3 years |
|
|
Term
|
Definition
Interim authorization to operate 180 days |
|
|
Term
|
Definition
done through your local administrators- tracks changes to IS |
|
|
Term
What are the 5 attributes of IA |
|
Definition
Confidentiality, integrity, availability, non-repudation, authentication |
|
|
Term
|
Definition
Keeping your data confidential to those who dont need it |
|
|
Term
|
Definition
keeping your data secure- unauthorized modification |
|
|
Term
|
Definition
keeping data readily available at all times |
|
|
Term
|
Definition
cant deny that you did something because there is proof |
|
|
Term
|
Definition
validating you are wh you say you are (pin number on log in) |
|
|
Term
List 9 categories of computer incidents |
|
Definition
1. root level intrusion 2. user lever intrusion 3. denial of service 4. malicous logic 5. unsuccessful activity attempt 6. non-compliance activity 7. reconnaissance 8. investigating 9. explained anomaly |
|
|
Term
|
Definition
Information assurance vulnerability alert-microsoft updates |
|
|
Term
|
Definition
|
|
Term
Define vulnerablity assessment |
|
Definition
assessing anything that can harm your system. retinal scanners help keep track of vulnerability |
|
|
Term
explain the difference between vulnerability and threat |
|
Definition
vulnerablity- procedural weaknes, open hole that can be attacked threat- something that could happen (virus) |
|
|
Term
State the duties and responibilities of the IAM |
|
Definition
Ronnie Caubaug maintiaining IA |
|
|