IA/ Cyber Security Flashcards
(36 cards)
Define IA
information operations that protect and defend information systems
Define Cert
the evaluation of a technical and non- technical security features of an information system
Define Accreditation
is the official management decision to operate an information system in a specified environment
Define DAA
the official who assumes formal responsibility for operating a system
Define System Security plan
system security plan is the formal document prepared by the information system owner
ATO
authority to operate
IATO
interim authourity to operate
Risk management
allows IT managers to balance the cost of protective measures while achieving mission capability
Five attributes of IA
confidentiality, authentication, availability, non-repudiation, integrity
Catagories of computer incidents:
malicious logic, user level intrusion, root level intrusion
IAVA
information assurance vulnerability alert
IAVB
information assurance vulnerability bulletin
IAVT
information assurance vulnerability technical advisory
MALICIOUS CODE
ANY CODE THAT IS PART OF A SOFTWARE SYSTEM THAT IS INTENDED TO CAUSE SECURITY BREACHES OR DAMAGE TO A SYSTEM
ZOMBIE
A COMPUTER THAT HAS BEEN COMPROMISED AND USED TO PERFORM MALICIOUS TASKS UNDER REMOTE DIRECTION
BOT
USED TO SPREAD EMAIL SPAM AND LAUNCH DENIAL-OF-SERVICE ATTACKS. SOFTWARE APPLICATION THAT RUN AUTOMATIC TASKS OVER THE INTERNET
BOTNET
COLLECTION OF ZOMBIE WORKSTATIONS RUNNING BOTS (SOFTWARE APPLICATIONS THAT RUN AUTOMATIC TASKS OVER THE INTERNET) TO SPREAD EMAIL SPAM AND LAUNCH DOS
ZERO DAY EXPLOIT
THREAT OR ATTACK THAT EXPLOITS A PREVIOUSLY UNKNOWN VULNERABILITY IN A COMPUTER APPLICATION OR OPERATING SYSTEM THAT DEVELEPORS HAVE NOT HAD TIME TO ADDRESS AND PATCH.
SPYWARE
SOFTWARE THAT AIDS IN GATHERING INFORMATION ABOUT A PERSON OR ORGANIZATION WITHOUT THEIR KNOWLEDGE. SENDS INFORMATION TO OTHER ENITITES.
LOGIC BOMB
A CODE INTENTIONALLY INSERTED INTO A SOFTWARE SYSTEM THAT WILL SET OFF A MALICIOUS FUNCTION WHEN SPECIFIC CONDITIONS ARE MET.
KEYLOGGERS
SOFTWARE THAT LOGS EVERY KEYSTROKE AND WRITES IT TO A FILE.
PRIVELAGE ESCALATORS
USER WHO GAINS ELEVATED ACCESS TO RESOURCES THAT ARE NORMALLY PROTECTED FROM AN APPLICATION OR USE.
DENIAL-OF-SERVICE
AN ATTEMPT TO MAKE A MACHINE OR NETWORK RESOURCE UNAVAILABLE TO ITS INTENDED USERS. PING OF DEATH.
DISTRIBUTED-DENIAL-OF-SERVICE
LARGE SCALE DENIAL OF SERVICE