Part 1 Flashcards
(99 cards)
What is a computer environment connected by one or more internal networks under the control of a single authority and security policy
Enclave
What do enclaves provide?
Cybersecurity capabilities such as boundary defense, key management, incident response, and delivery of common applications such as automation and email.
What is a networking backbone of an enclave responsible for connecting system devices and hosts by providing data transport capabilities such as operational or wide area and backbone networks that provides for the application of cybersecurity controls?
Network Environment
What are local area networks, servers, hosts, operating systems, peripherals, and applications apart of?
Computing Environment
What are the requirments for Cyber Secuity Work Force personnel?
Approved military training
Academic Degrees
Commercial Cyber Security Certificates
Approved Training and credentials
What is an object or person or entity that is a danger to an information system?
Threat
What are Insider Threats?
Junior and non trained personnel
Disgruntled personnel
System Administrators
What are outsider threats?
Nation states Hackers Terrorists Organized crime Industrial competitors Other criminal elements International press
Why do Administrators pose an increased threat?
Access to systems
Administrative passwords
Extensive knowledge of seucrity settings
Extensive training in attack methodologies
Why is it important to disable group accounts?
Group accounts remove non repudiation
What is a weakness that can be exploited in an information system or its components?
Vulnerability
What is the likelihood that a vulnerability can be exploited?
Risk
How to we classify a network’s vulnerabilities?
DISA severity codes I - immediately II - within 90 days III - within 180 days IV - within a year
What does IAVA stand for and what is the priority associated with it?
Information Assurance Vulnerability Alert
High priority
What does IAVB stand for and what is the priority associated with it?
Information Assurance Vulnerability Bulletin
Medium Priority
What does IAVT stand for and what is the priority associated with it?
Information Assurance Vulnerability Technical Advisory
Low priority
What is self propagating and does not require user action?
Worm
What is self replicating and can corrupt or delete data and requires user interaction?
Virus
What is malware that is disguised as a legitimate program, does not replicate, and requires interaction with the hacker?
Trojan
What is a piece of code designed to execute when conditions are met?
Logic bomb
What aquires information by social means?
Social Engineering
What is phishing that appears to be from within the organization?
Spear phishing
What is unsolicitated electronic messages that can be malware?
Spam
What are three types of password attacks
Dictionary attacks- uses all the words in a dictionary or txt file
Hybrid- dictionary using alpha numberic symbols and numbers
Brute force- takes the most time, most powerful cracking method, random generation of passwords and associated hashes