Flashcards in UNIT 9 Deck (14):
Five National Cyberspace Security Protocols
National Cyberspace Security Response System
National Cyberspace Security Threat and Vulner. Red.
National Cyberspace Security Awareness and Training
Securing Govt. Cyberspace
National Security and International Cyberspace Security Cooperation
According to Information Transport Systems (ITS), netD must provide the follwoing
What is the primary detection tool deployed across the Air Force Enterprise Network (AFEN)
Automated Security Incident Measurement (ASIM)
What are used to identify and report vulnerabiliteis at the host and network level to project networks directly managed by the NCC?
Provides the capability to control the number of application session while preserving access to the base network
Hosted on the SIPRNET and is a repository for all approved information systems utilized in the Air Force.
(PPS) Ports, Protocols and Services Database /Matrix
What enables system admins to have complete visibility to what is happening on their networks through pre-defined reports
Host Based Security Systems (HBSS)
ePO ePolicy Orchestrator
Host Intrusion Prevention System (HIPS)
Device Control Module (DCM)
Policy Auditor (PA)
Rogue System Detection (RSD)
A piece of software that grabs all of the traffic flowing into and out of a computer attached to a network.
A barrier to keep those with less than friendly intentions away from your IS whether internal or external to your network.
Used to allow remote access into otherwise private networks and resources
Two forms of encryption
Symmetric and asymmetric
____ key encryption is asymmetric and uses two keys ..public to encrypt and private to decrypt the data