Week 1 Flashcards
(67 cards)
Computer environment connected to one or more internal networks under control of a single authority.
Enclave
What does an enclave consist of?
- incident detection and response
- key management
- delivery of application
what are two environments of an enclave?
NE: networking environment
CE: computing environment
Give an example of a network environment
Switches, routers, networking backbone
What kind of users are at IAT Level 2 and what do they do?
SYSADMINS. They focus on threats and vulnerabilities
What is a high priority alert that needs to be fixed by a certain date?
IAVA
What are he two categories of threats?
Environmental
Human
What is a vulnerability?
A weakness that has the POTENTIAL to be exploited.
How many DIsA severity codes are there?
4
Which DISA severity code is the most severe?
CAT 1
How many days do you have to fix a CAT 2?
90
How many days do you have to fix a CAT 3?
180
How many days do you have to fix a CAT 4?
1 year
Who tries to exploit vulnerabilities on a system or network?
Hacker
What kind of people encore fear?
Cyber terrorists
What is self replicating and needs to be attached to something in order to affect a system?
Virus
What is self-propagating and does NOT need any user interaction?
Worm
What is a time and code related virus?
Logic bomb
What is an attempt to get credit card details and whatnot via email?
Phishing
What is a prompt to forward emails?
Internet hoax
What are some password crackers,
Dictionary (thesaurus)
Hybrid
What are actions that need to be taken to continue operations if a disaster happens. Before during and after.
Contingency Plan
What are the steps of risk management?
Assessment
Mitigation
Evaluation and continual assessment
What is the first step of risk management?
Assessment