107.1 Define the following terms: IA; DCO; OCO
107.2 Define the following: Certification; Accredidation; NAO; System Security Plan; ATO; IATO; Configuration Management
a. Certification – The comprehensive evaluation of the technical and non-technical security features of an IS and other safeguards, made as part of and in support of the accreditation process, to establish the extent to which a particular design and implementation meet a specified set of security requirements.
b. Accreditation – Process in which certification of competency, authority, or credibility is presented. The accreditation process ensures that their certification practices are acceptable, typically meaning that they are competent to test and certify third parties, behave ethically and employ suitable quality assurance.
c. DAA NAO – The Navy Authorizing Official (formerly the DAA) is responsible for authorizing the system’s operation based on achieving and maintaining an acceptable risk posture
d. System Security Plan – Provides an overview of the security requirements of the system and describe the controls in place or planned, responsibilities and expected behavior of all individuals who access the system.
e. ATO Authority to Operate – The official management decision to authorize operation of an information system and to explicitly accept the residual risk to agency operations, agency assets, or individuals.
f. IATO Interim Authority to Operate - Temporary authorization granted by a DAA for an information system to process information based on preliminary results of a security evaluation of the system. (To be replaced by ATO and POA&M).
g. Configuration Management – Management of security features and assurances through control of changes made to hardware, software, firmware, documentation, test, test fixtures, and test documentation throughout the life cycle of an IS.
107.3 Discuss security procedures involved when performing cross-domain transfers.
107.4 Discuss risk management.
107.5 Define the five attributes of Cyber Security:
a. Confidentiality – Assurance that information is not disclosed to unauthorized individual, processes or devices.
b. Integrity – Assurance that information is not modified by unauthorized parties or in an unauthorized manner
c. Availability – Assurance of timely, reliable access to data and information systems by authorized users.
d. Non-repudiation – Assurance the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the data.
e. Authentication – Assurance of the users identity. Designed to establish the validity of a transmission, message, or originator, or means of verifying an individual’s authorization to receive specific categories of information.
107.6 List and define 9 categories of computer incidents:
107.7 Describe the DoN World Wide Web Security Policy.
107.8 Define the following: IAVA; IAVB; CTO; NTD; Service Pack; Patch
a. IAVA – Information Assurance Vulnerability Alert. Addresses severe network vulnerabilities resulting in immediate and potentially severe threats.
b. IAVB – Information Assurance Vulnerability Bulletin. Addresses new vulnerabilities that do not pose an immediate risk.
c. CTO – Computer Tasking Order. A formal tasking order that contains detailed guidance and missions for each component to accomplish
d. NTD - Navy Telecommunications Directive. A widely disseminated Naval Message giving an order or direction about a certain IT function that needs to be complied with.
e. NIA/NIB/OIA/OIB Service Pack - A collection of updates, fixes, or enhancements to a software program delivered in the form of a single installable package.
f. Patch A fix for a vulnerability or operational enhancement
107.9 Define vulnerability assessment.
107.10 Explain the difference between vulnerability and threat.
107.11 State the duties and responsibilities of the ISSM and ISSO.
107.12 Explain CSWF Specialty Codes and responsibilities.
107.13 Discuss the role and responsibilities of Navy Red and Blue teams.
107.14 Define CCRI CCORI and NAVIFOR’s role during the process.
107.15 Explain what constitutes PII and the importance of safeguarding.
107.16 Explain why the U.S. Navy only uses “.mil” email addresses on government systems.