Define IA
IA: Information Assurance; information operations that protect/defend data and information systems by ensuring their availability, integrity, authentication, confidentially, and non-repudation
Define Certification
Comprehensive evaluation of the technical and non-technical security features
Define Accreditation
Official management decision to operate an IS in a specified environment
Define DAO (Designated Approving Official)
Official with authority to formally assume responsibility for operating a system at an acceptable level of risk
What is a System Security Plan?
Formal document that fully describes planned security tasks
Deinfe ATO
ATO: Authority to Operate; formal declaration by DAO that information system is approved to operate
Definte IATO
IATO: Interim Authority to Operate; temporary authorization granted by DAA or SCO
What is Configuration Management?
Identifies, controls, accounts for, and audits all changes to site or IS during its design, development & operational lifecycle
Discuss security procedures involved when performing cross-domain transfers
Scan all info storage media and e-mail attachments introduced prior to its use on any SCI system
What is Risk Management?
Process that allows IT managers to balance the operational and economic costs of protective measures and achieve gains in mission capability by protecting the IT systems and data that support their organizations’ missions
Define the 5 attributes of IA
List and define 9 categories of computer incidents
Describe the DoN World Wide Web Security Policy
All DoN sites must have a clearly articulated purpose, approved by commander, and support command’s core competency mission
Define IAVA
IAVA: Information Assurance Vulnerability Alert; an announcement of high risk computer software
Define IAVB
IAVB: Information Assurance Vulnerability Bulletin; announcement of a medium risk computer
Define CTO
CTO: Communications Tasking Order; DoD-wide instruction that promulgates mandatory changes and how communications are handled
Define NTD
NTD: Navy Telecommunications Directive; widely disseminated naval message giving an order/direction about a certain IT function that needs to be complied with
Define Service Pack
A collection of updates, fixes and/or enhancements
Define vulnerability assessment
Testing process to identify weakness
Explain the difference between vulnerability and threat
Vulnerability: Actual weakness in an information system
Threat: Malicious actor, circumstance or event with potential to adversely impact organizational operations
State the duties/responsibilities of the IAM (Information Assurance Manager)
Define CCRI
Command Cyber Readiness Inspection: formal inspection process that holds commanders accountable for respective security posture
State NAVYCYBERFOR’s role in a CCRI
Implementing rigorous grading criteria