Term
|
Definition
| A concept in which multiple layers of security controls (defense) are placed throughout an IT system. |
|
|
Term
|
Definition
| Any code that is part of a software system that is intended to cause security breaches or damage to a system. |
|
|
Term
|
Definition
| A computer that has been compromised and used to perform malicious tasks under remote direction. |
|
|
Term
|
Definition
| Used to spread email spam and launch Denial-of-Service attacks. |
|
|
Term
|
Definition
| A threat or attack that exploits a previously unknown vulnerability in a computer application or operation system that developers have not had time to address and patch |
|
|
Term
|
Definition
| Software that aids in gathering information about a person or organization without their knowledge. Used to send information to another entity or assert controls over a computer without knowledge. |
|
|
Term
|
Definition
| A code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. |
|
|
Term
|
Definition
| Surveillance software that has the capability to record every keystroke you make to log a file. |
|
|
Term
|
Definition
| User who gains elevated access to resources that are normally protected from an application or use |
|
|
Term
|
Definition
| An attempt to make a machine or network resource unavailable to its intended users. |
|
|
Term
|
Definition
| A piece of software that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on a computer software, hardware, or something electronic (computerized). |
|
|
Term
|
Definition
| An all-encompassing communication project of the United States DoD. |
|
|
Term
|
Definition
| Reducing vulnerabilities that may lead to an attack on a computer system. |
|
|
Term
|
Definition
| An attack on a computer system with the intention of finding security weaknesses, potentially gaining access to it. |
|
|
Term
|
Definition
| An attempt to gain access to a computer and its files through a known or probable weak point in the computer system. |
|
|
Term
|
Definition
| An electronic signature that can be used by someone to authenticate the document, file, or email |
|
|
Term
|
Definition
| A service that validates the integrity of a digital signature. |
|
|
Term
| Information Assurance Manager (IAM) |
|
Definition
| oversee all IAO’s, ensure security instructions, guidance and SOP’s are maintained ands implemented |
|
|
Term
| Information Assurance Officer (IAO) |
|
Definition
| assist the IAM in meeting the duties and responsibilities of network security. |
|
|
Term
| Information System Security Officer (ISSO) |
|
Definition
| configure and operate IA and IA-enabled technology in accordance with DoD information system IA Policies and establish and manage authorized user accounts for DoD information systems. |
|
|
Term
| Describe electronic spillage |
|
Definition
| When a file of high classification gets placed on a lower classification system it creates an electronic spillage. |
|
|
Term
| Department of the Navy (DoN) Application and Database Management System (DADMS) |
|
Definition
| An authoritative source for data regarding DoN IT systems, including National Security Systems, Registration of mission-critical, mission-essential and mission-support systems. |
|
|
Term
| Identify organizations that conduct vulnerability assessments |
|
Definition
Navy Cyber Defense Operations Command (NCDOC) Red Team Blue Team |
|
|
Term
| Intrusion Detection System (IDS) |
|
Definition
| A device or software application that monitors network or system activities for malicious activity or policy violations and produces reports to a management station. |
|
|
Term
|
Definition
| IDS auto-responds to the suspicious activity by resetting the connection or by reprogramming the firewall to block network traffic from the suspected malicious source. |
|
|
Term
|
Definition
| IDS detects a potential security breach, logs the information and signals an alert on the console or owner. |
|
|
Term
| Intrusion Prevention System (IPS) |
|
Definition
| Software that prevents suspicious activity by resetting the connection or blocking network traffic from the malicious source. |
|
|
Term
| Host-Based Security System (HBSS) |
|
Definition
| Software applications used within the Department of Defense (DoD) to monitor, detect and counterattack against the DoD computer networks and systems. |
|
|