Block 1 - Units 9-12

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/87

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

88 Terms

1
New cards

NAC - Network Access Control (Unit 9)

Security solution that enforces conditions before allowing system access to a network.

2
New cards

Agent-Based NAC (Unit 9)

Uses software installed on client; can be permanent or dissolvable.

3
New cards

Permanent Agent (Unit 9)

Continuously monitors client system for NAC compliance.

4
New cards

Dissolvable Agent (Unit 9)

Runs NAC check once, does not remain installed.

5
New cards

Agentless NAC (Unit 9)

Does not require agent software on client.

6
New cards

Authentication (Unit 9)

Process of verifying user identity.

7
New cards

Something You Know (Unit 9)

Authentication factor such as a password or PIN.

8
New cards

Something You Have (Unit 9)

Authentication factor such as a token, smart card, or code sent by text.

9
New cards

Something You Are (Unit 9)

Authentication factor such as fingerprints or voice recognition.

10
New cards

Somewhere You Are (Unit 9)

Authentication factor based on location, such as GPS or IP address.

11
New cards

Something You Do (Unit 9)

Authentication factor based on user behavior such as typing patterns.

12
New cards

Multifactor Authentication (Unit 9)

Uses two or more different authentication factors; much safer than one.

13
New cards

SSO - Single Sign-On (Unit 9)

Authenticate once and gain access to multiple systems; risk is wider compromise.

14
New cards

IEEE - Institute of Electrical and Electronics Engineers 802.1X (Unit 9)

Standard requiring valid credentials for network access.

15
New cards

Host Health Check (Unit 9)

Scan system for updates, antivirus, firewall before granting network access.

16
New cards

Terms of Usage (Unit 9)

Users may have to accept terms before network access.

17
New cards

AAA - Authentication, Authorization, Accounting (Unit 9)

Framework for controlling access and auditing usage.

18
New cards

Identification (Unit 9)

Presenting credentials like a username or smartcard.

19
New cards

Authentication (Unit 9)

Verifying credentials match identity.

20
New cards

Authorization (Unit 9)

Determines what user can access or do.

21
New cards

Accounting (Unit 9)

Records user activity such as time, bandwidth, or resource use.

22
New cards

RADIUS - Remote Authentication Dial-In User Service (Unit 9)

AAA protocol using UDP for remote access.

23
New cards

DIAMETER (Unit 9)

Newer AAA protocol using TCP, more secure and reliable.

24
New cards

Application Security (Unit 9)

Protecting integrity of software applications.

25
New cards

P2P - Peer-to-Peer File Sharing Risk (Unit 9)

Common method of spreading malicious code.

26
New cards

Scripting (Unit 9)

Automated commands that can modify a system.

27
New cards

XSS - Cross-Site Scripting (Unit 9)

Injection of malicious code into websites to steal sessions or data.

28
New cards

Vulnerability Prevention (Unit 9)

Keep apps/OS patched, configure securely, harden apps.

29
New cards

CSRF - Cross-Site Request Forgery Prevention (Unit 9)

Disable "remember me" browser features; prevents cookie theft.

30
New cards

IDS - Intrusion Detection System (Unit 9)

Detects suspicious activity and alerts admins.

31
New cards

IPS - Intrusion Prevention System (Unit 9)

Detects suspicious activity and takes corrective action.

32
New cards

HIDS - Host Intrusion Detection System (Unit 9)

Host-based IDS.

33
New cards

HIPS - Host Intrusion Prevention System (Unit 9)

Host-based IPS.

34
New cards

NIDS - Network Intrusion Detection System (Unit 9)

Network-based IDS.

35
New cards

NIPS - Network Intrusion Prevention System (Unit 9)

Network-based IPS.

36
New cards

Hardware Security (Unit 9)

Protects systems via physical controls and hardware encryption.

37
New cards

Secure Boot / Trusted Boot (Unit 9)

BIOS settings to prevent malware loading during startup.

38
New cards

Removable Storage Threat (Unit 9)

USB drives can spread worms; often disabled on DoD systems.

39
New cards

HBSS - Host-Based Security System (Unit 9)

DoD system that alerts on unauthorized USB use.

40
New cards

Theft Prevention (Unit 9)

Secure servers, routers, and portable devices with locks, safes, or controlled access.

41
New cards

Hardware Encryption (Unit 9)

Uses chips for faster encryption than software alone.

42
New cards

FDE - Full Disk Encryption (Unit 9)

Encrypts entire storage drive.

43
New cards

TPM - Trusted Platform Module (Unit 9)

Hardware chip storing cryptographic keys.

44
New cards

HSM - Hardware Security Module (Unit 9)

Dedicated device storing cryptographic processors.

45
New cards

Firewalls (Unit 10)

Hardware/software that filters network traffic.

46
New cards

Allowlisting (Unit 10)

Deny all by default, only allow trusted traffic (most secure).

47
New cards

Denylisting (Unit 10)

Allow all by default, block known bad traffic.

48
New cards

Software Firewall (Unit 10)

Installed on a single system; also called personal or host firewall.

49
New cards

Windows Firewall (Unit 10)

Built-in firewall with configurable rules.

50
New cards

Hardware Firewall (Unit 10)

Stand-alone device filtering traffic for an entire network.

51
New cards

Packet Filtering Firewall (Unit 10)

Stateless filtering based on IP/port (least advanced).

52
New cards

Stateful Inspection Firewall (Unit 10)

Allows return traffic for outbound requests.

53
New cards

Application-Layer / Next-Gen Firewall (Unit 10)

Combines packet, stateful, and deep inspection; may include IDS/IPS.

54
New cards

Deep Packet Inspection (Unit 10)

Examines packet contents to block threats.

55
New cards

Security Zones (Unit 10)

Private Zone (LAN), DMZ - Demilitarized Zone (servers for public), Public Zone (internet).

56
New cards

DMZ - Demilitarized Zone (Unit 10)

Network segment between firewalls for public-facing servers.

57
New cards

ESD - Electrostatic Discharge (Unit 11)

Sudden electricity flow between objects.

58
New cards

Grounding (Unit 11)

Provides safe path for electricity to ground.

59
New cards

Bonding (Unit 11)

Minimizes differences between conductive objects.

60
New cards

AFI - Air Force Instruction (Unit 11)

Directs standardized Air Force actions.

61
New cards

AFMAN - Air Force Manual (Unit 11)

Manual providing detailed guidance.

62
New cards

MIL-STD - Military Standard (Unit 11)

U.S. defense standardization documents.

63
New cards

STIG - Security Technical Implementation Guide (Unit 11)

DISA security configuration standard.

64
New cards

SOP - Standard Operating Procedure (Unit 11)

Step-by-step organizational instructions.

65
New cards

DoDI - Department of Defense Instruction (Unit 11)

Establishes policy and general guidance.

66
New cards

DoDM - Department of Defense Manual (Unit 11)

Provides detailed procedures for carrying out DoDI policy.

67
New cards

CIRT - Computer Incident Response Team (Unit 12)

Handles security incidents and documents them.

68
New cards

Incident Response Team Leader (Unit 12)

Ensures team readiness and coordination.

69
New cards

Technical Specialist (Unit 12)

Assesses and corrects technical issues.

70
New cards

Documentation Specialist (Unit 12)

Records incident response process.

71
New cards

Legal Advisor (Unit 12)

Ensures compliance with laws and regulations.

72
New cards

Incident Response Plan (Unit 12)

Defines categories, roles, reporting, and exercises for incident handling.

73
New cards

Event (Unit 12)

Observable system occurrence, may indicate incident.

74
New cards

Incident (Unit 12)

Jeopardizes Confidentiality, Integrity, or Availability (CIA).

75
New cards

Event Categories (Unit 12)

Assign severity and description to guide responses.

76
New cards

Classified Messaging Incident (Unit 12)

Sending classified data to a lower-level system; requires investigation.

77
New cards

First Responder (Unit 12)

First person to detect/respond; goal is containment.

78
New cards

Incident Handling Step 1 (Unit 12)

Detection and reporting of events.

79
New cards

Incident Handling Step 2 (Unit 12)

Preliminary analysis and categorization.

80
New cards

Incident Handling Step 3 (Unit 12)

Preliminary response actions such as containment.

81
New cards

Incident Handling Step 4 (Unit 12)

Incident analysis to find technical details and root cause.

82
New cards

Incident Handling Step 5 (Unit 12)

Response and recovery; restore systems.

83
New cards

Incident Handling Step 6 (Unit 12)

Post-incident analysis; lessons learned.

84
New cards

Root Cause Analysis (Unit 12)

Steps to determine why incident occurred and how to prevent recurrence.

85
New cards

CCIR - Commander's Critical Information Requirement (Unit 12)

Determines if incident must be reported within one hour.

86
New cards

Cyber Incident Report (CIR) (Unit 12)

Detailed incident analysis including attacker and vector.

87
New cards

Network Intelligence Report (NIR) (Unit 12)

Focuses on adversary or suspicious network activity.

88
New cards

Postmortem Report (Unit 12)

Provides results of incident analysis to affected units.