INFORMATION ASSURANCE MANUAL
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
show | COMMANDANT INSTRUCTION M5500.13B
🗑
|
||||
The ____________ establishes comprehensive and uniform Information Technology (IT) security policies for the United States Coast Guard (CG). | show 🗑
|
||||
show | The Information Assurance (IA) program
🗑
|
||||
The IA program requirements and guidance are applicable to all Information Systems (IS) owned by or operated on behalf of the ________. | show 🗑
|
||||
show | Memorandum of Agreement
🗑
|
||||
Policies in the INFORMATION ASSURANCE Manual are subdivided into three major control areas: | show 🗑
|
||||
This policy focuses on management of the information system and the management of system risk. These controls consist of techniques and implementation of processes that are normally addressed as a function of management. | show 🗑
|
||||
This policy addresses security methods of the mechanisms primarily implemented and executed by people. These controls improve the security of a group, a particular system, or a group of systems. | show 🗑
|
||||
focuses on security controls that a computer system executes. These controls can provide automated protection for unauthorized access or misuse, facilitate detection of security violations, and support security requirements for applications and data. | show 🗑
|
||||
The IA program is designed to comply with: | show 🗑
|
||||
show | Foreign Intelligence Information
🗑
|
||||
Information is ______ if it has been determined pursuant to E.O. 12958 or any predecessor order or by the Atomic Energy Act of 1954, as amended, to require protection against unauthorized disclosure and is marked to indicate its _________ status. | show 🗑
|
||||
show | General Support System (GSS)
🗑
|
||||
operations that protect and defend information and information systems by ensuring confidentiality, integrity, availability,authenticity, and nonrepudiation. | show 🗑
|
||||
show | a. Owned, leased, or operated by an information user, program sponsor, or an organizational command thereof; or b. Operated by a contractor on behalf of the CG.
🗑
|
||||
show | Information Technology (IT)
🗑
|
||||
A ________ requires special attention to security because of the potential for risk and the magnitude of the harm resulting from the loss, misuse, or unauthorized access to or modification of the information in the ________. | show 🗑
|
||||
A classified IT is operating in the ________ mode of operation when each user with access to the system: has a valid personnel security clearance for access and a valid need-to-know for all classified information contained within the system. | show 🗑
|
||||
A classified IT is operating in the _______ mode of operation when some users with direct or indirect access to the system, do not have a valid personnel security clearance for access to all classified information on the system. | show 🗑
|
||||
show | System-High Mode of Operation
🗑
|
||||
This type of information may be disclosed to the public without restriction but requires protection against erroneous manipulation or alteration | show 🗑
|
||||
show | Sensitive Information
🗑
|
||||
show | COMDTINST M5260.3 (series)
🗑
|
||||
show | Require written approval from the CIO
🗑
|
||||
show | Classified - Classified information including Confidential, Secret, Top Secret, and higher according to Executive Order 12356, important to National Security.
🗑
|
||||
show | (1) Privacy Act, (2) Unclassified national security related information, (3) FOUO, (4) Other FOUO, (5) Sensitive Security Information (SSI), (6) Other
🗑
|
||||
show | Non-sensitive - Information that does not warrant a higher designation.
🗑
|
||||
Four categories of criticality are defined, although an IS may have components that fit more than one category: | show 🗑
|
||||
What MISSION CRITICAL SYSTEMS Category includes:(1) Intelligence activities. (2) Cryptology activities related to national security. (3) Command and control of military forces. (4) Integral to a weapon or weapons system. (5) System critical to mission | show 🗑
|
||||
show | Mission Critical, Category 1 and 2.
🗑
|
||||
What MISSION CRITICAL SYSTEMS Category includes:systems handling information that is important to the support of deployed and/or contingency forces. | show 🗑
|
||||
What MISSION CRITICAL SYSTEMS Category includes: systems handling information that is necessary for the conduct of day-to-day business, but does not materially affect support to deployed forces or the readiness of contingency forces in the short term. | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
trentonknight