It's Just IA
IA, The Basics
Security?Really!
Call Security
IA 360
100

This document outlines what your responsibilities are as users of this customers information systems.

What are the Rules of Behavior?

100

These documents are required to move equipment into and out of a classified area.

What are IT Media Equipment Entry/Exit Form and Form 560-3?

100

This online system manages all of your DHS training records.

What is PALMS?

100

This person is responsible for the overall procurement, development, integration, modification, or operation and maintenance of an information system?

Who is the Information System Owner?

100

The process used to identify software programs that are not authorized to execute on an information system.

What is Blacklisting?

200

This document provides the complete list of  approved hardware and software products in use on your enterprise network.

What is the Core System Security Plan (SSP)?

200

The Vulnerability Assessment Management team provides SCAP scans, clean STIG checklist and clean vulnerability scans to facilitate this process.

What is assessment and authorization (A&A)?

200

This is defined as a weakness or a gap in a security system.

What is a vulnerability?

200

This is what you provide to the VAM team to initiate a vulnerability or SCAP scan.

What are IPs/Hostnames?

200

This second special account type is use to administer the DHS enterprise devices (3 letter acronym).

What is a PAR account?

300

Operating System, Enterprise Application, Router, Switch, SAN, Network Device, Desktop PCs, Travel Kit, Tablet, SVTC, VoSIP phones all require this prior to network connectivity.

What is an authorization to connect (ATC)?

300

This efficient method is available to assist you with contacting your SENS3 IA point of contact.

What is the Security Services Support Matrix?

300

This DHS system allows users to upload and transfer files from one network to another network.

What is SWIFT?

300

The Program Manager assumes this role as part of the assessment and authorization process.

What is Information Systems Owner?

300

Missing Clearance info and fineAccessControl is a common issue when accessing this system.

What is Helix?

400

The approved configuration ensuring all open DISA STIG settings, critical, high and moderate findings are mitigated on a new operating system prior to network connection.

What is a certified image?

400

The process of verifying a person is actually the person they say they are before allowing them access to the network.

What is authentication?

400

This 256-bit length hashing algorithm is replacing the older less secure 160-bit hashing algorithm lengths.

What is SHA2?

400

This team provides all local Lorton facility security support and is augmented by the alternate information system security officers for physical security checks and support.

Who are the Special Security Representatives?

400

This agency publishes the STIGs that are the starting point for hardening most applications, operating systems and network devices.

Who is DISA?

500

This representative that supports the SSRs and scans disc for approval into SCIFs and controlled classified areas.

What are Alternate Information System Security Officers (AISSOs)?

500

The request that needs to be completed for a new small non-enterprise application approval.

What is a Software Assurance Request Form?

500

This credential is used to digitally identify an organization, hardware device, application, and information artifacts - but not a human actor.

What is a Non-Person Entity (NPE)?

500

These three key documentations are needed to provide a draft SSP and obtain an IATT/ATP from the ISSM.

What is the SIP, Physical Accreditation Letter and Hardware Inventory?

500

This group is responsible for conducting initial and validation compliance scans for system approval on HSDN.

What is the SENS3 Vulnerability Assessment Management (VAM) team?

M
e
n
u