what the army it user access agreement used for ?
the army it user agreement is a requirement within the policy established in AR 25-2, Army Cybersecurity; and the proponent agency Office of army chief information officer to allow access to department of defense ( DoD ) information
how many parts are there in an Army User Access Agreement ?
3
Name the parts of an Army IT User Access Agreement?
Part I- Acknowledgement and consent
Part II- Information System Access
Part III- Acknowledgment With Signature
Define revocability as it pertais to Army IT User Access Agreement
army resources is a revocable privilege and s subject to content monitoring and security testing.
Whats the purpose of the Cyber Awareness challenge
is to influence behavior, focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to Dod Information systems.
whats SAAR ?
System Authorization Access Request
what is the name of a DD Form 2875
SAAR
How many parts are on a DD Form 2875
there are 4 parts to a dd form 2875
what training is submitted with the DD Form 2875?
Cyber Awareness Training
What are the 4 parts to a DD Form 2875?
Establishing and modifying User id
Endorsement from the users Supervisor or Government sponsor
Verification of back ground or clearance
Specifically identify the access required by the user
whats ATCTS?
Army Train and Certification Tracking System
ATCTS provides ?
It provides managers at all levels:
capability to report and manage their IA Workforce
general user population training
certification statistics
summary report of certification voucher distribution
The information Assurance (IA) workforce consists of personal with information system privileged access?
admin or root
working IA functions
technical
Management
computer network defense service provider
architect and engineer positions
who has access to ATCTS
Military personal , DoD civilians and Contractors
What is Active Directory ?
is an umbrella term for a collection of windows services used to manage a primarily Window environments.
what is AD DS?
(a server with AD DS installed is referred as a Domain Controller(DC))
What is dc Responsible for ?
its responsible for authenticating users and devices on the network.
why is AD important?
it allows a IT Department to store information about their network in a logical structure.
what are the 4 different AD structures
Forest -->tree-->domain-->Organizational unit(OU)
from biggest to smallest-->
What is the CIA Triad?
Confidentiality :protection of info in the system so that an unauthorized person cannot access it
Integrity : the protections of system data from intentional or accidental unauthorize changes ensuring data is trustworthy or untampered
Availability: the guarantee that a computer system is available or accessible by an authorized user whenever it is needed; Maintaining data accessibility
what is Public Key Infrastructure (PKI)?
(1990s)to help with encryption keys through the issuance and management of digital certificates. its done to protect senstive data and provide a unique digital identifies for users , deices , applications, secure end to end comunications
What are CASs?
Certification Authorities are responsible for creating digital certificates. they own the policies , practices and procedures for vetting recipients and issuing the certificates. the certificates are basically the drivers license and the CAs is the DMV.
What are cryptographic Algorithms ?
highly complex mathematical formulas used to encrypt and decrypt messages.
What are two types of encryption methods?
Asymmetric- Requires a private key to decrypt and public key encrypt(Better Security)(requires digital signatures)(BlockChain)(public key infrastructure)
Symmetric- uses a shared key to encrypt and decrypt a message (banking)(data storage)
What is a User Account ?
is an identity created for a person in a computer or computing system.