Cyber Security Mission
Computing Responsibilities
Availability
The Enemy
Protocols
100
This core principle of information security ensures information is available only to authorized persons
Confidentiality
100
These grant access to computers and are never shared.
Passwords
100
To apply or maintain permissions to prevent an account from getting information they are not authorized to see while making the information available to those who are authorized.
Access Control
100
They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.
Hackers
100
Two protocols that run on top of the Internet protocol.
TCP/UDP
200
This core principle of information security ensures information is not accidentally or maliciously changed
Integrity
200
This action can prevent unauthorized access to your computer sessions when you step away.
"Lock before you leave" or locking your computer
200
An identifier that uniquely tracks actions to individuals.
Account or Login ID
200
Is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.
Insider threat
200
There are seven layers in this model, one being the transport layer.
OSI Model
300
This core principle of information security ensures computers and information are effective in supporting the mission.
Availability
300
This can prevent loss of data in case of hard drive failure.
Backups
300
It is a word or phrase that verifies that you and only you had access to the account.
Passwords
300
A program or file specifically developed for the purpose of doing harm.
Malware
300
This is layer four of the TCP/IP model.
Transport layer
400
This is the process of evaluating vulnerabilities and threats, identifying countermeasures, and applying mitigating actions to reduce risk to an acceptable level based on the value of the information.
Risk Management
400
This means examining links URLs before using them and is also an ORNL Cyber Security slogan
"Think Before You Link"
400
Functional managers classify data and grant approval to those whose jobs require access to the information.
Data Managers
400
Attempts to acquire personal information such as usernames, passwords, bank account or credit card information via email.
Phishing
400
This method is used by TCP to set up a TCP/IP connection over an Internet Protocl based network.
Three-way Handshake
500
It can be defined as ‘the posture taken to protect people, assets, data and technology across an entire enterprise.’
Security
500
A necessary process to limit the kinds of hardware and software which minimizes the number of different vulnerabilities and reduces exposure to security weaknesses.
Standardization or System Hardening
500
The focus on the resistance against attacks that aim at disrupting the offer of services.
Availability
500
The weakest link in every computer system. The one person who can through thoughtlessness, unawareness or accident, cause loss of work products through deletion, corruption or improperly safeguarding data.
People
500
This protocol provides a set of rules to transfer files, videos, and images over the world wide web.
HTTP (Hypertext Transfer Protocol)