with 100% Correct Answers | Verified |
Latest Update
BoundaryiProtectioniDevicesi-iCorrectiAnswer-Proxies
Gateways
Routers
Firewalls
DataiDiodes
Guards
EncryptediTunnels
ExternaliTimeiSourcesi-iCorrectiAnswer-GPS
GLONASSi-iGlobaliNavigationiSatelliteiSystem
Galileo
FR-7i-iResourceiAvailabilityiincludes:i-iCorrectiAnswer-DoSiProtection
ResourceiManagementi(PreventiResourceiExhaustion)
ControliSystemiBackup
ControliSystemiRecoveryi&iReconstitution
EmergencyiPower
,NetworkiandiSecurityiConfigiSettings
LeastiFunctionality
Controlisystemicomponentiinventory
TypesiofiSecurityiLevelsi(SLs)i-iCorrectiAnswer-*iTargetiSLsi(SL-T)
*iAchievediSLsi(SL-A)
*iCapabilityiSLsi(SL-C)
*iInitialiSL
FoundationaliRequirementsi(FR)i-iCorrectiAnswer-
1)iIdentificationiandiAuthenticationiControli(IAC)
2)iUseiControli(UC)
3)iSystemiIntegrityi(SI)
4)iDataiConfidentialityi(DC)
5)iRestrictediDataiFlowi(RDF)
6)iTimelyiResponseitoiEventsi(TRE)
7)iResourceiAvailabilityi(RA)
SecurityiLeveliDefinitionsi-iCorrectiAnswer-SL-
0:iNoispecificirequirementsiorisecurityiprotectioninecessary
SL-1:iProtectioniagainsticasualioricoincidentaliviolation
,SL-
2:iProtectioniagainstiintentionaliviolationiusingisimpleimeansiwithilowir
esources,igenericiskillsiandilowimotivation
SL-
3:iProtectioniagainsiintentionaliviolationiusingisophisticatedimeansiwit
himoderateiresources,iIACS-specificiskillsiandimoderateimotivation
SL-
4:iProtectioniagainsiintentionaliviolationiusingisophisticatedimeansiwit
hiextendediresources,iIACS-specificiskillsiandihighimotivation
FR-1iIdentificationiandiAuthenticationiControli(IAC)i-iCorrectiAnswer-
*iHumaniuseriidentificationiandiauthentication
*iS/Wiprocessesiandideviceiidentificationiandiauthentication
*iAccountimanagement
*iIdentifiedimanagement
*iAuthenticatorimanagement
*iWirelessiaccessimanagement
*iPasswordistrength
*iPKIicertificates
*iStrengthiofiPubliciKeyiauthentication
*iAuthenticatorifeedback
*iUnsuccessfuliloginiattempts
*iSystemiuseinotification
*iAccessiviaiuntrustedinetworks
, FR-2iUseiControli(UC)i-iCorrectiAnswer-*iAuthenticationienforcement
*iWirelessiuseicontrol
*iUseicontroliforiportableiandimobileidevices
*iMobileicodei(Java,iPDF,ietc.)
*iSessionilock
*iRemoteisessionitermination
*iConcurrentisessionicontrol
*iAuditableievents
*iAuditistorageicapacity
*iResponseitoiauditiprocessingifailures
*iTimestamps
*iNon-repudiation
FR-3iSystemiIntegrityi(SI)i-iCorrectiAnswer-*iCommunicationiintegrity
*iMaliciousicodeiprotection
*iSecurityifunctionalityiverification
*iS/Wiandiinformationiintegrity
*iInputivalidation
*iDeterministicioutput
*iErrorihandling
*iSessioniintegrity