翻訳と辞書
Words near each other
・ Information and Computation
・ Information and Computer Science
・ Information and Consultation of Employees Regulations 2004
・ Information and Content Exchange
・ Information and media literacy
・ Information and Privacy Commissioner
・ Information and Records Management Society
・ Information and Security Service of the Republic of Moldova
・ Information appliance
・ Information architecture
・ Information Architecture Institute
・ Information art
・ Information assurance
・ Information Assurance Security Officer
・ Information Assurance Technology Analysis Center
Information assurance vulnerability alert
・ Information asymmetry
・ Information audit
・ Information Awareness Office
・ Information Based Architecture
・ Information behavior
・ Information bias
・ Information bias (epidemiology)
・ Information bias (psychology)
・ Information Board (Estonia)
・ Information bottleneck method
・ Information Bridge Framework
・ Information broker
・ Information Builders
・ Information capital


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Information assurance vulnerability alert : ウィキペディア英語版
Information assurance vulnerability alert

An information assurance vulnerability alert (IAVA) is an announcement of a computer application software or operating system vulnerability notification in the form of alerts, bulletins, and technical advisories identified by DoD-CERT, a division of the United States Cyber Command. These selected vulnerabilities are the mandated baseline, or minimum configuration of all hosts residing on the GIG. USCYBERCOM analyzes each vulnerability and determines if it is necessary or beneficial to the Department of Defense to release it as an IAVA. Implementation of IAVA policy will help ensure that DoD Components take appropriate mitigating actions against vulnerabilities to avoid serious compromises to DoD computer system assets that would potentially degrade mission performance.
==Information assurance vulnerability management (IAVM) program==
The combatant commands, services, agencies and field activities are required to implement vulnerability notifications in the form of alerts, bulletins, and technical advisories. USSTRATCOM via its sub-unified command USCYBERCOM has the authority to direct corrective actions, which may ultimately include disconnection of any enclave, or affected system on the enclave, not in compliance with the IAVA program directives and vulnerability response measures (i.e. communication tasking orders or messages). USSTRATCOM and USCYBERCOM will coordinate with all affected organizations to determine operational impact to the DoD before instituting a disconnection.
==Background==
On February 15, 1998, the Deputy Secretary of Defense issued a classified memorandum on Information Assurance, that instructed the DISA, with the assistance of the Military Departments, to develop an alert system that ensured positive control of information assurance. According to the memorandum, the alert system should:
* Identify a system administrator to be the point of contact for each relevant network system,
* Send alert notifications to each point of contact,
* Require confirmation by each point of contact acknowledging receipt of each alert notification,
* Establish a date for the corrective action to be implemented, and enable DISA to confirm whether the correction has been implemented.
The Deputy Secretary of Defense issued an Information Assurance Vulnerability Alert (IAVA) policy memorandum on December 30, 1999. Current events of the time demonstrated that widely known vulnerabilities exist throughout DoD networks, with the potential to severely degrade mission performance. The policy memorandum instructs the DISA to develop and maintain an IAVA database system that would ensure a positive control mechanism for system administrators to receive, acknowledge, and comply with system vulnerability alert notifications. The IAVA policy requires the Component Commands, Services, and Agencies to register and report their acknowledgement of and compliance with the IAVA database. According to the policy memorandum, the compliance data to be reported should include the number of assets affected, the number of assets in compliance, and the number of assets with waivers.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Information assurance vulnerability alert」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.