Type of loop in Cyber Physical Systems (CPS) that operates based on pre-set inputs without feedback, offering simplicity and low cost, and is ideal for predictable tasks.
What is Open Loop?
The three dimensions of the Information Environment.
What are Information, Cognitive, and Physical?
Series of publications from the National Institute of Standards and Technology (NIST) to address and support the security and privacy needs of U.S. Federal Government information and information systems.
What is Special Publication (SP) 800 series?
A specific, high-level outcome (an effect) that is unacceptable to the mission owner.
What is a loss?
All devices, internal and external links, operating systems, services, applications, ports, protocols, hardware, software, and other technical aspects of a system required to enable the function of a critical asset; may exist external to the DOD cyberspace
What is Mission Relevant Terrain - Cyber (MRT-C)?
Component of the Cyber Physical Systems (CPS) that makes decisions/control processes based on sensed data.
What are Controllers?
Layer with digital representations of an actor or entity’s identity in cyberspace; comprised of user accounts and account roles/relationships; multiple users may use the same account and a single user may have multiple accounts (social media, email, banking).
What is Cyber-Persona layer?
Work role where a member of the Intelligence Community (IC) provides insight into adversary capability, intent, and TTPs.
What is Intel Support?
Type of problem that have no definite answer, have proposed fixes that are better or worse (not right or wrong), and their cause can be explained by many factors.
What is a Wicked Problem?
Any locality or area, physical or logical, where seizure, retention, or other specified degree of control provides a marked advantage in cyberspace to any combatant.
What is Key Terrain - Cyber?
Department/agency that is the cybersecurity operational lead for the US government.
What is Cybersecurity and Infrastructure Security Agency (CISA)?
Type of ownership in cyberspace where the cyberspace owned or controlled by an adversary.
What is Red?
One of the three components of the NIST Cybersecurity Framework that enables organizations to establish a roadmap for reducing cybersecurity risk and is used to describe current state and/or desired target state of cybersecurity activities.
What are Profiles?
Component of Strategic Thinking that focuses on the analysis of how a system's parts interrelate and how systems work.
What is Systems?
Air Force model for MRT-C that that groups weapon system areas of access into common language.
What is the Wheel of Access?
This department/agency provides reports on cyber intelligence and threats to USG and commercial partners (SIGINT).
What is National Security Agency (NSA)?
Threat to DoD Cyberspace that includes criminal organizations and violent extremist organizations (VEOs).
What is Non-State Actor?
Pillar of Mission Assurance that depends on public and private assets that the DoD does not own, so the DoD must nurture relationships and enhance information sharing with key external stakeholders at all levels of responsibility.
What is Partner with non-DoD entities to reduce risk?
Component of the Element Model from Step 4 of FMA-C that shows the tasks performed.
What is Physical Function / Controlled Process?
Link 16, Satellite Links, and GPS are all examples of this component of the Wheel of Access.
What are Over-the-Air Systems?
The department that stops attacks on US and allied critical infrastructure at the source.
What is Department of Defense (USCYBERCOM)?
Challenge to DoD Cyberspace where the DoD procures many mission-essential IT products and services from foreign vendors and includes use of underseas fiber optic cables and foreign satellites, leading to both supply chain and operational security risks.
What is Globalization?
Core function that centers around the development and implementation of appropriate safeguards to ensure delivery of critical services.
What is Protect?
The output of the "Generate Hazardous Control Actions" step of the FMA-C.
What is a table showing the relationship between Control Actions and Associated Hazards?
Element of the Wheel of Access that includes systems that support weapon systems with mission planning, mission execution, test and/or maintenance.
What are Mission Support Systems?