Critical Infrastructure
Cyberspace Operations
Mission Assurance
Functional Mission Analysis - Cyber
Mission Relevant Terrain - Cyber
100

Type of loop in Cyber Physical Systems (CPS) that operates based on pre-set inputs without feedback, offering simplicity and low cost, and is ideal for predictable tasks.

What is Open Loop?

100

The three dimensions of the Information Environment.

What are Information, Cognitive, and Physical?

100

Series of publications from the National Institute of Standards and Technology (NIST) to address and support the security and privacy needs of U.S. Federal Government information and information systems.

What is Special Publication (SP) 800 series?

100

A specific, high-level outcome (an effect) that is unacceptable to the mission owner.

What is a loss?

100

All devices, internal and external links, operating systems, services, applications, ports, protocols, hardware, software, and other technical aspects of a system required to enable the function of a critical asset; may exist external to the DOD cyberspace

What is Mission Relevant Terrain - Cyber (MRT-C)?

200

Component of the Cyber Physical Systems (CPS) that makes decisions/control processes based on sensed data.

What are Controllers?

200

Layer with digital representations of an actor or entity’s identity in cyberspace; comprised of user accounts and account roles/relationships; multiple users may use the same account and a single user may have multiple accounts (social media, email, banking).

What is Cyber-Persona layer?

200

Work role where a member of the Intelligence Community (IC) provides insight into adversary capability, intent, and TTPs.

What is Intel Support?

200

Type of problem that have no definite answer, have proposed fixes that are better or worse (not right or wrong), and their cause can be explained by many factors.

What is a Wicked Problem?

200

Any locality or area, physical or logical, where seizure, retention, or other specified degree of control provides a marked advantage in cyberspace to any combatant.

What is Key Terrain - Cyber?

300

Department/agency that is the cybersecurity operational lead for the US government.

What is Cybersecurity and Infrastructure Security Agency (CISA)?

300

Type of ownership in cyberspace where the cyberspace owned or controlled by an adversary.

What is Red?

300

One of the three components of the NIST Cybersecurity Framework that enables organizations to establish a roadmap for reducing cybersecurity risk and is used to describe current state and/or desired target state of cybersecurity activities.

What are Profiles?

300

Component of Strategic Thinking that focuses on the analysis of how a system's parts interrelate and how systems work.

What is Systems?

300

Air Force model for MRT-C that that groups weapon system areas of access into common language.

What is the Wheel of Access?

400

This department/agency provides reports on cyber intelligence and threats to USG and commercial partners (SIGINT).

What is National Security Agency (NSA)?

400

Threat to DoD Cyberspace that includes criminal organizations and violent extremist organizations (VEOs).

What is Non-State Actor?

400

Pillar of Mission Assurance that depends on public and private assets that the DoD does not own, so the DoD must nurture relationships and enhance information sharing with key external stakeholders at all levels of responsibility.

What is Partner with non-DoD entities to reduce risk?

400

Component of the Element Model from Step 4 of FMA-C that shows the tasks performed.

What is Physical Function / Controlled Process?

400

Link 16, Satellite Links, and GPS are all examples of this component of the Wheel of Access.

What are Over-the-Air Systems?

500

The department that stops attacks on US and allied critical infrastructure at the source.

What is Department of Defense (USCYBERCOM)?

500

Challenge to DoD Cyberspace where the DoD procures many mission-essential IT products and services from foreign vendors and includes use of underseas fiber optic cables and foreign satellites, leading to both supply chain and operational security risks.

What is Globalization?

500

Core function that centers around the development and implementation of appropriate safeguards to ensure delivery of critical services.

What is Protect?

500

The output of the "Generate Hazardous Control Actions" step of the FMA-C.

What is a table showing the relationship between Control Actions and Associated Hazards?

500

Element of the Wheel of Access that includes systems that support weapon systems with mission planning, mission execution, test and/or maintenance.

What are Mission Support Systems?

M
e
n
u