The link between political objectives and the means employed to achieve them.
What is strategy?
Predicated on the assumption that the State is a unitary, rational actor.
What is Realism?
This model combined the application, presentation, and session layers of the TCP/IP model.
What is the OSI model?
This title governs the cyber authorities given to active duty military members.
What is Title 10?
This person also serves as the Director of the NSA.
Who is the USCYBERCOM Commander?
Physical and virtual assets and systems so vital to the Nation that their incapacity or destruction would have a debilitating impact on national security, national economic security, or public health and safety.
What is Critical Infrastructure
Grand plans, grand principles, and grand behavior are the three components of this concept.
What is Grand Strategy?
An addressing scheme for devices on the internet.
What is Domain name System?
This document is intended to guide the application of the Law of Armed Conflict to cyberspace operations.
What is the Tallinn Manual?
This animal is usually associated with Russian APTs.
What is a Bear?
Loosely organized groups of operators who share a common set of ideals and use electronic means to achieve them.
What are Hacktivist Groups?
This type of deterrence would mean an attack would negatively affect the attacker, as well.
What is Deterrence by Entanglement?
A way of thinking about cybersecurity challenges in terms of the pain that can be inflicted on an adversary.
What is the Pyramid of Pain?
Model of applying the 4th Amendment through a "reasonable expectation of privacy."
What is the Probabilistic Model?
Cyber operations conducted in allied networks to detect adversary presence and TTPs.
What are Hunt Forward Operations?
Is defined by three dimensions: physical, information, and human.
What is Information Environment?
An aspect of a state that is influenced by its history, geography, politics, economics, religion and philosophy.
What is Strategic Culture?
Technique by malicious actors to maintain their access to a compromised system.
What is persistence?
EU regulation that requires companies to prioritize data protection "by design and by default."
What is the General Data Protection Regulation?
This organization is housed within the Department of Homeland Security and has primary responsibility for securing critical infrastructure.
What is CISA?
Actions taken in cyberspace to gain intelligence, maneuver, collect information, or perform enabling actions required to prepare for future operations.
What is Cyberspace Exploitation?
Involved the US, its allies, and other partner nations to discuss the promotion of global norms for responsible state behavior in cyberspace.
What is the Cyber Solarium Commission?
Content spoofing and cross-site scripting are both examples of this type of attack.
What are Client-Side Attacks?
Sets forth principles governing the Federal Government's response to any cyber incident, whether involving government or private sector entities.
What is the Presidential Policy Directive (PPD) 41?
This task force was responsible for Operation Glowing Symphony.
What is JTF-ARES?