Key Terms & Definitions
Strategic Concepts
Technical Concepts
Cyber Law & Policy
Cyber Operations
100

The link between political objectives and the means employed to achieve them. 

What is strategy?

100

Predicated on the assumption that the State is a unitary, rational actor.

What is Realism?

100

This model combined the application, presentation, and session layers of the TCP/IP model. 

What is the OSI model?

100

This title governs the cyber authorities given to active duty military members. 

What is Title 10?

100

This person also serves as the Director of the NSA.

Who is the USCYBERCOM Commander?

200

Physical and virtual assets and systems so vital to the Nation that their incapacity or destruction would have a debilitating impact on national security, national economic security, or public health and safety. 

What is Critical Infrastructure

200

Grand plans, grand principles, and grand behavior are the three components of this concept. 

What is Grand Strategy?

200

An addressing scheme for devices on the internet. 

What is Domain name System?

200

This document is intended to guide the application of the Law of Armed Conflict to cyberspace operations.

What is the Tallinn Manual?

200

This animal is usually associated with Russian APTs.

What is a Bear?

300

Loosely organized groups of operators who share a common set of ideals and use electronic means to achieve them. 

What are Hacktivist Groups?

300

This type of deterrence would mean an attack would negatively affect the attacker, as well. 

What is Deterrence by Entanglement?

300

A way of thinking about cybersecurity challenges in terms of the pain that can be inflicted on an adversary.

What is the Pyramid of Pain?

300

Model of applying the 4th Amendment through a "reasonable expectation of privacy." 

What is the Probabilistic Model?

300

Cyber operations conducted in allied networks to detect adversary presence and TTPs. 

What are Hunt Forward Operations?

400

Is defined by three dimensions: physical, information, and human. 

What is Information Environment?

400

An aspect of a state that is influenced by its history, geography, politics, economics, religion and philosophy. 

What is Strategic Culture?

400

Technique by malicious actors to maintain their access to a compromised system.

What is persistence?

400

EU regulation that requires companies to prioritize data protection "by design and by default."

What is the General Data Protection Regulation?

400

This organization is housed within the Department of Homeland Security and has primary responsibility for securing critical infrastructure. 

What is CISA?

500

Actions taken in cyberspace to gain intelligence, maneuver, collect information, or perform enabling actions required to prepare for future operations.

What is Cyberspace Exploitation?

500

Involved the US, its allies, and other partner nations to discuss the promotion of global norms for responsible state behavior in cyberspace. 

What is the Cyber Solarium Commission?

500

Content spoofing and cross-site scripting are both examples of this type of attack.

What are Client-Side Attacks?

500

Sets forth principles governing the Federal Government's response to any cyber incident, whether involving government or private sector entities. 

What is the Presidential Policy Directive (PPD) 41?

500

This task force was responsible for Operation Glowing Symphony. 

What is JTF-ARES?

M
e
n
u