IEW&S
Intelligence, Electronics Warfare & Sensors
infiltrate systems or computer networks for financial gain or reputational damage, stealing credit card numbers, sensitive information, and even healthcare data to sell
Criminal Organizations
malware that demands payment in order to refrain from doing some harmful action or to undo the effects of the harmful action
Ransomware
A hacker with malicious intentions or this 2015 Chris Hemsworth film about a hacker helping to track down another cyber criminal.
Blackhat (2015)
Type of funding structure that SEC will be transitioning to.
Reimbursable
CCI
Control Correlation Identifier
inexperienced programmers who use scripts or programs developed by others for malicious purposes
Script Kiddies
software with malicious behavior that aims to gather information about a person or organization and send it to another entity
Spyware
Rami Malek portrays a Cyber Engineer turned hacktivist in this 2015-2019 series. Domo Arigato.
Mr. Robot (2015-2019)
According to the newer version of DCWF, all of the civilian positions in our branch fall under which 2 categories
Cybersecurity and Cyberspace Enablers
ARAT
Army Reprogramming Analysis Team
unlawfully gain access for profit, sell or trade company secrets, or damage a competitor's reputation or operations
Corporate Spies / Corporate Espionage
are created using malware that allows an attacker to control a group of computers and use them to gather personal information or launch attacks against others,
Botnets
One of the earlier examples of insider threat in films, three disgruntled employees enact some revenge against their corporate overlords in this 1999 film by infecting a system with a virus and stealing hundreds of thousands of dollars.
Office Space (1999)
To establish and execute processes, procedures, and tasks in support of the IEW&S initiative for Readiness, Talent Management, Data Management, DevSecOps, Communication, T2S Support, Software Engineering is an example of what
The ISD Cyber Mission Statement
ATD
Authorization Termination Date
They work for a government to disrupt or compromise target governments, organisations or individuals to gain access to valuable data or intelligence, and can create incidents that have international significance
Nation-State
malicious computer worm first uncovered in 2010, targets supervisory control and data acquisition systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran.
Stuxnet
Starring Matthew Broderick, a young hacker inadvertently gains access to a military computer system and almost triggers a nuclear war in this 1983 thriller.
Wargames (1983)
Number of CLPs required for each cycle in IDP.
80 CLPs for each 2 Year Cycle
EMASS
Enterprise Mission Assurance Support Service
Primarily motivated by personal reasons or beliefs, not financial.
Hacktivist
a set of software tools that enable an unauthorized user to gain administrative control of a computer system without being detected.
Rootkit
Justin Long plays a high tech hacker sidekick in this 2007 fourth installment. This one isn't a Christmas movie folks.
Live Free or Die Hard (2007)
a security framework requiring all users, whether in or outside the organization's network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access
Zero Trust