What are the three types of ownership in cyberspace
Blue, grey, red
What are the five core functions of the NIST CSF Core
ID, protect, detect, respond, recover
How does OT differ from IT
IT has to do with the flow of data and information whereas OT deals with connectivity between devices and how the devices themselves work together
What is the key output of FMA-C
MRT-C
How does KT-C differ from MRT-C
KT-C is specific and can be a single thing while MRT-C is an overarching big picture of everything
What are the 4 challenges to DoD cyberspace
Geography, technology, private industry and public infrastructure, globalization
What are the 5 standard teamwork roles
Host analyst, network analyst, intel, mission rep, leadership
What's the definition of operational technology?
Technologies involving interconnected devices and computers that monitor or control physical processes, whereas IT systems focus on the flow of information and data.
Who determines if a loss is unacceptable
Mission owner
Why is defining KT-C difficult
It is constantly changing and is situation dependent
What are the technical and non-technical means to attribute cyber attacks
IP address (geographical), TTPs, level of sophistication, political goals / interests
What are the three sub-components of profile
Business objectives, threat environment, and requirements and controls
What are the 4 components of Cyber Physical Systems and what do they do
Sensors, actuators, controller, communications network
What is a constraint in FMA-C and what are they for
Things to do, made in order to keep out of hazardous states
What is MRT-C
All devices, internal and external links, operating systems, services, applications, ports, protocols, hardware, software etc. of a system required to enable function of a critical asset. May exist external to the DOD cyberspace
What are the 4 threats to DoD Cyberspace
State actors, non-state answers, individuals, accidents and natural hazards
What are the 3 sub-components of tiers
Risk management process
integrated risk management program
external participation
Whats USCYBERCOMs role in cybersecurity
Hunt forward and defend forward by conducting persistent engagement of adversaries in cyberspace below the threshold of armed conflict
What are the three components of strategic thinking, describe each of them
Creative thinking, critical thinking, systems thinking
What are the three primary elements of the wheel of access. Describe each
Over the air, mission support systems, mission systems
What are the three dimensions of the Information Environment (IE) model? What are their corollary dimensions in Cyberspace Operations (CO) layer model?
Cognitive (human centric), information (data centric), physical (real-world, tangible)
Cyber persona layer, logical-network layer, physical layer
What are the 4 pillars of DoD MA
ID / prioritize key missions, assets, and functions
Develop / implement MA risk management construct
Use risk-informed decision making
Partner w non-DoD entities
What cybersecurity services does the NSA provide
Develop offensive + defensive cyber capabilities,
Provide cryptographic products + services
Conducts threat assessments on USG networks / info services
Provides reports on cyber intelligence (SIGINT)
How is a mission statement structured and what is the difference between a tame and wicked problem
Purpose + means + goal. Tame problems have are simple, have a definite answer and cause. Wicked problems are complex, have answers more like better or worse rather than correct or wrong, and have a variety of causes
How does the Air Force model MRT-C
Wheel of access