Environment and Gray Zone
USCYBERCOM p1
USCYBERCOM p2
Cyber Actors
100

This disadvantage makes it difficult to find who is actually responsible for a cyber attack

What is Anonymity

100

Name of the primary USCYBERCOM Strategy

What is Superiority through Persistence

100

The year USCYBERCOM was established as its own Unified Combatant Command

What is 2018

100

Three categories of cyber threat actors (also can be considered levels of sophistication)

Established, Emerging, Opportunistic

150

Two of the most major risks in gray zone cyber operations

What is Misperception and Miscalculation

150

The USCYBERCOM strategy is driven by __________, ________and _______

What is People, partnerships, and delivering a decisive advantage

150

The national agency where the Director of that agency is also the Commander of USCYBERCOM

What is NSA

150

This key player within the U.S. coordinates the sharing of threat information and helps secure critical infrastructure

What is the DHS (Department of Homeland Security)

200

This type of vulnerability is something that was previously unknown and a patch doesn't exist to fix it

What is Zero Day

200

This type of Mission Team focuses on offensive cyber operations against our adversaries

National Mission Team

200

The three types of Cyber Operations

What is DCO, OCO, DODIN

200

The primary challenge of addressing cyber threat actors

What is how to posture government and private sector organizations to minimize the surprise around emerging actors and effects

250

Two critical things that must be done to build a successful defense when building public-private cybersecurity partnerships

What is early preparation and information sharing

250

The type of action that imposes tactical friction and strategic costs on our adversaries within cyberspace

What is Continuous Engagement

250

Within the cyberspace operational environment, USCYBERCOM achieves success by ________

What is Seizing the Initiative, Retaining momentum, and disrupting our adversaries freedom of action

250

This ability allows both nation-state and non-state actors to jump forward quickly from emerging to an established cyber threat

What is the increasing ability to buy cyber tools on a commercial basis