Alphabet Soup
Threat Actors
Malware
Entertainment
Potpourri
100

IEW&S

Intelligence, Electronics Warfare & Sensors

100

infiltrate systems or computer networks for financial gain or reputational damage, stealing credit card numbers, sensitive information, and even healthcare data to sell

Criminal Organizations

100

malware that demands payment in order to refrain from doing some harmful action or to undo the effects of the harmful action

Ransomware

100

A hacker with malicious intentions or this 2015 Chris Hemsworth film about a hacker helping to track down another cyber criminal.

Blackhat (2015)

100

Type of funding structure that SEC will be transitioning to.

Reimbursable

200

CCI

Control Correlation Identifier

200

inexperienced programmers who use scripts or programs developed by others for malicious purposes

Script Kiddies

200

software with malicious behavior that aims to gather information about a person or organization and send it to another entity

Spyware

200

Rami Malek portrays a Cyber Engineer turned hacktivist in this 2015-2019 series. Domo Arigato.

Mr. Robot (2015-2019)

200

According to the newer version of DCWF, all of the civilian positions in our branch fall under which 2 categories

Cybersecurity and Cyberspace Enablers

300

ARAT

Army Reprogramming Analysis Team

300

unlawfully gain access for profit, sell or trade company secrets, or damage a competitor's reputation or operations

Corporate Spies / Corporate Espionage

300

are created using malware that allows an attacker to control a group of computers and use them to gather personal information or launch attacks against others,

Botnets

300

One of the earlier examples of insider threat in films, three disgruntled employees enact some revenge against their corporate overlords in this 1999 film by infecting a system with a virus and stealing hundreds of thousands of dollars. 

Office Space (1999)

300

To establish and execute processes, procedures, and tasks in support of the IEW&S initiative for Readiness, Talent Management, Data Management, DevSecOps, Communication, T2S Support, Software Engineering is an example of what

The ISD Cyber Mission Statement 

400

ATD

Authorization Termination Date

400

They work for a government to disrupt or compromise target governments, organisations or individuals to gain access to valuable data or intelligence, and can create incidents that have international significance

Nation-State

400

malicious computer worm first uncovered in 2010, targets supervisory control and data acquisition systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran.

Stuxnet

400

Starring Matthew Broderick, a young hacker inadvertently gains access to a military computer system and almost triggers a nuclear war in this 1983 thriller.

Wargames (1983)

400

Number of CLPs required for each cycle in IDP. 

80 CLPs for each 2 Year Cycle

500

EMASS

Enterprise Mission Assurance Support Service

500

Primarily motivated by personal reasons or beliefs, not financial. 

Hacktivist

500

a set of software tools that enable an unauthorized user to gain administrative control of a computer system without being detected.

Rootkit

500

Justin Long plays a high tech hacker sidekick in this 2007 fourth installment. This one isn't a Christmas movie folks.

Live Free or Die Hard (2007)

500

a security framework requiring all users, whether in or outside the organization's network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access

Zero Trust