This cyberspace operation covers designing, building, configuring, securing, operating, maintaining, and sustaining the DODIN.
What is DODIN Operations
This cyberspace operation primary purpose is to preserve the ability to use friendly cyberspace capabilities and protect data and networks.
What is Defensive Cyberspace Operations (DCO)
This is stage of the Cyber Kill Chain immediately follows "Delivery".
What is exploitation
The Zero Trust control require a user to authentication in more than one method of authentication to gain access.
What is Multi-Factor Authentication (MFA)
These are the three components of Electronic Warfare (EW).
Electronic Attack (EA), Electronic Protection (EP), and Electronic Warfare Support (ES).
These four domains interconnect with the cyberspace domain.
What is Land, Air, Space, and Maritime
This is the primary role of a cyberspace defense warrant officer.
What is an Information Systems Security Manager (ISSM).
This represent the adversary's tactical goal or the "why" behind their action in MIRTE ATT&CK framework.
What is "Tactics"
This is the core principle of a Zero Trust security architecture
what is Never trust, always verify.
This component if focused protection from any effects of friendly or enemy use of electromagnetic spectrum
ELECTRONIC PROTECTION (EP)
What domain is congested, contested, and critical to successful operations.
What is cyberspace
These are the two components of Defensive Cyberspace Operations.
What is DCO-IDM and DCO-RA
This stage of the Cyber Kill Chain involves pairing an exploit with a backdoor into a deliverable payload
What is Weaponization
This principle ensures users should only be given the minimum levels of access needed to perform their job functions.
What is least privilege
This operation is mainly focus on planning, coordinating, and deconflicting the use of the electromagnetic spectrum
What is Spectrum Management Operations (SMO)
This operation goal is to project power by the application of force in and through cyberspace.
What is Offensive Cyberspace Operations (OCO)
This threat is difficult to counter because it already have legitimate access to systems and sensitive information.
What is Insider threats
This is the key characteristic of a "Watering Hole" attack.
what is an attacker compromises a legitimate website frequented by the target audience.
This practice of dividing a network into very small, isolated zones to limit lateral movement.
What is micro-segmentation
This framework primary goal is to allow friendly freedom of action in cyberspace and the EMS while denying the same to adversaries.
What is Cyberspace and Electromagnetic Activities (CEMA)
This organization operates as the Army Service Component Command for USCYBERCOM and leads Army cyberspace operations
What is Army Cyber Command (ARCYBER)
This DCO-IDM element is most closely aligned with the "always verify" aspect of Zero Trust
What is Monitor
"Drive-by Compromise" is a technique listed under this MITRE ATT&CK Tactic
What is Initial Access
This is dynamic and shifts to surround individual resources, users, and devices, rather than the network as a whole.
What is security perimeter
These are the three elements of CEMA
What is Cyberspace Operations, ELECTRONIC WARFARE (EW), and SPECTRUM MANAGEMENT OPERATIONS (SMO)