Army Cyber Operations
DCO
Cyber Attack Chain/MITRE A
Zero Trust
CEMA
100

This cyberspace operation covers designing, building, configuring, securing, operating, maintaining, and sustaining the DODIN.

What is DODIN Operations

100

This cyberspace operation primary purpose is to preserve the ability to use friendly cyberspace capabilities and protect data and networks.

What is Defensive Cyberspace Operations (DCO)

100

This is stage of the Cyber Kill Chain immediately follows "Delivery".

What is exploitation

100

The Zero Trust control require a user to authentication in more than one method of authentication to gain access. 

What is Multi-Factor Authentication (MFA)

100

These are the three components of Electronic Warfare (EW).

Electronic Attack (EA), Electronic Protection (EP), and Electronic Warfare Support (ES).

200

These four domains interconnect with the cyberspace domain.

What is Land, Air, Space, and Maritime

200

This is the primary role of a cyberspace defense warrant officer.

What is an Information Systems Security Manager (ISSM).

200

This represent the adversary's tactical goal or the "why" behind their action in MIRTE ATT&CK framework.

What is "Tactics" 

200

This is the core principle of a Zero Trust security architecture

what is Never trust, always verify.

200

This component if focused protection from any effects of friendly or enemy use of electromagnetic spectrum

ELECTRONIC PROTECTION (EP)

300

What domain is congested, contested, and critical to successful operations.

What is cyberspace

300

These are the two components of Defensive Cyberspace Operations.

What is DCO-IDM and DCO-RA

300

This stage of the Cyber Kill Chain involves pairing an exploit with a backdoor into a deliverable payload

What is Weaponization

300

This principle ensures users should only be given the minimum levels of access needed to perform their job functions.

What is least privilege

300

This operation is mainly focus on planning, coordinating, and deconflicting the use of the electromagnetic spectrum

What is Spectrum Management Operations (SMO)

400

This operation goal is to project power by the application of force in and through cyberspace.

What is Offensive Cyberspace Operations (OCO)

400

This threat is difficult to counter because it already have legitimate access to systems and sensitive information.

What is Insider threats

400

This is the key characteristic of a "Watering Hole" attack.

what is an attacker compromises a legitimate website frequented by the target audience.

400

This practice of dividing a network into very small, isolated zones to limit lateral movement.

What is micro-segmentation 

400

This framework primary goal is to allow friendly freedom of action in cyberspace and the EMS while denying the same to adversaries.

What is Cyberspace and Electromagnetic Activities (CEMA)

500

This organization operates as the Army Service Component Command for USCYBERCOM and leads Army cyberspace operations

What is Army Cyber Command (ARCYBER)

500

This DCO-IDM element is most closely aligned with the "always verify" aspect of Zero Trust

What is Monitor

500

"Drive-by Compromise" is a technique listed under this MITRE ATT&CK Tactic

What is Initial Access

500

This is dynamic and shifts to surround individual resources, users, and devices, rather than the network as a whole.

What is security perimeter

500

These are the three elements of CEMA

What is Cyberspace Operations, ELECTRONIC WARFARE (EW), and SPECTRUM MANAGEMENT OPERATIONS (SMO)