1/21
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
SECNA M-5510.30C
Department of the Navy (DON) personnel Security Program
SECNAVINST 5510.36
Department of the navy (DON) Information Security Program
DoDI 8500.01
Cyber Security instruction
CJCSM 6510.01B
Cyber Incident Handling Program
SECNAVINST 5239.3C
DON-Cybersecurity Program
OPNAVINST 5239.1c
US Navy Cybersecurity Program
SECNAV M-5239.3
DON information Assurance Program Information Manual
CJCSI 6510.01F
Information Assurance (IA) and support to computer Network Defense (CND)
SECNAV M-5239.2
Cyberspace information Technology and Cyber Security Workforce Management and Qualification Manual.
DOD 5200.08-R
Physical Security Program
OPNAVIST 5530.14E
Navy Physical Security and law Enforcement Program
CUI
Controlled Unclassified information
HIPPA
Health insurance Portability and Accountability Act
STIG 08.01.02
Cybersecurity requirement that a computer Screen must be locked when the user identification such as a common Access Card is removed or SIPRNet tokens
Asymmetric vs Symmetric encryption
Asymmetric uses a pair of keys (public and private) slower but more secure
Symmetric uses a single key for both encryption and decryption
DoS
Denial of Service as an attack meant to shut down a machine or network making it inaccessible to intended users
CPCPON 1
Very high
critical Functions
CPCON 2
High
Critical and Essential Functions
CPCON 3
Medium
Critical Essential and support Function
CPCON 4
low
All Functions
CPCON 5
Very low
All Function
Policies ESS
polices are needed to be in place for MacAfee Trelix point product to function correctly rules and exception are often placed in policies