Cybersecurity

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/21

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards

SECNA M-5510.30C

Department of the Navy (DON) personnel Security Program

2
New cards

SECNAVINST 5510.36

Department of the navy (DON) Information Security Program

3
New cards

DoDI 8500.01

Cyber Security instruction

4
New cards

CJCSM 6510.01B

Cyber Incident Handling Program

5
New cards

SECNAVINST 5239.3C

DON-Cybersecurity Program

6
New cards

OPNAVINST 5239.1c

US Navy Cybersecurity Program

7
New cards

SECNAV M-5239.3

DON information Assurance Program Information Manual

8
New cards

CJCSI 6510.01F

Information Assurance (IA) and support to computer Network Defense (CND)

9
New cards

SECNAV M-5239.2 

Cyberspace information Technology and Cyber Security Workforce Management and Qualification Manual.

10
New cards

DOD 5200.08-R

Physical Security Program

11
New cards

OPNAVIST 5530.14E

Navy Physical Security and law Enforcement Program

12
New cards

CUI

Controlled Unclassified information

13
New cards

HIPPA

Health insurance Portability and Accountability Act

14
New cards

STIG 08.01.02

Cybersecurity requirement that a computer Screen must be locked when the user identification such as a common Access Card is removed or SIPRNet tokens

15
New cards

Asymmetric vs Symmetric encryption

Asymmetric uses a pair of keys (public and private) slower but more secure

Symmetric uses a single key for both encryption and decryption

16
New cards

DoS 

Denial of Service as an attack meant to shut down a machine or network making it inaccessible to intended users 

17
New cards

CPCPON 1

Very high

critical Functions

18
New cards

CPCON 2

High

Critical and Essential Functions

19
New cards

CPCON 3

Medium

Critical Essential and support Function

20
New cards

CPCON 4

low

All Functions

21
New cards

CPCON 5 

Very low

All Function

22
New cards

Policies ESS

polices are needed to be in place for MacAfee Trelix point product to function correctly rules and exception are often placed in policies