17X: Block 5: Mission Assurance: ALL

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/240

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

241 Terms

1
New cards

What does OT stand for?

Operational Technology

2
New cards

What does OT encompass? *FS

Technologies involving interconnected devices and computers that monitor or control physical processes.

Devices include fuel/pump stations, electricity generation/metering/distribution, water distribution, etc.

3
New cards

What does IT encompass? *FS

Systems that focus on the flow of information and data.​

Devices include PCs, cell phones, database systems, routers, and switches.

4
New cards

What does CPS stand for?

Cyber Physical Systems

5
New cards

What are some other terms for CPS?

Industrial Control Systems (ICS)

Embedded Systems

6
New cards

What is the purpose of CPS?

These systems enable OT.

7
New cards

What components do CPS typically have? *FS

1. Sensors

2. Actuators

3. Controllers

4. Communication Network

8
New cards

What is the purpose of a sensor in a CPS? *FS

It senses or monitors changes to the physical world.

9
New cards

What is the purpose of an actuator in a CPS? *FS

It makes changes to the physical world.

10
New cards

What is the purpose of a controller in a CPS? *FS

It makes decisions/controls processes based on sensed data.

11
New cards

What is the purpose of a communication network in a CPS? *FS

It handles communication among the sensors, actuators, and controllers.

12
New cards

How do the components of a CPS interact?

knowt flashcard image
13
New cards

What is an open loop CPS? *FS

A system that operates without real-time feedback from the environment to adjust its behavior.

<p>A system that operates without real-time feedback from the environment to adjust its behavior. </p>
14
New cards

Are toasters and light switches examples of open or closed loops?

Open loops.

15
New cards

What is a closed loop CPS? *FS

A system that operates with real-time feedback from the environment to adjust its behavior.

<p>A system that operates with real-time feedback from the environment to adjust its behavior. </p>
16
New cards

Are smart washers and HVACs examples of open or closed loops?

Closed loops.

17
New cards

What are the CPS Security Goals? *FS

1. Interoperability

2. Security

3. Dependability

4. Sustainability

5. Reliability

6. Predictability

18
New cards

What are examples of the types of CPS? *FS

1. SCADA: Supervisory Control and Data Acquisition

2. DCS: Distributed Control Systems

3. PLCs: Programmable Logic Controllers

4. HMI: Human Machine Interface

5. RTU: Remote Terminal Units

6. IED: Intelligent Electronic Devices

19
New cards

What is Critical Infrastructure?

It is the systems, assets, and networks that are so essential to a society, economy, or government that their disruption, degradation, or destruction would have a significant impact on national security, public safety, economic stability, or public health and welfare.

*NT: no formal definition in the slides

20
New cards

How many Critical Infrastructure categories did Presidential Policy Directive (PPD) 21 establish? *FS

16 categories.

21
New cards

What are the strategic goals of PPD 21?

1. Refine and Clarify Functional Relationships across the Federal Government​

2. Enable Efficient Information Exchange for the Federal Government​

3. Inform Planning and Operational Decisions Regarding Critical Infrastructure​

22
New cards

Which act elevated cybersecurity from DHS to a separate agency?

The Cybersecurity and Infrastructure Security Agency (CISA) Act

23
New cards

What sorts of categories fall under critical infrastructure?

*FS by instructor: know what isn't on this list.... e.g., entertainment.

<p>*FS by instructor: know what isn't on this list.... e.g., entertainment.</p>
24
New cards

Which department/agency is the cybersecurity policy lead for the US government? *FS

DHS

25
New cards

Which department/agency is the cybersecurity operational lead for the US government? *FS

CISA

26
New cards

Which department/agency is the partner agency for unaffiliated critical infrastructure sectors?

DHS

27
New cards

Which department/agency handles partnership development, information sharing, incident management, and risk assessment & analysis?

CISA

28
New cards

Which department/agency develops and publishes cybersecurity standards (NIST) and handles small business cybersecurity training & awareness?

Department of Commerce

29
New cards

Which department/agency investigates cybercrime/ransomware and coordinates investigations/extradition with international law enforcement?

FBI

30
New cards

Which department/agency handles international information sharing/threat alerts and international cybersecurity cooperation?

Department of State

31
New cards

Which department/agency enforces sanctions and freezes foreign assets?

Department of the Treasury

32
New cards

Which department/agency coordinates computer crime prosecution with State, County, and Local governments?

Department of Justice

33
New cards

What is the purpose of other federal departments/agencies (HHS, DOE, etc) regarding critical infrastructure cybersecurity in the US Government?

They partner with regulated critical infrastructure sectors.

34
New cards

Which department/agency conducts persistent engagement of adversaries to defend and advance national interests at a level below armed conflict​? *FS

DoD (USCYBERCOM)

35
New cards

Which department/agency defends/hunts forward to stop attacks on US and allied Critical Infrastructure at the source? *FS

DoD (USCYBERCOM)

36
New cards

What is the purpose of the NSA regarding critical infrastructure cybersecurity in the US Government? *FS

1. Develops OCO & DCO capabilities

2. Provides cryptography products & services

3. Conducts threat assessments on USG networks/IS

4. Provides reports on cyber intelligence and threats to USG and commercial partners (SIGINT)

37
New cards

What does IE stand for?

Information Environment

38
New cards

What is the definition of IE?

The IE is the aggregate of social, cultural, linguistic, psychological, technical, and physical factors that affect how humans and automated systems derive meaning from, act upon, and are impacted by information, including the individuals, organizations, and systems that collect, process, disseminate, or use information. It is an intellectual framework to help identify, understand, and describe how those often intangible factors may affect the employment of forces and bear on the decision of the commander. (JP 3-12, Cyberspace Operations)​

39
New cards

What are the three dimensions of the IE model? *FS

1. Cognitive

2. Physical

3. Information

40
New cards

What is the focus of the Cognitive Dimension in IE?

It is human-centric.

41
New cards

What is the focus of the Physical Dimension in IE?

It is tangible/real-world.

42
New cards

What is the focus of the Information Dimension in IE?

It is data-centric.

43
New cards

Which dimension of IE is based on individual attitudes, beliefs, judgment, information processing, decision making, group identity, and norms?

Cognitive

44
New cards

Which dimension of IE is focused on how individuals assign meaning to or interpret images and actions?

Cognitive

45
New cards

Which dimension of IE is focused on material characteristics, both natural and manufactured, of the environment that create constraints and freedoms on the people and information systems that operate in it?

Physical

46
New cards

Which dimension of IE encompasses where and how information is collected, processed, stored, disseminated, and protected?

Information

47
New cards

Which dimension of IE is where the C2 of military forces is exercised and where the commander's intent is conveyed?

Information

48
New cards

Actions in which dimension of IE affect the content and flow of information?

Information

49
New cards

What does CO stand for?

Cyberspace Operations

50
New cards

What is the definition of CO? *FS

The employment of cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace.​

51
New cards

How does CO create strategic effects?

Through tactical actions: it uses links and nodes located in the physical domains and perform logical functions to create effects first in cyberspace and then, as needed, in the physical domains.

52
New cards

What are the three layers of the CO layer model? *FS

1. Physical Network

2. Logical

3. Cyber-Persona

53
New cards

What does the Physical Network Layer of the CO Layer Model encompass?

IT devices and infrastructure in the physical domain.

E.g., hardware, wireless and wired links, physical storage mediums, geography.

54
New cards

What does the Logical Layer of the CO Layer Model encompass?

Abstractions from the physical layer, based on the logic programming (code) that drives network components.

E.g., IP addresses, ports, protocols, services, operating systems, virtual machines, etc.

55
New cards

What does the Cyber-Persona Layer of the CO Layer Model encompass?

Digital representations of an actor or entity's identity in cyberspace.

E..g, user accounts, account roles/relationships.

Multiple users may have the same account and a single user may have multiple accounts (social media, email, banking, etc).

56
New cards

What are the three categories of ownership in cyberspace? *FS

1. Blue

2. Grey

3. Red

57
New cards

What is blue cyberspace? *FS

Cyberspace owned and/or protected by the US, its mission partners, and the DoD​.

58
New cards

What is grey cyberspace? *FS

Unaffiliated/unaligned cyberspace​.

59
New cards

What is red cyberspace? *FS

Cyberspace owned or controlled by an adversary.

60
New cards

What about cyberspace ownership leads to issues with attribution?

The lines between blue/grey/red are often blurry and unclear.

61
New cards

What factors help us attribute cyber attacks? *FS

The attacker's:

1. Geographic Location (IP address)

2. TTPs

3. Level of Sophistication

4. Political Goals/Interests

62
New cards

What does OIE stand for?

Operations in the Information Environment

63
New cards

How does CO relate to OIE? *FS

CO is an overlapping subset of OIE that can be executed independently to or in concert with other OIE missions.

<p>CO is an overlapping subset of OIE that can be executed independently to or in concert with other OIE missions. </p>
64
New cards

What are the three primary DoD cyberspace domains? *FS

1. NIPR

2. SIPR

3. JWICS

65
New cards

What does NIPR stand for?

Non-Classified Internet Protocol Router Network

66
New cards

What does the NIPR domain encompass?

Unclassified, up to CUI, used for daily operations by most DoD members​.

67
New cards

What does SIPR stand for?

Secret Internet Protocol Router Network

68
New cards

What does the SIPR domain encompass?

Classified, up to SECRET//NOFORN​, used for OCO/DCO and DoDIN Operations (threat response)​.

69
New cards

What does JWICS stand for?

Joint Worldwide Intelligence Communications System

70
New cards

What does the JWICS domain encompass?

Classified, up to TOP SECRET, all SCI categories, used by the Intelligence Community (IC) and for OCO/DCO​.

71
New cards

What are the four threats to DoD Cyberspace? *FS

1. State Actors

2. Non-State Actors

3. Individuals

4. Accidents and Natural Hazards

72
New cards

What does APT stand for?

Advanced Persistent Threat

73
New cards

An APT is an example of what type of threat to DoD Cyberspace?

A state actor.

74
New cards

What are some examples of non-state actor threats?

1. Criminal Organizations

2. Violent Extremist Organizations (VEO)

75
New cards

A script kiddie is an example of what type of threat to DoD Cyberspace?

Individual

76
New cards

A hurricane is an example of what type of threat to DoD Cyberspace?

Accidents and Natural Hazards

77
New cards

What are the four challenges to DoD cyberspace? *FS

1. Geography

2. Technology

3. Private Industry and Public Infrastructure

4. Globalization

78
New cards

Why is geography a challenge to DoD cyberspace?

All of cyberspace is owned by someone, so there is no stateless maneuver space.

79
New cards

Why is technology a challenge to DoD cyberspace?

1. Using a capability may reveal how it functions.

2. There is no/low cost for replication of software-based capabilities.

3. Incomplete understanding and integration of new technologies (e.g., AI, IoT).

80
New cards

Why is private industry and public infrastructure a challenge to DoD cyberspace?

1. DoD relies on commercial infrastructure, such as ISPs and cloud computing services, for mission critical function.

2. DoD and Defense Industrial Base (DIB) rely on fragile global supply chains.

81
New cards

Why is globalization a challenge to DoD cyberspace?

The DoD procures many mission-essential IT products and services from foreign vendors, leading to both supply chain and operational security risks.

E.g., underseas fiber optic cables, foreign satellites.

82
New cards

What is the definition of mission assurance?

A process to protect or ensure the continued function and resilience of capabilities and assets, including personnel, equipment, facilities, networks, information and information systems, infrastructure, and supply chains, critical to the execution of DOD mission-essential functions in any operation environment or condition. (DODD 3020.40 – Mission Assurance)​

83
New cards

What is the overall purpose/goal of MA?

The knowledge that the capability will occur when needed (on America's worst day).

It focuses on the protection, continued function, and resilience of capabilities and assets critical to supporting MEFs.

84
New cards

What is the first pillar of MA? *FS

Identify and prioritize critical missions, capabilities, functions, systems, and supporting assets.

85
New cards

What is the second pillar of MA? *FS

​Develop and implement a comprehensive and integrated MA risk-management construct.

86
New cards

What is the third pillar of MA? *FS

Use risk-informed decision making to optimize risk reduction solutions.​

87
New cards

What is the fourth pillar of MA? *FS

Partner with non-DoD entities, as appropriate and as permitted by law, to reduce risk.

88
New cards

Which pillar of MA identifies, characterizes, and prioritizes the assets and capabilities that are critical to performing MEFs, including mission-critical human, physical, information, supply chain, and supporting assets and capabilities​?​

Pillar 1

89
New cards

Which pillar of MA examines the inter-connectedness of DoD's critical assets and external dependencies?

Pillar 2

90
New cards

Which pillar of MA enables decision-makers to manage risk more effectively and efficiently?

Pillar 2

91
New cards

Which pillar of MA uses red-teaming, war-gaming, and alternative analysis to facilitate and inform this process and share assessment results, so that decision-makers can identify and address trends and strategic issues​?

Pillar 2

92
New cards

Which pillar of MA leverages existing or establishes new integrative processes and advocacy forums to implement the mission assurance framework and provide inputs to the DoD’s existing planning, budgeting, requirements, and acquisition processes​?

Pillar 3

93
New cards

Which pillar of MA focuses on protecting the system using planning, budgeting, and policy?

Pillar 3

94
New cards

Which pillar of MA focuses on nurturing relationships and enhancing information sharing with key external stakeholders at all levels of responsibility?

Pillar 4

95
New cards

Which pillar of MA addresses the fact that DoD MEF execution depends on public and private assets that the DoD does not own​?

Pillar 4

96
New cards

What are the four processes in MA?

1. Identification

2. Assessments

3. Risk Management

4. Monitoring & Reporting

97
New cards

What does the identification process encompass in MA?

Determine what assets are important and why.

98
New cards

What does the assessments process encompass in MA?

Determine risk to identified assets through assessments.

99
New cards

What does the risk management process encompass in MA?

Develop plans to manage risk.

100
New cards

What does the monitoring & reporting process encompass in MA?

Monitor and report changes in risks and operational status.