Cybersecurity Flashcards
Confidentiality
Guards against a user without proper clearance accessing classified information.
Preserves authorized restrictions on information disclosure.
Protects personal privacy and proprietary information.
Confidentiality example
XX
Integrity
Guards against improper modification to or destruction of information.
Integrity Example
Prevents a user from improperly or maliciously modifying a database.
Availability
Ensures timely and reliable access to and use of information.
Availability Example
Ensures that an information system is accessible when an authorized user needs it.
Importance of Authentication
Mechanism that authorizes or allows access to computer systems and networks and the data that resides there.
Loss of or incorrect authentication services could allow unauthorized access to classified data.
Authentication Example
Common Access Card (CAC)
-provides system identification that authenticates the user
Non-Repudiation
Ensures that a party in an electronic exchange cannot deny…
- participation in the exchange
- authenticity of the message
Non-Repudiation Example
Digital signature
-confirms the identity of the sender of an email or the signer of a document
5 Attributes of Cybersecurity
Confidentiality
Integrity
Availability
Authentication
Non-Repudiation
2 Most Important Cybersecurity Attributes
Confidentiality
-Ensures the nation’s private information is contained.
Authentication
-One must prove who they are and why they need access before gaining access to the nation’s private information.
Importance of the 5 Attributes of Cybersecurity
Susceptible to threats and vulnerabilities.
Overlooking one attribute could create a vulnerability that leaves data susceptible to attack.
Must be aware of attributes to ensure risk is managed appropriately across all areas.
Must maintain these areas to prevent loss.
Main Points of Security Policy
- Identify and protect national security information and controlled unclassified information (CUI) in accordance with national-level policy issuances
- Promote information sharing, facilitate judicious use of resources, and simplify management through implementation of uniform and standardized processes
- Employ, maintain, and enforce standards for safeguarding, storing, destroying, transmitting, and transporting classified information
- Actively promote and implement security education and training throughout the Department of Defense
- Mitigate the adverse effects of unauthorized access to classified information by investigating and acting upon reports of security violations and compromises of classified information
DODI 8500.01 - Risk Management
- DoD will implement a multi-tiered cybersecurity risk management process.
- DoD must consider all cybersecurity risks.
- All DoD IT will participate in a cybersecurity program to manage risk.
- Risk management will be addressed as early as possible.
- Documentation regarding the security posture of DoD IS and platform information technology (PIT) systems will be made available.
DODI 8500.01 - Operational Resilience
- Information and services are available to authorized users.
- Security posture is sensed, correlated, and made visible to mission owners, network operators, and to the DoD Information Enterprise.
- Whenever possible, technology components have the ability to reconfigure, optimize, self-defend, and recover with little or no human intervention.
DODI 8500.01 - Integration and Interoperability
- Cybersecurity must be fully integrated into system life cycles.
- Interoperability will be achieved through adherence to DoD architecture principles, adopting a standards-based approach, and by all DoD Components sharing the level of risk necessary to achieve mission success.
- All interconnections of DoD IT will be managed to minimize shared risk.
DODI 8500.01 - Cyberspace Defense
- Employed to protect, detect, characterize, counter, and mitigate unauthorized activity and vulnerabilities.
- Shared with all appropriately cleared and authorized personnel.
DODI 8500.01 - Performance
- Implementation of cybersecurity will be overseen and governed through the integrated decision structures and processes.
- Performance will be measured, assessed for effectiveness, and managed.
- Data will be collected to support reporting and cybersecurity management activities.
- Standardized information technology tools, methods, and processes will be used to the greatest extent possible.
DODI 8500.01 - DoD Information
-All DoD information in electronic format will be given an appropriate level of confidentiality, integrity, and availability.
DODI 8500.01 - Identity Assurance
- Identity assurance must be used to ensure strong identification, authentication, and eliminate anonymity.
- DoD will public key-enable DoD information systems (ISs) and implement a DoD-wide Public key Infrastructure (PKI) solution that will be managed by the DoD PKI Program Management Office.
- Biometrics will be managed.
DODI 8500.01 - Information Technology
- All information technology that receives, processes, stores, displays, or transmits DoD information will be acquired, configured, operated, maintained, and disposed of.
- Risks, weaknesses or flaws, and vulnerabilities introduced through faulty design, configuration, or use will be managed, mitigated, and monitored.
- Cybersecurity requirements must be identified and included.
DODI 8500.01 - Cybersecurity Workforce
- Cybersecurity workforce functions must be identified and managed.
- Qualified cybersecurity personnel must be identified and integrated into all phases of the system development lifecycle.
DODI 8500.01 - Mission Partners
- Capabilities that are shared with mission partners will be consistent.
- DoD originated and DoD provided information must be properly and adequately safeguarded, with documented agreements indicating required levels of protection.
Cybersecurity Concepts
- Information Assurance Attributes
- System Categorization
- Assessment and Authorization Process
- Data Spills
- Disposal of Computer Media
- Non-Traditional Work Environments
- Processing Requirements for Specific Types of Information
- New Technology and Equipment
- Social Networking Services
- Compilation and Data Aggregation
- Marking Requirements for Electronic Information
- Position Sensitivity Designation/Personnel Security Investigative Standards
- Cybersecurity Policy
Importance of Cybersecurity Concepts
- In order to put the policies into action, you must be able to identify fundamental cybersecurity concepts that are related to the protection of classified and controlled unclassified information.
- Need to be able to explain your role in protecting DoD’s information systems and the information they process, transmit, and store.
What are the cybersecurity attributes?
Answer = All Confidentiality (correct response) Integrity (correct response) Availability (correct response) Authentication (correct response) Non-repudiation (correct response)
Why do you need to be aware of cybersecurity?
To uphold all elements of the National Industrial Security Program Operating Manual Answer = To appropriately manage risk by mitigating threats and vulnerabilities To examine your own actions and activities to uphold personal accountability To ensure all appropriate measures are taken to protect a place and ensure only people with permission enter and leave it
What are the cybersecurity drivers?
Answer = All NIST 800-30 Rev 1, Guide for Conducting Risk Assessments DoD 8530.01, Cybersecurity Activities Support to DoD Information Network Operations DoD 8510.01, Risk Management Framework DoD 8500.01, Cybersecurity DoD Security Policy
Which skills do security personnel need?
Protect information systems. Answer 1 = Identify all cybersecurity concepts. Identify fundamental cybersecurity concepts that are related to the protection of classified and controlled unclassified information. Answer 2 = Examine their role in protecting DoD’s information systems and the information they process, transmit, and store.
Responsibilities of Security Personnel in Cybersecurity
- Protect classified information and controlled unclassified information.
- Have proactive and continuous engagement and collaboration between security, information technology (IT), and cybersecurity personnel, at all organizational levels.
- Manage threats, minimize vulnerabilities, use appropriate countermeasures, and respond to incidents swiftly and appropriately.
DoD CIO Responsibilities
- Monitors, evaluates, and provides advice to the Secretary of Defense regarding all DoD cybersecurity activities and oversees implementation of this cybersecurity.
- Develops and establishes DoD cybersecurity policy and guidance consistent with this instruction and in accordance with applicable federal law and regulations.
USCYBERCOM Responsibilities
- Overall responsibility of directing the operation of and assuring the security of the global DoD network environment.
- Leads the day-to-day defense and protection of the DoD networks and coordinates all DoD network operations.
- Provides full spectrum support to military and counterterrorism mission.
Component Level Staff
Component and activity-level, you need to be aware of other cybersecurity staff as well, such as the
- Authorizing Official (AO)
- Personnel Security Specialist
- Physical Security Specialist
- Information Security Specialist
- Industrial Security Specialist
- Security Specialist
- Security Officer
- Risk Executive Function
What skills do security personnel need to achieve their responsibilities?
- Analyze and manage risk
- Counsel stakeholders on security-related concerns, issues, and challenges.
- Support risk assessment and management.
- Execute security awareness training and education requirements and respond to security incidents.
- Accountable for cyber command readiness, in information security, personnel security, physical security, counterintelligence, and vulnerabilities assessment and management.
What is the primary responsibility of security personnel
Monitor, evaluate, and provide advice to the Secretary of Defense Answer = Protect classified information and controlled unclassified information Direct the operation of and assure the security of the global DoD network Coordinate all DoD network operations
What is security personnel’s primary skill in relationship to cybersecurity
Analyze duties Answer = Manage risk Execute training Respond to incident
Risk Management System Components
Risk Assessment
Mitigation
Evaluation
Risk Management System
- Provides overarching methodology to follow when managing risks.
- Consists of assessment, mitigation, and evaluation (in that order).
- Be aware of risk impacts
- Reassess constantly as new solutions are deployed.
Risk Assessment
- Determines the extent of the threat and risk associated with the information system.
- Used to identify security controls to decrease the risk.
- Security personnel identify and evaluate risks, risk impacts, and countermeasures.
- Revisit risk assessment as you move through the other phases of risk management.
Mitigation
- Prioritize, implement, and maintain risk-reducing measures.
- Implement the most appropriate controls.
- Accept the risk by simply continuing to operate the information system.
- Avoid the risk by eliminating the risk cause and/or the consequence.
- Limit the risk by implementing controls to minimize the adverse impact of a threat exploiting a vulnerability.
Evaluation
Risk evaluation is essential to the risk management process. It is the continual process of assessing and mitigating risk. Then purpose of evaluation is to ensure that as changes occur, you are reviewing and ensuring that new risks have not arisen
What are the six RMF steps?
- Step 1 is Categorize System
- Step 2 is Select Security Controls
- Step 3 is Implement Security Controls
- Step 4 is Assess Security Controls
- Step 5 is Authorize System
- Step 6 is Monitor Security Controls