DODI 8500.01, CYBER SECRITY Flashcards
Which instruction established a DoD cyber security program to protect and defend DoD information and information technology?
DoDI 8500.01
What will be employed to protect, detect, characterize, and mitigate unauthorized activity and vulnerabilities on DoD information networks?
Cyberspace Defense
What must be given to all DoD information in electronic format in the appropriate levels that reflects the importance of both information sharing and protection?
Confidentiality, Integrity and Availability
What must be used to ensure strong identification, authentication, and eliminate anonymity in DoD IS and PIT systems?
Identity Assurance
Which instruction must the DoD-wide Public Key Infrastructure (PKI) solution be managed in accordance with?
DoDI 8520.02
Which instruction must the biometrics that are used in support of identity assurance be managed in accordance with?
DoDD 8521.01
Who is responsible for the monitoring, evaluation, and providing the advice to the Secretary of Defense regarding all DoD cyber security activities and oversee implementation of DoDI 8500.01?
DoD CIO (Pages 14)
Who does the DoD CIO coordinate with to ensure that cyber security policies and capabilities are aligned with and mutually supportive of personnel. physical, industrial, information and operations security and capabilities?
Under Secretary of Defense for Intelligence (USD(I))
Who does the DoD CIO coordinate with in development of cybersecurity-related standards and guidance?
NIST
Who does the DoD CIO coordinate with to ensure that cybersecurity responsibilities are integrated into processes for DoD acquisition programs, including research and development?
USD(AT&L)
What does the DoD CIO appoint for DoD ISs and PIT systems governed by the Enterprise Information Mission Area (MA) (EIEMA)?
PAO
In what grade or the civilian employee equivalent must the candidate be to be appointed as the Defense IA Security Accreditation Working Group (DSAWG) Chair by the DoD CIO?
0-6
How often must the DoD CIO conduct an assessment of the DoD Component cybersecurity program?
Annually
Who develops or acquires solution that support cybersecurity objectives for use throughout the DoD via the ESSG process?
DISA Director
In accordance with which instruction does the DISA Director ensure the continued development and maintenance of the standards procedures to catalog, regulate, and control the use and management of Internet protocols, data services, and associated ports an DoD networks?
DoD Instruction 8551.1
In accordance with which publication does the DlSA Director develop and provide cybersecurity training and awareness products as well as a distributive training capability to support the DoD Components?
DoD Directive 8570.01
Who does the DlSA Director coordinate with to ensure that command cyber readiness inspection guidance and metrics provide a unity effort among the security disciplines?
USD(I)
Who assists with acquisition related agreements, and international cybersecurity and cyberspace defense negotiations and agreements?
USD(AT&L)
The USD(AT&L) must ensure that PIT systems included in acquisition programs are designated, categorized‘ and have their authorization boundaries defined according to the guidelines that are provided in which reference?
DoD Instruction 8510.01
Who exercises oversight responsibility for developmental test planning in support of interoperability and cybersecurity programs acquiring DoD is and PIT systems in accordance with DoDl 5134.17?
DASD(DT& E)
Who coordinates with the DoD ClO to ensure cybersecurity strategies, policies, and capabilities are aligned with overarching DoD cyberspace policy. and are supportive of policies and capabilities relating to the disclosure of classified military information to foreign governments and international organizations in accordance with DoD Directive 8000.0l
USD(P)
Who supports implementation of cybersecurity requirements for effective manning, management, and readiness assessments of the cybersecurity workforce in accordance with DoD Directive 8570.01 and DoD 8570.01-M?
USD(P&R)
Who evaluates or validates security implementation specifications described in DoDl 8500.01?
DIRNSA/CHCSS
Who develops, implements, and manages the cybersecurity program for DoD non cryptographic SCI systems, including the DoD intelligence (DoDIIS) and JWlCS?
Director, DIA
Who appoints the PAO for DoD IS and PIT systems governed by the Business Mission Area (BMA)?
Deputy Chief Management Officer (DCMO)