DODI 8500.01, Encl. 3 Flashcards
Which program ensures that IT can be used in a way that allows mission owners and operators to have
confidence in the confidentiality, integrity, and availability of IT and DoD information, and to make
choices based on that confidence?
Defense cyber security
What is used by the DoD to address risk management for all DoD ISs and PIT systems?
NIST SP 800-37
From which perspective does tier one risk management address risk?
Organizational
What provides the Tier 1 risk management governance for the DoD?
DOD ISRMC
Which risk management tier addresses risk from a mission and business process perspective?
Tier 2
Which risk management tier addresses risk from an IS and PIT system perspective?
Tier 3
Cybersecurity risk management is planned for and documented in a cybersecurity strategy in accordance with Interim DoD Instruction 5000.02 along with which other reference?
DOD Instruction 8580.1
What provides a disciplined and structured process that combines IS security and risk management
activities into the system development life cycle and authorizes their use within the DoD?
Risk Management Framework (RMF)
How many steps does the Risk Management Framework (RMF) have?
6
The reciprocal acceptance of DoD and other federal agency and department security authorizations will
be implemented in accordance with procedures in which reference?
DoD Instruction 8510.01
- How many conditions must be met for operational resilience?
3
Transmission of DoD information must be protected through the communications security (COMSEC)
measures and procedures established in which reference?
DoDI 8523.01
COMSEC monitoring and cybersecurity readiness testing will be conducted in accordance with which
reference?
DoD Instruction 8560.01
Which type of model provides people, services, and platforms the ability to discover one another and
connect to form new capabilities or teams without being constrained by geographic, organizational, or technical barriers?
Net-centric
What coordinates and facilitates relationships across LE, intelligence, and homeland security
communities?
DoD Cyber Crime Center