Module 10 - Intel / Counter Intel Support Flashcards

1
Q

Capstone Threat Assessments (CTAs)

A

Inform the capability shortfall identification process during early phases of system acquisition prior to the generation of a Validated On-line Life-cycle Threat (VOLT) Report. The CTAs project foreign capabilities, in particular warfare areas, out to 20 years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Validated Online Life-cycle Threat (VOLT) Report

A

Assessment should be system specific,

should address projected adversary capabilities at system initial operating capability (IOC) and at IOC plus 10 years.

5000.02, requires that MDAPs have a validated VOLT Report in place at Milestones B and C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Seven CTA Warfare Areas

A

Air Warfare
Chemical, Biological and Radiological Defense
Information Operations
Land Warfare
Missile Defense
Naval Warfare
Space Warfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Critical Intelligence Parameters (CIPs)

A

Key performance thresholds of foreign threat systems, which, if exceeded, could compromise the mission effectiveness of the U.S. system in development.

If a CIP is breached, the responsible intelligence production center will notify the program office and DIA/DWO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Technology Targeting Risk Assessment (TTRA)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Program Protection

A

Integrating process for mitigating and managing risks to advanced technology and mission-critical system functionality from foreign collection, design vulnerability, or supply chain exploitation/insertion, battlefield loss, and unauthorized or inadvertent disclosure throughout the acquisition lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Program Protection Plan (PPP)

A

Milestone acquisition document that describes the plan, responsibilities, and decisions for all Program Protection activities.

Required by DoDI 5000.02, Operation of the Defense Acquisition System, and DoDI 5200.39 Critical Program Information (CPI) Protection within the DoD

a risk-based, comprehensive, living plan to guide efforts for managing risk to CPI and mission critical functions and components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Five Pillars of Cybersecurity

A

Availability - timely and relaibel access to info

Integrity - guarding against improper info modification and desturction

Authentication - verifying identity, process, device

Confidentiality - preserving restirctions to access of info

Non-Repudiation - sender is provided proof of delivery and receiver provided proof of sender ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly