Module 10 - Intel / Counter Intel Support Flashcards
Capstone Threat Assessments (CTAs)
Inform the capability shortfall identification process during early phases of system acquisition prior to the generation of a Validated On-line Life-cycle Threat (VOLT) Report. The CTAs project foreign capabilities, in particular warfare areas, out to 20 years.
Validated Online Life-cycle Threat (VOLT) Report
Assessment should be system specific,
should address projected adversary capabilities at system initial operating capability (IOC) and at IOC plus 10 years.
5000.02, requires that MDAPs have a validated VOLT Report in place at Milestones B and C
Seven CTA Warfare Areas
Air Warfare
Chemical, Biological and Radiological Defense
Information Operations
Land Warfare
Missile Defense
Naval Warfare
Space Warfare
Critical Intelligence Parameters (CIPs)
Key performance thresholds of foreign threat systems, which, if exceeded, could compromise the mission effectiveness of the U.S. system in development.
If a CIP is breached, the responsible intelligence production center will notify the program office and DIA/DWO
Technology Targeting Risk Assessment (TTRA)
Program Protection
Integrating process for mitigating and managing risks to advanced technology and mission-critical system functionality from foreign collection, design vulnerability, or supply chain exploitation/insertion, battlefield loss, and unauthorized or inadvertent disclosure throughout the acquisition lifecycle.
Program Protection Plan (PPP)
Milestone acquisition document that describes the plan, responsibilities, and decisions for all Program Protection activities.
Required by DoDI 5000.02, Operation of the Defense Acquisition System, and DoDI 5200.39 Critical Program Information (CPI) Protection within the DoD
a risk-based, comprehensive, living plan to guide efforts for managing risk to CPI and mission critical functions and components.
Five Pillars of Cybersecurity
Availability - timely and relaibel access to info
Integrity - guarding against improper info modification and desturction
Authentication - verifying identity, process, device
Confidentiality - preserving restirctions to access of info
Non-Repudiation - sender is provided proof of delivery and receiver provided proof of sender ID