MSBs Flashcards
What is the key input to the secure stage of a secure mission?
Risk Mitigation Plan
This provides the final report to capture all of the lessons learned from the survey and secure stages of a secure mission.
Summary Reporting
Serves to complete COA selection and deploy approved risk mitigation’s as outlined in the RMP.
COA Implementation
Provides the final evaluation of deployed risk mitigation’s
Risk mitigation validation
Focused on conducting the training necessary to educate Local Cyber Defenders on the technical and procedural mitigation’s employed.
Education and Training
What are the 4 supporting objectives executed during a secure mission?
Education and Training
Course of action implementation
Risk mitigation validation
Summary reporting
What are the key outputs of the Secure Mission?
Mission Defense Plan
Summary Report
This outlines the residual risks after implementation.
Mission Defense Plan
This is the final product of the secure stage which captures all of the lessons learned.
Summary Report
Any piece of information that objectively describes an intrusion.
Indicator of Compromise
Three types of Indicators of Compromise
Atomic, Computed, Behavioral
Ip, addresses and email addresses
Atomic IOC
A method an adversary uses to get to a target.
Threat Vector
3 phases of a network attack.
Access, persistence, control
Utilizing any number of tricks to hide nefarious means.
Malicious software.
One day exploits or improperly configured server software.
Unpatched software.
Adversary gains legitimate credentials of an account users access to a system.
Stolen Credentials
Psychological manipulation of people into performing actions of divulging confidential information.
Social engineering
Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in an electronic communication (email)
Phishing