COMNAVIDFORINST M-5239.2D, COMMANDER'S CYBER SECURITY AND INFORMATION ASSURANCE HANDBOOK Flashcards
(47 cards)
What centralizes command of cyberspace operations, strengthens DoD cyberspace capabilities, and integrates and bolsters DoD’s cyber expertise?
U.S. Cyber Command (USCYBERCOM)
What manages the entire DoD Information Network (DoDIN)?
Defense Information Systems Agency (DISA)
Who serves as the Navy’s cryptologic commander?
Commander, Tenth Fleet (C10F)
What sets cyber policy for the Navy?
U.S. Fleet Cyber Command (FLTCYBERCOM)
What provides integrated communications and IT systems that enable Information Dominance and the C2 of maritime forces/
Program Executive Office for Command, Control, Communications, Computers, and Intelligence (PEO C4I)
What designs, develops, and deploys advanced communications and information capabilities?
Space and Naval Warfare Systems Command (SPAWAR)
What, as the Navy’s C5I capability TYCOM, provides relevant, resilient, and effective C5I capabilities and a highly trained cyber workforce to maximize fleet readiness through Train and Assist Visits (TAVs) to support all Naval missions throughout cyberspace?
Navy Information Dominance Forces (NAVIDFOR)
NAVIFOR
What operates and defends the Navy’s portion of the DoD Information Network (DoDIN), current Information Condition (INFOCON) level, and issues tasking orders and guidance to the Fleet in the form of Communications Tasking Orders (CTOs) and Naval Telecommunications Directives (NTDs)?
Naval Network Warfare Command (NAVNETWARCOM)
What has the mission of coordinating, monitoring, and overseeing the defense of Navy computer networks and systems and to be responsible for accomplishing Computer Network Defense (CND) missions as assigned by C10F and Commander, USCYBERCOM?
Navy Cyber Defense Operations Command (NCDOC)
What afford the ability to confirm an event based on live system analysis, and/or determine any additional data gathering actions required to facilitate an investigation?
Cyber Tactical Teams (CTTs)
What is the Navy’s Center of Excellence for Information Operations (IO)?
Navy Information Operations Command (NIOC), Norfolk
Who is responsible to the Commanding Officer (CO) for the proper development, implementation, and enforcement of the command’s personnel and traditional/PHYSEC posture?
Command Security Manager (CSM)
Who is responsible for ensuring the command’s Information System (IS) is operated, used, maintained, and disposed of per governing security policies and practices?
Information Systems Security Manager (ISSM)
Which Navy Enlisted Classification (NEC) must Information Systems Security Mangers (ISSMs) have?
NEC 2779
What is the minimum required pay grade for personnel holding the Information Systems Security Manager (ISSM) position at the tactical/shipboard level?
E-7
Who implements and enforces system-level Cyber Security (CS) controls per program and policy guidance?
Information System Security Officer (ISSO)
Which personnel administer and maintain a command’s Information System (IS), and are the backbone fo the Cybersecurity Workforce (CSWF)?
Privileged users
How often must authorized users of a network system participate in Cyber Awareness Challenge training as mandated by the DoD?
Annually
What is the DoD IA Implementation Guide that implements policy, assigns responsibilities, and prescribes procedures for applying integrated, layered protection of the DoD IS and networks?
DoDI 8500.2
What is the DON IA Workforce Management Manual that provides guidance for managing your local Cybersecurity Workforce (CSWF) and addresses training/certification requirements for members of the Cybersecurity Workforce (CSWF)?
SECNAV M-5239.2
What is the DoD governing instruction on Incident Response?
CJCS-M 6510.01F
Which publication provides specific Navy policy for developing an Incident Response program locally?
SECNAVINST 5239.19
Which Naval Telecommunications Directive (NTD) addresses Electronic Spillage (ES)/Negligent Discharge within the Navy enterprise, and must be incorporated into a local command Incident Response Plan?
NTD 11-08
What must all commands maintain for their network systems as granted by the AO for an Information System (IS) to process, store, or transmit information?
Authorization to Operate (ATO)