Cybersecurity Flashcards
Confidentiality
Guards against a user without proper clearance accessing classified information.
Preserves authorized restrictions on information disclosure.
Protects personal privacy and proprietary information.
Confidentiality example
XX
Integrity
Guards against improper modification to or destruction of information.
Integrity Example
Prevents a user from improperly or maliciously modifying a database.
Availability
Ensures timely and reliable access to and use of information.
Availability Example
Ensures that an information system is accessible when an authorized user needs it.
Importance of Authentication
Mechanism that authorizes or allows access to computer systems and networks and the data that resides there.
Loss of or incorrect authentication services could allow unauthorized access to classified data.
Authentication Example
Common Access Card (CAC)
-provides system identification that authenticates the user
Non-Repudiation
Ensures that a party in an electronic exchange cannot deny…
- participation in the exchange
- authenticity of the message
Non-Repudiation Example
Digital signature
-confirms the identity of the sender of an email or the signer of a document
5 Attributes of Cybersecurity
Confidentiality
Integrity
Availability
Authentication
Non-Repudiation
2 Most Important Cybersecurity Attributes
Confidentiality
-Ensures the nation’s private information is contained.
Authentication
-One must prove who they are and why they need access before gaining access to the nation’s private information.
Importance of the 5 Attributes of Cybersecurity
Susceptible to threats and vulnerabilities.
Overlooking one attribute could create a vulnerability that leaves data susceptible to attack.
Must be aware of attributes to ensure risk is managed appropriately across all areas.
Must maintain these areas to prevent loss.
Main Points of Security Policy
- Identify and protect national security information and controlled unclassified information (CUI) in accordance with national-level policy issuances
- Promote information sharing, facilitate judicious use of resources, and simplify management through implementation of uniform and standardized processes
- Employ, maintain, and enforce standards for safeguarding, storing, destroying, transmitting, and transporting classified information
- Actively promote and implement security education and training throughout the Department of Defense
- Mitigate the adverse effects of unauthorized access to classified information by investigating and acting upon reports of security violations and compromises of classified information
DODI 8500.01 - Risk Management
- DoD will implement a multi-tiered cybersecurity risk management process.
- DoD must consider all cybersecurity risks.
- All DoD IT will participate in a cybersecurity program to manage risk.
- Risk management will be addressed as early as possible.
- Documentation regarding the security posture of DoD IS and platform information technology (PIT) systems will be made available.
DODI 8500.01 - Operational Resilience
- Information and services are available to authorized users.
- Security posture is sensed, correlated, and made visible to mission owners, network operators, and to the DoD Information Enterprise.
- Whenever possible, technology components have the ability to reconfigure, optimize, self-defend, and recover with little or no human intervention.
DODI 8500.01 - Integration and Interoperability
- Cybersecurity must be fully integrated into system life cycles.
- Interoperability will be achieved through adherence to DoD architecture principles, adopting a standards-based approach, and by all DoD Components sharing the level of risk necessary to achieve mission success.
- All interconnections of DoD IT will be managed to minimize shared risk.
DODI 8500.01 - Cyberspace Defense
- Employed to protect, detect, characterize, counter, and mitigate unauthorized activity and vulnerabilities.
- Shared with all appropriately cleared and authorized personnel.
DODI 8500.01 - Performance
- Implementation of cybersecurity will be overseen and governed through the integrated decision structures and processes.
- Performance will be measured, assessed for effectiveness, and managed.
- Data will be collected to support reporting and cybersecurity management activities.
- Standardized information technology tools, methods, and processes will be used to the greatest extent possible.
DODI 8500.01 - DoD Information
-All DoD information in electronic format will be given an appropriate level of confidentiality, integrity, and availability.
DODI 8500.01 - Identity Assurance
- Identity assurance must be used to ensure strong identification, authentication, and eliminate anonymity.
- DoD will public key-enable DoD information systems (ISs) and implement a DoD-wide Public key Infrastructure (PKI) solution that will be managed by the DoD PKI Program Management Office.
- Biometrics will be managed.
DODI 8500.01 - Information Technology
- All information technology that receives, processes, stores, displays, or transmits DoD information will be acquired, configured, operated, maintained, and disposed of.
- Risks, weaknesses or flaws, and vulnerabilities introduced through faulty design, configuration, or use will be managed, mitigated, and monitored.
- Cybersecurity requirements must be identified and included.
DODI 8500.01 - Cybersecurity Workforce
- Cybersecurity workforce functions must be identified and managed.
- Qualified cybersecurity personnel must be identified and integrated into all phases of the system development lifecycle.
DODI 8500.01 - Mission Partners
- Capabilities that are shared with mission partners will be consistent.
- DoD originated and DoD provided information must be properly and adequately safeguarded, with documented agreements indicating required levels of protection.