<?xml version="1.0"?>
<Module projectID="1386" moduleID="1727" filePath="disa/ia/cw/disa_cnd_v2_fy13/dev/M01_L02/data.xml" showTextDisplayMode="captionsAndHTML">
	<CourseTitle>Cyberspace Defense (CD) Course</CourseTitle>
	<AU>M01_L02</AU>
	<Title>Cyberspace Defense Overview</Title>
	<LinkSet>links</LinkSet>
	<DefaultControlText name="Done" value="Submit"></DefaultControlText>
	<DefaultControlText name="NextFeedback" value="Next Feedback"></DefaultControlText>
	<DefaultControlText name="PreviousFeedback" value="Previous Feedback"></DefaultControlText>
	<DefaultControlText name="CloseFeedback" value="Close Feedback"></DefaultControlText>
	<DefaultControlText name="TryAgain" value="Try Again"></DefaultControlText>
	<DefaultControlText name="button_print" value="Print Certificate"></DefaultControlText>
	<NavBtns order="referenceObj,skipTopNavBtn,helpBtn,exitBtn,[PAGE],doneBtn,prevFeedbackBtn,nextFeedbackBtn,skipBtmNavBtn,courseMapBtn,resourcesBtn,glossaryBtn,transcriptBtn,turnAudioDescriptionsOffBtn,turnAudioDescriptionsOnBtn,hideCCBtn,showCCBtn,replayBtn,skipReverseBtn,skipForwardBtn,pauseBtn,resumeBtn,previousPgBtn,pageLocation,nextPgBtn,showtext">
		<NavBtn>
			<ControlType>ReferenceOnlyObject</ControlType>
			<ID>referenceObj</ID>
			<RMAText>Testing This Reference Object</RMAText>
		</NavBtn>
		<NavBtn>
			<ControlType>ReadOnlyText</ControlType>
			<ID>pageLocation</ID>
			<RMAText>Page x of y</RMAText>
		</NavBtn>
		<NavBtn>
			<ID>skipTopNavBtn</ID>
			<Label>SKIP TO CONTENT</Label>
			<RMAText>SKIP TO CONTENT</RMAText>
			<ClickEventName>SkipTopNavButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>skipBtmNavBtn</ID>
			<Label>SKIP NAVIGATION</Label>
			<RMAText>SKIP NAVIGATION</RMAText>
			<ClickEventName>SkipBtmNavButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>helpBtn</ID>
			<Label>Help</Label>
			<RMAText>Help. Select this button to open the help panel.</RMAText>
			<ClickEventName>HelpButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>exitBtn</ID>
			<Label>Exit</Label>
			<RMAText>Exit. Select this button to exit the course.</RMAText>
			<ClickEventName>ExitButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>courseMapBtn</ID>
			<Label>Course Map</Label>
			<RMAText>Course map. Select this button to access the course map.</RMAText>
			<ClickEventName>CourseMapButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>glossaryBtn</ID>
			<Label>Glossary</Label>
			<RMAText>Glossary. Select this button open the glossary.</RMAText>
			<ClickEventName>GlossaryButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resourcesBtn</ID>
			<Label>Resources</Label>
			<RMAText>Resources. Select this button to access the resources for the course.</RMAText>
			<ClickEventName>ResourcesButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>hideCCBtn</ID>
			<Label>Hide Captions</Label>
			<RMAText>Hide Captions. Select this button to hide the caption text.</RMAText>
			<ClickEventName>HideCCButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>showCCBtn</ID>
			<Label>Show Captions</Label>
			<RMAText>Show Captions. Select this button to show the caption text.</RMAText>
			<ClickEventName>ShowCCButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>turnAudioDescriptionsOffBtn</ID>
			<Label>Turn Audio Descriptions Off</Label>
			<RMAText>Turn Audio Descriptions Off. Select this button to turn off audio descriptions.</RMAText>
			<ClickEventName>AudioDescriptionsOffButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>turnAudioDescriptionsOnBtn</ID>
			<Label>Turn Audio Descriptions On</Label>
			<RMAText>Turn Audio Descriptions On. Select this button to turn on audio descriptions.</RMAText>
			<ClickEventName>AudioDescriptionsOnButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>skipReverseBtn</ID>
			<Label>Skip Backward</Label>
			<RMAText>Skip Backward. Select this button to skip a few frames back.</RMAText>
			<ClickEventName>SkipReverseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>skipForwardBtn</ID>
			<Label>Skip Forward</Label>
			<RMAText>Skip Forward. Select this button to skip a few frames ahead.</RMAText>
			<ClickEventName>SkipForwardButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>replayBtn</ID>
			<Label>Replay</Label>
			<RMAText>Replay. Select this button to replay the current screen.</RMAText>
			<ClickEventName>ReplayButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>transcriptBtn</ID>
			<Label>Transcript</Label>
			<RMAText>Transcript. Select this button for a transcript of the current page.</RMAText>
			<ClickEventName>ShowTextButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>pauseBtn</ID>
			<Label>Pause</Label>
			<RMAText>Pause. Select this button to pause the course.</RMAText>
			<ClickEventName>PauseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resumeBtn</ID>
			<Label>Resume</Label>
			<RMAText>Resume. Select this button to resume the course.</RMAText>
			<ClickEventName>ResumeButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn prevBtn="true" toggleOffSilent="false">
			<ID>previousPgBtn</ID>
			<Label>Back</Label>
			<RMAText>Back. Select this button to go to the previous screen.</RMAText>
			<ClickEventName>PreviousButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn h="19.1" nextBtn="true" toggleOffSilent="false" w="67.6">
			<ID>nextPgBtn</ID>
			<Label>Next</Label>
			<RMAText>Next. Select this button to go to the next screen.</RMAText>
			<ClickEventName>NextButtonClicked</ClickEventName>
		</NavBtn>
	</NavBtns>
	<Topics>
		<Topic>
			<Title>Introduction</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>Objectives and Topics</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv202_01</Filename>
					<PageNbr>1</PageNbr>
					<Sec508Data Page="disacndv202_01"></Sec508Data>
					<ShowText Page="disacndv202_01">
						<Txt frameNbr="5">Welcome to the Cyberspace Defense Overview lesson. When you have completed this lesson, you will be able to</Txt>
						<Txt frameNbr="151">identify what the DoD Information Networks, or DoDIN, are, what NetOps is, and the fundamental relationship</Txt>
						<Txt frameNbr="319">between the DoDIN and NetOps. You will be able to define cybersecurity and cyberspace defense, and</Txt>
						<Txt frameNbr="505">identify the unique role that cyberspace defense has within cybersecurity. There are five topics in this lesson. After you</Txt>
						<Txt frameNbr="685">have completed this Introduction, you will learn what the DoDIN are, why it is important to protect them, and</Txt>
						<Txt frameNbr="832">what is required to protect them. Next, you will learn about NetOps, which is the construct that is used to operate and</Txt>
						<Txt frameNbr="1014">defend the DoDIN. Then, you will learn about cybersecurity and cyberspace defense, and how cybersecurity, cyberspace</Txt>
						<Txt frameNbr="1200">defense, and NetOps are related.</Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>DoD Information Networks</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>What Are the DoDIN?</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv202_02</Filename>
					<PageNbr>2</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>DISN, 
Defense Information Systems Network (DISN), The DoD consolidated worldwide enterprise-level telecommunications infrastructure that provides the end-to-end information transfer network for supporting military operations.
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover2">
							<RMAText>NIPRNET, 
Nonsecure Internet Protocol Router Network
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover3">
							<RMAText>SIPRNET, 
SECRET Internet Protocol Router Network
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<Popups>
						<Popup>
							<Title>What Are the DoDIN?</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv202_02_01</Filename>
							<PageNbr>2</PageNbr>
							<Sec508TriggerName>MORE</Sec508TriggerName>
							<Sec508Data Page="disacndv202_02_01"></Sec508Data>
							<ShowText Page="disacndv202_02_01">
								<Txt frameNbr="9">[no audio]</Txt>
							</ShowText>
						</Popup>
					</Popups>
					<Sec508Data Page="disacndv202_02"></Sec508Data>
					<ShowText Page="disacndv202_02">
						<Txt frameNbr="7">Relatively few DoD information systems operate autonomously without connection to other systems or networks.</Txt>
						<Txt frameNbr="194">Each DoD agency, field activity, combatant command, and Service: Army, Navy, Marines, and Air Force, has its own</Txt>
						<Txt frameNbr="417">network, which is connected to the Defense Information Systems Network, or DISN. The DISN is the DoD consolidated</Txt>
						<Txt frameNbr="608">worldwide enterprise-level telecommunications infrastructure that provides the end-to-end information transfer</Txt>
						<Txt frameNbr="774">network for supporting military operations. The non-secure Internet protocol router network, or NIPRNET; the secret Internet</Txt>
						<Txt frameNbr="1009">protocol router network, or SIPRNET; and the DISN Video Services Global form the backbone of the DISN.</Txt>
						<Txt frameNbr="1195">The DISN connects to and is a part of the overarching network referred to as the DoD Information Networks, or DoDIN.</Txt>
						<Txt frameNbr="1393">The DoDIN include any communications and information systems that provide support to DoD.</Txt>
						<Txt frameNbr="1528">Even the Internet, with the appropriate security protections, is connected to and is part of the DoDIN.</Txt>
						<Txt frameNbr="1693">The DoDIN are the globally interconnected, end-to-end set of information capabilities, associated processes, and</Txt>
						<Txt frameNbr="1879">personnel for collecting, storing, disseminating, and managing information on demand to warfighters, policy makers, and</Txt>
						<Txt frameNbr="2055">support personnel. The DoDIN include all owned, leased, standalone, and interconnected communications and</Txt>
						<Txt frameNbr="2244">computing systems and services; software, including applications; data; security services; and other associated</Txt>
						<Txt frameNbr="2453">services necessary to achieve information superiority.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Why Must the DoDIN Be Protected?</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv202_03</Filename>
					<PageNbr>3</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>CIO, 
Chief Information Officer
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover2">
							<RMAText>AO, 
An Authorizing Official is a senior (federal) official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation. The Authorizing Official is formerly known as Designated Accrediting Authority (DAA). CNSS Instruction No. 4009
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover3">
							<RMAText>IT, 
Information Technology
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<Popups>
						<Popup>
							<Title>Why Must the DoDIN Be Protected?</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv202_03_01</Filename>
							<PageNbr>3</PageNbr>
							<Sec508TriggerName>Operational Security</Sec508TriggerName>
							<Sec508Data Page="disacndv202_03_01"></Sec508Data>
							<ShowText Page="disacndv202_03_01">
								<Txt frameNbr="7">The business of national security is conducted over the DoDIN. If the information on the DoDIN is at risk, our operations</Txt>
								<Txt frameNbr="179">and personnel are at risk. If information systems become unavailable and the flow of information is disrupted, our</Txt>
								<Txt frameNbr="366">ability to deploy troops, medical supplies, and other necessary logistics may be affected. In addition, because information</Txt>
								<Txt frameNbr="552">systems are integral to our work, information system outages waste valuable time and taxpayer dollars.</Txt>
								<Txt frameNbr="741">Sensitive and classified information can fall into the wrong hands if the DoDIN are not protected, monitored, and</Txt>
								<Txt frameNbr="907">sustained. Almost every week, it seems, we read in the newspapers about a major hacking attack against some</Txt>
								<Txt frameNbr="1077">portion of the DoDIN, not just against the "dot mil" networks, but also against academic research, defense contractor,</Txt>
								<Txt frameNbr="1267">industry, acquisition, and information technology service networks upon which the U.S. Military depends. Fortunately,</Txt>
								<Txt frameNbr="1444">not all cyberspace attacks succeed, but the next time a successful cyberspace attack occurs, it could be from an</Txt>
								<Txt frameNbr="1628">adversary of the U.S. or from someone willing to give away or sell information to an adversary of the U.S. Ultimately, if</Txt>
								<Txt frameNbr="1806">information falls into the wrong hands or isn't available when it is needed, missions may be compromised. This can result in</Txt>
								<Txt frameNbr="2014">the loss of equipment, taxpayer dollars, lives, and, ultimately, loss of mission.</Txt>
							</ShowText>
						</Popup>
						<Popup>
							<Title>Why Must the DoDIN Be Protected?</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv202_03_02</Filename>
							<PageNbr>3</PageNbr>
							<Sec508TriggerName>Financial Security</Sec508TriggerName>
							<Sec508Data Page="disacndv202_03_02"></Sec508Data>
							<ShowText Page="disacndv202_03_02">
								<Txt frameNbr="104">If the DoDIN are vulnerable, both personal and government financial information is at risk. DoD systems contain personally</Txt>
								<Txt frameNbr="191">identifiable information, or PII, that can be exploited. Identity thieves can use this information to obtain driver's licenses, order</Txt>
								<Txt frameNbr="428">credit cards, and withdraw money from the victim's bank accounts. Identity thieves can also ruin their victims' credit.</Txt>
								<Txt frameNbr="623">Unscrupulous people may exploit government financial information, such as charge codes and bank account</Txt>
								<Txt frameNbr="767">numbers. With this information, a thief could make false purchases and then transfer payments into a personal bank</Txt>
								<Txt frameNbr="935">account. Keeping personal and government financial information safe helps to prevent identity theft and</Txt>
								<Txt frameNbr="1096">misappropriation of government funds.</Txt>
							</ShowText>
						</Popup>
						<Popup>
							<Title>Why Must the DoDIN Be Protected?</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv202_03_03</Filename>
							<PageNbr>3</PageNbr>
							<Sec508TriggerName>Technological Advantage</Sec508TriggerName>
							<Sec508Data Page="disacndv202_03_03"></Sec508Data>
							<ShowText Page="disacndv202_03_03">
								<Txt frameNbr="6">The U.S. is a global leader in the development of new technology. This technology provides an advantage in</Txt>
								<Txt frameNbr="169">combat. It can also provide U.S. companies an economic advantage over their domestic and international competitors.</Txt>
								<Txt frameNbr="360">Consequently, the data contained in DoD information systems is highly desirable to both military enemies and</Txt>
								<Txt frameNbr="519">economic competitors. This makes DoD information systems a potential target for industrial espionage, which may be</Txt>
								<Txt frameNbr="703">perpetrated by individuals, rogue organizations, U.S. and foreign companies, or foreign governments. Even some</Txt>
								<Txt frameNbr="898">countries that are traditionally U.S. allies have been known to commit acts of industrial espionage against U.S.</Txt>
								<Txt frameNbr="1057">companies and government representatives. As noted earlier, the U.S. Government has a responsibility to protect</Txt>
								<Txt frameNbr="1227">not only its own classified and proprietary technological information, but also the information belonging to its</Txt>
								<Txt frameNbr="1382">commercial and research partners. Industrial espionage can deprive the U.S. military of an advantage over enemies.</Txt>
								<Txt frameNbr="1582">Industrial spies can also cost U.S. businesses billions of dollars in wasted research and lost sales. The loss of sensitive</Txt>
								<Txt frameNbr="1776">U.S. Government or DoD information could threaten this nation's secrets and compromise treaty negotiations,</Txt>
								<Txt frameNbr="1937">military operations, or political advantage.</Txt>
							</ShowText>
						</Popup>
					</Popups>
					<Sec508Data Page="disacndv202_03"></Sec508Data>
					<ShowText Page="disacndv202_03">
						<Txt frameNbr="6">The DoDIN provide the information necessary to support the DoD enterprise information environment,</Txt>
						<Txt frameNbr="146">warfighter, intelligence, and business missions. To support these missions, the DoDIN provide information on demand,</Txt>
						<Txt frameNbr="331">when and where it is needed. Since sharing sensitive information can also put these missions at risk, the DoDIN must</Txt>
						<Txt frameNbr="508">be proactively protected and defended. The Secretary of Defense has stated, "We must change the paradigm in which</Txt>
						<Txt frameNbr="696">we talk and think about the network; we must 'fight' rather than 'manage' the network, and operators must see themselves</Txt>
						<Txt frameNbr="880">as engaged at all times, ensuring the health and operations of this critical weapons system."</Txt>
						<Txt frameNbr="1039">Everyone is responsible for protecting the DoDIN: Component Heads, Chief Information Officers, or CIOs,</Txt>
						<Txt frameNbr="1204">Authorizing Officials, or AOs, System Owners, cybersecurity and information technology professionals, and, especially,</Txt>
						<Txt frameNbr="1401">users. When the DoDIN are not secure, our missions, property, and most importantly, our personnel are at risk. Any</Txt>
						<Txt frameNbr="1636">vulnerability in the DoDIN also jeopardizes our financial security and technological advantage. Select each risk</Txt>
						<Txt frameNbr="1823">area to learn more about the potential effects if the DoDIN are compromised.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>How Are the DoDIN Protected?</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv202_04</Filename>
					<PageNbr>4</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>IT, 
Information Technology
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover2">
							<RMAText>JIE, 
Joint Information Environment
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<Popups>
						<Popup>
							<Title>How Are the DoDIN Protected?</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv202_04_01</Filename>
							<PageNbr>4</PageNbr>
							<Sec508TriggerName>More Information about the JIE</Sec508TriggerName>
							<Controls>
								<RollOverButtonControl name="rollover1">
									<RMAText>DoDIN, 
DoD Information Networks
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover2">
									<RMAText>JIE, 
Joint Information Environment
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover3">
									<RMAText>UCP, 
Unified Command Plan
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover4">
									<RMAText>TTPs, 
Tactics, Techniques, and Procedures
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover5">
									<RMAText>CIO, 
Chief Information Officer
</RMAText>
								</RollOverButtonControl>
							</Controls>
							<Sec508Data Page="disacndv202_04_01"></Sec508Data>
							<ShowText Page="disacndv202_04_01">
								<Txt frameNbr="6">[no audio]</Txt>
							</ShowText>
						</Popup>
					</Popups>
					<Sec508Data Page="disacndv202_04"></Sec508Data>
					<ShowText Page="disacndv202_04">
						<Txt frameNbr="7">Historically, defense of the DoDIN from unauthorized intrusion and hostile attack has been accomplished through</Txt>
						<Txt frameNbr="164">separate, subordinate, diverse architectures using a complex of different security technologies, applications, and</Txt>
						<Txt frameNbr="348">defensive response procedures. These diverse architectures were highly compartmentalized, presenting</Txt>
						<Txt frameNbr="511">networks with poorly delineated, sometimes overlapping boundaries and extensive attack surfaces. In October of</Txt>
						<Txt frameNbr="708">2010, recognizing that the DoDIN required an integrated cyberspace defense, the Secretary of Defense decided</Txt>
						<Txt frameNbr="880">to bring together the disparate DoD Component networks through use of a single security architecture, known as the Joint</Txt>
						<Txt frameNbr="1056">Information Environment, or JIE. The JIE, as approved by the Joint Chiefs of Staff in 2012, is defined as a secure, joint</Txt>
						<Txt frameNbr="1352">information environment comprised of shared information technology, or IT, infrastructure, enterprise</Txt>
						<Txt frameNbr="1518">services, and a single security architecture for use by Joint forces, DoD and mission partners. This single security</Txt>
						<Txt frameNbr="1733">architecture is intended to collapse network security boundaries, reduce external attack surfaces, provide a</Txt>
						<Txt frameNbr="1900">defensible architecture, and ensure rapid and safe data sharing. The goal of the JIE is to achieve full-spectrum</Txt>
						<Txt frameNbr="2109">superiority, improve mission effectiveness, increase security and realize IT efficiencies among the Joint forces. Select</Txt>
						<Txt frameNbr="2334">More Information about the JIE to learn more.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Knowledge Check</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv202_05</Filename>
					<PageNbr>5</PageNbr>
					<PageType>Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>425</DfltFBWidth>
					<Instructions>Select all that apply; then select Submit.</Instructions>
					<Questions>
						<Question qType="MR">
							<Txt>Which are components of the DoDIN?</Txt>
							<Response valid="true">
								<Txt>A Navy network</Txt>
							</Response>
							<Response valid="true">
								<Txt>A DoD contractor's desktop computer in a classified facility processing DoD information</Txt>
							</Response>
							<Response valid="true">
								<Txt>Defense Information Systems Agency Network</Txt>
							</Response>
							<Response valid="true">
								<Txt>The NIPRNET</Txt>
							</Response>
							<Response valid="true">
								<Txt>The SIPRNET</Txt>
							</Response>
							<Response valid="true">
								<Txt>A DoD contractor system that is connected to a Marine Corps system</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. All items from the list are part of the DoDIN. The DoDIN also includes networks and systems that apply to DoD IT consisting of information systems (ISs), platform IT (PIT), products, and IT services connected to DoDIN or separately.</DfltCorrect>
								<DfltIncorrect>Incorrect. All items from the list are part of the DoDIN. The DoDIN also includes networks and systems that apply to DoD IT consisting of information systems (ISs), platform IT (PIT), products, and IT services connected to DoDIN or separately.</DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<Sec508Data Page="disacndv202_05"></Sec508Data>
					<ShowText Page="disacndv202_05">
						<Txt frameNbr="1">Now check your understanding of the DoDIN.</Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>NetOps</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>What is NetOps?</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv202_06</Filename>
					<PageNbr>6</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>DoDIN, 
Department of Defense Information Networks
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<Popups>
						<Popup>
							<Title>What is NetOps?</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv202_06_01</Filename>
							<PageNbr>6</PageNbr>
							<Sec508TriggerName>Essential Tasks</Sec508TriggerName>
							<Controls>
								<RollOverButtonControl name="rollover1">
									<RMAText>DoDIN, 
Department of Defense Information Networks
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover2">
									<RMAText>IDM/CS, 
Information Dissemination Management/Content Staging
</RMAText>
								</RollOverButtonControl>
							</Controls>
							<Sec508Data Page="disacndv202_06_01"></Sec508Data>
							<ShowText Page="disacndv202_06_01">
								<Txt frameNbr="6">Three essential and interdependent tasks are necessary to operate the DoDIN: DoDIN Enterprise</Txt>
								<Txt frameNbr="171">Management, DoDIN Network Defense, and information dissemination management/content staging,</Txt>
								<Txt frameNbr="335">or IDM/CS. DoDIN Enterprise Management is the technology, processes, and policy necessary to operate the</Txt>
								<Txt frameNbr="564">DoDIN. DoDIN Network Defense consists of the activities that protect information and information systems while</Txt>
								<Txt frameNbr="752">denying adversaries access to that information and information systems. Information dissemination</Txt>
								<Txt frameNbr="910">management/content staging entails the technology, processes, and policy necessary to provide</Txt>
								<Txt frameNbr="1071">awareness of relevant, accurate information; automated access to newly discovered or recurring information; and timely,</Txt>
								<Txt frameNbr="1281">efficient, and assured delivery of information in a usable format.</Txt>
							</ShowText>
						</Popup>
						<Popup>
							<Title>What is NetOps?</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv202_06_02</Filename>
							<Sec508TriggerName>Command and Control Operating Principles</Sec508TriggerName>
							<PageNbr>6</PageNbr>
							<Controls>
								<RollOverButtonControl name="rollover1">
									<RMAText>Net-centric, 
Sharing data seamlessly and in a timely manner among information system users, applications, and platforms
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover2">
									<RMAText>DoDIN, 
Department of Defense Information Networks
</RMAText>
								</RollOverButtonControl>
							</Controls>
							<Sec508Data Page="disacndv202_06_02"></Sec508Data>
							<ShowText Page="disacndv202_06_02">
								<Txt frameNbr="8">Using information technology and information sharing to achieve information superiority in warfighting and business</Txt>
								<Txt frameNbr="180">operations is called net-centric operations and warfare, or NCOW. NCOW has vastly improved the speed and agility</Txt>
								<Txt frameNbr="408">of our military forces and business processes. For the DoD to engage in NCOW, NetOps must provide a</Txt>
								<Txt frameNbr="601">command and control framework and processes that enable seamless and timely information sharing among</Txt>
								<Txt frameNbr="760">information system users, applications, and platforms. The DoD's goal of NCOW also requires a collaborative group</Txt>
								<Txt frameNbr="956">of organizations to be responsible for operating and defending the DoDIN. This group is called the NetOps</Txt>
								<Txt frameNbr="1120">community of interest, or COI. The key to the successful operation and security of the DoDIN is the collaborative</Txt>
								<Txt frameNbr="1342">tactics, techniques, and procedures that will enable centralized control and decentralized execution of NetOps.</Txt>
							</ShowText>
						</Popup>
						<Popup>
							<Title>What is NetOps?</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv202_06_03</Filename>
							<PageNbr>6</PageNbr>
							<Sec508TriggerName>Command and Control Framework and Relationships</Sec508TriggerName>
							<Sec508Data Page="disacndv202_06_03"></Sec508Data>
							<ShowText Page="disacndv202_06_03">
								<Txt frameNbr="6">The Commander, US Strategic Command, or USSTRATCOM, has the ultimate authority and responsibility for NetOps.</Txt>
								<Txt frameNbr="223">As directed by USSTRATCOM, the NetOps community of interest that operates and defends the DoDIN consists of</Txt>
								<Txt frameNbr="395">both DoD and non-DoD organizations. All of these entities in the COI must interact to accomplish NetOps.</Txt>
								<Txt frameNbr="620">USSTRATCOM has delegated operational control of NetOps to the US Cyber Command, or USCYBERCOM.</Txt>
							</ShowText>
						</Popup>
						<Popup>
							<Title>What is NetOps?</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv202_06_04</Filename>
							<PageNbr>6</PageNbr>
							<Sec508TriggerName>Collaborative Command and Control Process</Sec508TriggerName>
							<Controls>
								<RollOverButtonControl name="rollover1">
									<RMAText>Networking, 
Bullet	Connects decision-makers across echelons and functions
Bullet	Is enabled by a communications and data infrastructure 
Sub-Bullet	Employs a robust set of standards 
Sub-Bullet	Facilitates the exchange of information and interaction 
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover2">
									<RMAText>Interacting,
Bullet	Is the social part of networking, the heart of collaboration, and is facilitated by cohesive teams 
Bullet	Uses collaborative information tools 
Bullet	Exchanges information across a network that spans echelons and functions
Bullet	Supports the development of trust and the art of command
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover3">
									<RMAText>Sharing Information, 
Bullet	Makes information available and accessible to commanders
Bullet	Assures that all commanders are operating from the same baseline of information 
Bullet	Improves the quality of awareness and understanding						
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover4">
									<RMAText>Sharing Awareness,
Bullet	Is sharing an initial understanding of the operational environment 
Sub-Bullet	Current status of the DoDIN 
Sub-Bullet	Current operational impact assessment 
Bullet	Improves commanders' understanding with shared baseline of information 
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover5">
									<RMAText>Sharing Understanding,
Bullet	Is a deeper understanding of the DoDIN framed by the experience and intuition of commanders across echelons and functions
Bullet	Allows subordinate decision-makers to understand how higher echelons view the overall situation 
Bullet	Allows the subordinates to make better decisions and to better coordinate actions with others 
Bullet	Allows subordinate commanders to undertake initiative in line with the higher echelons' view of the situation 
Bullet	Allows NetOps command and control to be: 
Sub-Bullet	More decentralized 
Sub-Bullet	More responsive to small but important changes in the operational environment 
Bullet	Improves the overall speed and quality of decisions
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover6">
									<RMAText>Deciding,
Bullet	Means decisions are made in a collaborative environment by multiple decision-makers working together
Bullet	Does not mean decision by committee
Bullet	Does not require a consensus
Bullet	Gives commanders an understanding of the decisions being made by others in pursuit of the mission goals
Bullet	Allows commanders to use forces effectively 
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover7">
									<RMAText>Synchronizing,
Bullet	Arranges NetOps actions in time, space, and purpose to produce maximum DoDIN effectiveness
Bullet	Brings the actions of the NetOps COI as a whole in line with the commander's intent to accomplish the NetOps objectives
Bullet	Allows the commander to coordinate his or her timing and actions to make maximum use of the limited resources available 
Bullet	Helps commanders build and maintain unity of effort across operations that have a diverse set of actors with a range of capabilities 
</RMAText>
								</RollOverButtonControl>
							</Controls>
							<Sec508Data Page="disacndv202_06_04"></Sec508Data>
							<ShowText Page="disacndv202_06_04">
								<Txt frameNbr="6">In the context of NetOps command and control, decisions and actions are coordinated through</Txt>
								<Txt frameNbr="163">collaboration across multiple entities in the COI, as well as through traditional, vertical command and control within</Txt>
								<Txt frameNbr="328">each organization. The NetOps collaborative command and control process allows commanders to share their</Txt>
								<Txt frameNbr="498">observations, understanding, decisions, and actions with other commanders. Collaboration allows</Txt>
								<Txt frameNbr="665">commanders to achieve a better DoDIN situational awareness. It also allows a deeper understanding of the</Txt>
								<Txt frameNbr="824">DoDIN environment and how individual commanders' decisions will affect that environment. In addition,</Txt>
								<Txt frameNbr="993">collaboration enables commanders to coordinate limited resources with others to achieve mission success. Roll</Txt>
								<Txt frameNbr="1170">over each term in the collaborative NetOps command and control process to learn how it is defined in this context.</Txt>
							</ShowText>
						</Popup>
					</Popups>
					<Sec508Data Page="disacndv202_06"></Sec508Data>
					<ShowText Page="disacndv202_06">
						<Txt frameNbr="8">To proactively protect and defend the DoDIN, security must be integrated into the way the DoDIN are operated and</Txt>
						<Txt frameNbr="177">managed. NetOps is the operational construct that DoD uses to both operate and defend the DoDIN. The goal of</Txt>
						<Txt frameNbr="388">NetOps is to provide assured and timely net-centric services across strategic, operational and tactical boundaries in</Txt>
						<Txt frameNbr="589">support of DoD's full spectrum of war fighting, intelligence and business missions. NetOps enables warfighters to make the</Txt>
						<Txt frameNbr="786">best decisions possible. This warfighter support can only be achieved through NetOps service assurance goals which</Txt>
						<Txt frameNbr="965">include systems and networks that are available when needed, information that is accurate, adequately protected, and free</Txt>
						<Txt frameNbr="1148">from corruption, and information that is delivered upon request. There are four key attributes of NetOps: essential tasks,</Txt>
						<Txt frameNbr="1358">command and control operating principles, command and control framework and relationships, and a</Txt>
						<Txt frameNbr="1530">collaborative command and control process. Select each key NetOps attribute to learn what it entails.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>What is the Sensor Grid?</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv202_07</Filename>
					<PageNbr>7</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>UDOP, 
User Developed Operational Picture
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<Sec508Data Page="disacndv202_07"></Sec508Data>
					<ShowText Page="disacndv202_07">
						<Txt frameNbr="9">An important function of NetOps is to ensure that the DoDIN operates as a sensor grid that provides vital information on</Txt>
						<Txt frameNbr="187">military and business operations and on the health and security of the DoD network. The NetOps sensor</Txt>
						<Txt frameNbr="385">grid allows vital information from across the DoDIN to flow up and down the chain of command and across the NetOps COI.</Txt>
						<Txt frameNbr="577">The sensor grid enables commanders to create a user-developed operational picture, or UDOP. The UDOP is like a</Txt>
						<Txt frameNbr="748">dashboard. It shows what is occurring in the operational environment at any given time to facilitate decision-making in</Txt>
						<Txt frameNbr="925">DoD warfighter and business missions. The sensor grid also creates a picture of the health and security of the DoDIN with a</Txt>
						<Txt frameNbr="1125">coordinated group of decentralized intrusion detection systems, or IDSs, as well as intrusion protection</Txt>
						<Txt frameNbr="1295">systems, or IPSs. IDSs detect anomalies in the DoD information systems and networks. IPSs provide</Txt>
						<Txt frameNbr="1516">anomaly detection and prevention. Anomalies can indicate a cyber attack or a problem with the network.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Knowledge Check</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv202_08</Filename>
					<PageNbr>8</PageNbr>
					<PageType>Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>425</DfltFBWidth>
					<Instructions>Select the best response; then select Submit.</Instructions>
					<Questions>
						<Question qType="MC">
							<Txt><![CDATA[Which of the following statements is <b>NOT</b> an accurate description of NetOps?]]></Txt>
							<Response>
								<Txt>There are three essential tasks that are part of NetOps: DoDIN Enterprise Management, DoDIN Network Defense, and information dissemination management/content staging.</Txt>
							</Response>
							<Response>
								<Txt>NetOps uses a collaborative command and control process.</Txt>
							</Response>
							<Response valid="true">
								<Txt>NetOps provides the specific cyberspace technology that must be used on information systems connected to the DoDIN. </Txt>
							</Response>
							<Response>
								<Txt>NetOps is the operational construct that operates and protects the DoDIN.</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. NetOps does not provide the specific cyberspace technology that must be used on information systems connected to the DoDIN. NetOps is the operational construct to operate and defend the DoDIN. The key attributes of NetOps include three essential tasks, command and control operating principles, a command and control framework, and a collaborative command and control process. </DfltCorrect>
								<DfltIncorrect>Incorrect. NetOps does not provide the specific cyberspace technology that must be used on information systems connected to the DoDIN. NetOps is the operational construct to operate and defend the DoDIN. The key attributes of NetOps include three essential tasks, command and control operating principles, a command and control framework, and a collaborative command and control process. </DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<Sec508Data Page="disacndv202_08"></Sec508Data>
					<ShowText Page="disacndv202_08">
						<Txt frameNbr="1">Now check your understanding of NetOps.</Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>Cybersecurity and Cyberspace Defense</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>What is Cybersecurity?</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv202_09</Filename>
					<PageNbr>9</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>Cybersecurity, 
Cybersecurity is the prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wireless communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.
National Security Presidential Directive-54/Homeland Security Presidential Directive-23, "Cybersecurity Policy," January 8, 2008
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover2">
							<RMAText>Availability,
CNSS Instruction No. 4009: The property of being accessible and useable upon demand by an authorized entity. 
NIST SP 800-53: Ensuring timely and reliable access to and use of information. 
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover3">
							<RMAText>Integrity,
CNSS Instruction No. 4009: The property whereby an entity has not been modified in an unauthorized manner. 
NIST SP 800-53: Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. 
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover4">
							<RMAText>Authentication,
CNSS Instruction No. 4009: The process of verifying the identity or other attributes claimed by or assumed of an entity (user, process, or device), or to verify the source and integrity of data. 
NIST SP 800-53: Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system. 
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover5">
							<RMAText>Confidentiality,
CNSS Instruction No. 4009: The property that information is not disclosed to system entities (users, processes, devices) unless they have been authorized to access the information. 
NIST SP 800.53: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. 
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover6">
							<RMAText>Nonrepudiation,
CNSS Instruction No. 4009: Assurance that the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the data
NIST SP 800-53: Protection against an individual falsely denying having performed a particular action. Provides the capability to determine whether a given individual took a particular action such as creating information, sending a message, approving information, and receiving a message. 
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<Sec508Data Page="disacndv202_09"></Sec508Data>
					<ShowText Page="disacndv202_09">
						<Txt frameNbr="7">Because protecting the DoDIN is both important and challenging, active measures are necessary. The successful</Txt>
						<Txt frameNbr="169">implementation of these measures is the goal of cybersecurity. Cybersecurity is defined as the prevention of</Txt>
						<Txt frameNbr="355">damage to, protection of, and restoration of computers, electronic communications systems, electronic</Txt>
						<Txt frameNbr="526">communications services, wireless communication, and electronic communication, including information </Txt>
						<Txt frameNbr="695">contained therein to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation. </Txt>
						<Txt frameNbr="931">Availability means that information is accessible when it is needed. Integrity protects information from being </Txt>
						<Txt frameNbr="1109">modified or destroyed. Authentication establishes the validity of a transmission, message, or the sender, and </Txt>
						<Txt frameNbr="1299">also verifies an individual's authorization to receive specific categories of information. Confidentiality safeguards</Txt>
						<Txt frameNbr="1485"> information from individuals without the proper clearance, access level, and need to know. Nonrepudiation provides</Txt>
						<Txt frameNbr="1684">assurance that the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender's </Txt>
						<Txt frameNbr="1874">identity, so later neither can deny having processed the data. All authorized DoD users are responsible for </Txt>
						<Txt frameNbr="2052">contributing to the security of all DoD information systems. It is essential that DoD users abide by the </Txt>
						<Txt frameNbr="2227">principles ofcybersecurity in their daily work routine to protect themselves and the DoD information systems to</Txt>
						<Txt frameNbr="2377">which they have access.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>What is Cyberspace Defense?</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv202_10</Filename>
					<PageNbr>10</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>Unauthorized activity,
May include the disruption, denial of service, degradation, destruction, or exploitation of computer networks, information systems, or theft of the information they contain
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<Sec508Data Page="disacndv202_10"></Sec508Data>
					<ShowText Page="disacndv202_10">
						<Txt frameNbr="7">Cyberspace defense focuses on actions that are taken to protect, monitor, analyze, detect and respond to unauthorized</Txt>
						<Txt frameNbr="201">activity in DoD information systems and networks. Unauthorized activity may include service problems for</Txt>
						<Txt frameNbr="390">computer networks and information systems such as disruption, denial of service, degradation, destruction, or</Txt>
						<Txt frameNbr="579">exploitation, including theft of the information the networks or systems may contain. If both cybersecurity and cyberspace</Txt>
						<Txt frameNbr="775">defense protect and defend information and information systems, how are they different? Cybersecurity</Txt>
						<Txt frameNbr="945">includes policies, standards, technologies, and practices that apply across the IT life cycle. Cyberspace defense is a</Txt>
						<Txt frameNbr="1161">subset of cybersecurity that refers to the specific cybersecurity actions taken to protect and defend DoD</Txt>
						<Txt frameNbr="1341">operational information systems and networks from attack, to mitigate the effects on DoD information systems and</Txt>
						<Txt frameNbr="1498">networks if attacks do occur, and to recover from these attacks by restoring full system and network operations.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Knowledge Check</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv202_11</Filename>
					<PageNbr>11</PageNbr>
					<PageType>Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>425</DfltFBWidth>
					<Instructions>For each statement, select whether it is true or false; then select Submit.</Instructions>
					<Questions>
						<Question qType="MC">
							<Txt>Cybersecurity and cyberspace defense are both activities that protect and defend DoD information systems.</Txt>
							<Response valid="true">
								<Txt>True</Txt>
							</Response>
							<Response>
								<Txt>False</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. This is true. Cybersecurity and cyberspace defense are both activities that protect and defend DoD information systems. Cybersecurity protects information across the system life cycle, and cyberspace defense focuses on activities that protect operational systems.</DfltCorrect>
								<DfltIncorrect>Incorrect. This is true. Cybersecurity and cyberspace defense are both activities that protect and defend DoD information systems. Cybersecurity protects information across the system life cycle, and cyberspace defense focuses on activities that protect operational systems.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Cyberspace defense refers to activities that protect operational information systems and networks.</Txt>
							<Response valid="true">
								<Txt>True</Txt>
							</Response>
							<Response>
								<Txt>False</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. This is true. Cyberspace defense activities apply to systems that are in operation. Cybersecurity applies to the entire system life cycle.</DfltCorrect>
								<DfltIncorrect>Incorrect. This is true. Cyberspace defense activities apply to systems that are in operation. Cybersecurity applies to the entire system life cycle.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Cybersecurity can be considered a sub-set of cyberspace defense activities.</Txt>
							<Response>
								<Txt>True</Txt>
							</Response>
							<Response valid="true">
								<Txt>False</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. This is false. Cybersecurity is not a sub-set of cyberspace defense. Cyberspace defense is a sub-set of cybersecurity.</DfltCorrect>
								<DfltIncorrect>Incorrect. This is false. Cybersecurity is not a sub-set of cyberspace defense. Cyberspace defense is a sub-set of cybersecurity.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Cybersecurity includes policies, standards, technologies, and practices across the system life cycle.</Txt>
							<Response valid="true">
								<Txt>True</Txt>
							</Response>
							<Response>
								<Txt>False</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. This is true. Cybersecurity includes policies, standards, technologies, and practices across the system life cycle.</DfltCorrect>
								<DfltIncorrect>Incorrect. This is true. Cybersecurity includes policies, standards, technologies, and practices across the system life cycle.</DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<Sec508Data Page="disacndv202_11"></Sec508Data>
					<ShowText Page="disacndv202_11">
						<Txt frameNbr="1">Now check your knowledge.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Cybersecurity Services</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv202_12</Filename>
					<PageNbr>12</PageNbr>
					<Sec508Data Page="disacndv202_12"></Sec508Data>
					<ShowText Page="disacndv202_12">
						<Txt frameNbr="7">A wide spectrum of cyberspace defense activities is necessary to protect and defend the DoDIN. To accomplish these</Txt>
						<Txt frameNbr="197">cyberspace defense activities, DoD has designated specific services. These cybersecurity services are intended to protect</Txt>
						<Txt frameNbr="400">the network from adverse events, detect adverse events that do occur, respond to those adverse events, and then</Txt>
						<Txt frameNbr="585">sustain all of the protect, detect, and response services throughout their lifecycles. You will learn about each of these</Txt>
						<Txt frameNbr="763">services in more detail later in this course.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>How are Cyberspace Defense and NetOps Related?</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv202_13</Filename>
					<PageNbr>13</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>DoDIN, 
Department of Defense Information Networks
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover2">
							<RMAText>IDM/CS, 
Information Dissemination Management/Content Staging
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<Sec508Data Page="disacndv202_13"></Sec508Data>
					<ShowText Page="disacndv202_13">
						<Txt frameNbr="5">Cyberspace defense is a major component of DoDIN Network Defense, which is one of the three essential tasks of NetOps.</Txt>
						<Txt frameNbr="221">Without adequate computer network defense to protect and defend the DoDIN, the DoDIN would not be secure, and</Txt>
						<Txt frameNbr="379">decision-makers might not have vital information when they need it. In today's environment, inadequate DoDIN protection</Txt>
						<Txt frameNbr="547">and defense could mean severe damage to DoD networks and information systems, accompanied by loss</Txt>
						<Txt frameNbr="715">of life, not only to our servicemen and women, but also to civilians. Cyberspace defense is fundamental to</Txt>
						<Txt frameNbr="895">DoD's strategy of net-centric operations and warfare, which helps to ensure DoD mission success, including national security.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Knowledge Check</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv202_14</Filename>
					<PageNbr>14</PageNbr>
					<PageType>Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>425</DfltFBWidth>
					<Instructions>Select True or False for each statement; then select Submit.</Instructions>
					<Questions>
						<Question qType="MC">
							<Txt>Cyberspace defense is part of the DoDIN Network Defense component of NetOps.</Txt>
							<Response valid="true">
								<Txt>True</Txt>
							</Response>
							<Response>
								<Txt>False</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Cyberspace defense is part of the DoDIN Network Defense component of NetOps.</DfltCorrect>
								<DfltIncorrect>Incorrect. Cyberspace defense is part of the DoDIN Network Defense component of NetOps.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>The four principal cybersecurity services are protection; monitoring, analysis, and detection; response; and sustainment.</Txt>
							<Response valid="true">
								<Txt>True</Txt>
							</Response>
							<Response>
								<Txt>False</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. The four principal cybersecurity services are protection; monitoring, analysis, and detection; response; and sustainment.</DfltCorrect>
								<DfltIncorrect>Incorrect. The four principal cybersecurity services are protection; monitoring, analysis, and detection; response; and sustainment.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Cybersecurity protection services include responding to security incidents.</Txt>
							<Response>
								<Txt>True</Txt>
							</Response>
							<Response valid="true">
								<Txt>False</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Responding to security incidents is a cybersecurity response service, not a protection service.</DfltCorrect>
								<DfltIncorrect>Incorrect. Responding to security incidents is a cybersecurity response service, not a protection service.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Both cyberspace defense and NetOps defend the DoDIN against attacks.</Txt>
							<Response valid="true">
								<Txt>True</Txt>
							</Response>
							<Response>
								<Txt>False</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Both cyberspace defense and NetOps defend the DoDIN against attacks.</DfltCorrect>
								<DfltIncorrect>Incorrect. Both cyberspace defense and NetOps defend the DoDIN against attacks.</DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<Sec508Data Page="disacndv202_14"></Sec508Data>
					<ShowText Page="disacndv202_14">
						<Txt frameNbr="1">Now try this.</Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>Conclusion</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>Summary and Conclusion</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv202_15</Filename>
					<PageNbr>15</PageNbr>
					<Sec508Data Page="disacndv202_15"></Sec508Data>
					<ShowText Page="disacndv202_15">
						<Txt frameNbr="6">Congratulations! You have completed the Cyberspace Defense Overview lesson. You should now be able to identify</Txt>
						<Txt frameNbr="159">what the DoDIN are, what NetOps is, and the fundamental relationship between the DoDIN and NetOps. You should be</Txt>
						<Txt frameNbr="359">define cybersecurity and cyberspace defense and identify the unique role that cyberspace</Txt>
						<Txt frameNbr="511">defense has within cybersecurity.</Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
	</Topics>
</Module>