<?xml version="1.0"?>
<Module projectID="1386" moduleID="1728" filePath="disa/ia/cw/disa_cnd_v2_fy13/dev/M01_L03/data.xml" showTextDisplayMode="captionsAndHTML">
	<CourseTitle>Cyberspace Defense (CD) Course</CourseTitle>
	<AU>M01_L03</AU>
	<Title>Cybersecurity Service Providers</Title>
	<LinkSet>links</LinkSet>
	<DefaultControlText name="Done" value="Submit"></DefaultControlText>
	<DefaultControlText name="NextFeedback" value="Next Feedback"></DefaultControlText>
	<DefaultControlText name="PreviousFeedback" value="Previous Feedback"></DefaultControlText>
	<DefaultControlText name="CloseFeedback" value="Close Feedback"></DefaultControlText>
	<DefaultControlText name="TryAgain" value="Try Again"></DefaultControlText>
	<DefaultControlText name="button_print" value="Print Certificate"></DefaultControlText>
	<NavBtns order="referenceObj,skipTopNavBtn,helpBtn,exitBtn,[PAGE],doneBtn,prevFeedbackBtn,nextFeedbackBtn,skipBtmNavBtn,courseMapBtn,resourcesBtn,glossaryBtn,transcriptBtn,turnAudioDescriptionsOffBtn,turnAudioDescriptionsOnBtn,hideCCBtn,showCCBtn,replayBtn,skipReverseBtn,skipForwardBtn,pauseBtn,resumeBtn,previousPgBtn,pageLocation,nextPgBtn,showtext">
		<NavBtn>
			<ControlType>ReferenceOnlyObject</ControlType>
			<ID>referenceObj</ID>
			<RMAText>Testing This Reference Object</RMAText>
		</NavBtn>
		<NavBtn>
			<ControlType>ReadOnlyText</ControlType>
			<ID>pageLocation</ID>
			<RMAText>Page x of y</RMAText>
		</NavBtn>
		<NavBtn>
			<ID>skipTopNavBtn</ID>
			<Label>SKIP TO CONTENT</Label>
			<RMAText>SKIP TO CONTENT</RMAText>
			<ClickEventName>SkipTopNavButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>skipBtmNavBtn</ID>
			<Label>SKIP NAVIGATION</Label>
			<RMAText>SKIP NAVIGATION</RMAText>
			<ClickEventName>SkipBtmNavButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>helpBtn</ID>
			<Label>Help</Label>
			<RMAText>Help. Select this button to open the help panel.</RMAText>
			<ClickEventName>HelpButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>exitBtn</ID>
			<Label>Exit</Label>
			<RMAText>Exit. Select this button to exit the course.</RMAText>
			<ClickEventName>ExitButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>courseMapBtn</ID>
			<Label>Course Map</Label>
			<RMAText>Course map. Select this button to access the course map.</RMAText>
			<ClickEventName>CourseMapButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>glossaryBtn</ID>
			<Label>Glossary</Label>
			<RMAText>Glossary. Select this button open the glossary.</RMAText>
			<ClickEventName>GlossaryButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resourcesBtn</ID>
			<Label>Resources</Label>
			<RMAText>Resources. Select this button to access the resources for the course.</RMAText>
			<ClickEventName>ResourcesButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>hideCCBtn</ID>
			<Label>Hide Captions</Label>
			<RMAText>Hide Captions. Select this button to hide the caption text.</RMAText>
			<ClickEventName>HideCCButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>showCCBtn</ID>
			<Label>Show Captions</Label>
			<RMAText>Show Captions. Select this button to show the caption text.</RMAText>
			<ClickEventName>ShowCCButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>turnAudioDescriptionsOffBtn</ID>
			<Label>Turn Audio Descriptions Off</Label>
			<RMAText>Turn Audio Descriptions Off. Select this button to turn off audio descriptions.</RMAText>
			<ClickEventName>AudioDescriptionsOffButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>turnAudioDescriptionsOnBtn</ID>
			<Label>Turn Audio Descriptions On</Label>
			<RMAText>Turn Audio Descriptions On. Select this button to turn on audio descriptions.</RMAText>
			<ClickEventName>AudioDescriptionsOnButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>skipReverseBtn</ID>
			<Label>Skip Backward</Label>
			<RMAText>Skip Backward. Select this button to skip a few frames back.</RMAText>
			<ClickEventName>SkipReverseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>skipForwardBtn</ID>
			<Label>Skip Forward</Label>
			<RMAText>Skip Forward. Select this button to skip a few frames ahead.</RMAText>
			<ClickEventName>SkipForwardButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>replayBtn</ID>
			<Label>Replay</Label>
			<RMAText>Replay. Select this button to replay the current screen.</RMAText>
			<ClickEventName>ReplayButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>transcriptBtn</ID>
			<Label>Transcript</Label>
			<RMAText>Transcript. Select this button for a transcript of the current page.</RMAText>
			<ClickEventName>ShowTextButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>pauseBtn</ID>
			<Label>Pause</Label>
			<RMAText>Pause. Select this button to pause the course.</RMAText>
			<ClickEventName>PauseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resumeBtn</ID>
			<Label>Resume</Label>
			<RMAText>Resume. Select this button to resume the course.</RMAText>
			<ClickEventName>ResumeButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn prevBtn="true" toggleOffSilent="false">
			<ID>previousPgBtn</ID>
			<Label>Back</Label>
			<RMAText>Back. Select this button to go to the previous screen.</RMAText>
			<ClickEventName>PreviousButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn h="19.1" nextBtn="true" toggleOffSilent="false" w="67.6">
			<ID>nextPgBtn</ID>
			<Label>Next</Label>
			<RMAText>Next. Select this button to go to the next screen.</RMAText>
			<ClickEventName>NextButtonClicked</ClickEventName>
		</NavBtn>
	</NavBtns>
	<Topics>
		<Topic>
			<Title>Introduction</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>Objectives and Topics</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv203_01</Filename>
					<PageNbr>1</PageNbr>
					<Sec508Data Page="disacndv203_01"></Sec508Data>
					<ShowText Page="disacndv203_01">
						<Txt frameNbr="5">Welcome to the Cybersecurity Service Providers lesson. When you have completed this lesson, you will be able to identify the</Txt>
						<Txt frameNbr="175">key requirements for cybersecurity services that Department of Defense, or DoD, Components must meet to</Txt>
						<Txt frameNbr="352">protect the DoD Information Networks, or DoDIN, and what Cybersecurity Service Providers, or CSPs, are. You</Txt>
						<Txt frameNbr="544">will also be able to identify which organizations provide cybersecurity services to the DoD; to each DoD Component;</Txt>
						<Txt frameNbr="738">and to the local control centers within each DoD Component. Finally, you will be able to identify which requirements</Txt>
						<Txt frameNbr="922">CSPs must meet to provide cybersecurity services to DoD Components. There are four topics in this lesson. After you</Txt>
						<Txt frameNbr="1148">have completed the Introduction, you will learn about the requirements that DoD Components must meet to</Txt>
						<Txt frameNbr="1287">ensure that their information systems are protected and defended and who is qualified to provide cybersecurity</Txt>
						<Txt frameNbr="1433">services to DoD Components. Finally, you will learn about the hierarchy of cybersecurity services and providers, as well</Txt>
						<Txt frameNbr="1641">as the specific requirements providers must meet to be a CSP.</Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>CSP Overview</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>DoD Cybersecurity Service Requirements</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv203_02</Filename>
					<PageNbr>2</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>CSP, 
Cybersecurity Service Provider
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<Sec508Data Page="disacndv203_02"></Sec508Data>
					<ShowText Page="disacndv203_02">
						<Txt frameNbr="8">To protect and defend DoD information systems and networks, each DoD combatant command, Service, agency, and</Txt>
						<Txt frameNbr="201">field activity must meet certain requirements regarding cybersecurity. All systems that collect, generate process,</Txt>
						<Txt frameNbr="400">store, display, transmit or receive DoD information must be aligned to a certified cybersecurity service provider.</Txt>
						<Txt frameNbr="608">Cybersecurity services for DoD Components must be performed by a certified CSP. It is the DoD</Txt>
						<Txt frameNbr="814">Component's responsibility to ensure that all of its information systems and networks are protected with the</Txt>
						<Txt frameNbr="968">required cybersecurity services. The DoD Component must also ensure that their CSPs are certified to perform those services.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Who are CSPs?</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv203_03</Filename>
					<PageNbr>3</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>ISSM, 
Information Systems Security Manager is the individual responsible for the information assurance program, organization, system or enclave. ISSM was formerly referred to as the IAM (Information Assurance Manager). CNSS Instruction No. 4009
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<Sec508Data Page="disacndv203_03"></Sec508Data>
					<ShowText Page="disacndv203_03">
						<Txt frameNbr="6">CSPs are those organizations that provide cybersecurity services which protect, monitor, analyze, detect, and respond to</Txt>
						<Txt frameNbr="223">unauthorized activity, as well as those that sustain those services. Not all organizations that offer information</Txt>
						<Txt frameNbr="404">technology, or IT, or cybersecurity type services can be considered cybersecurity service providers. For an</Txt>
						<Txt frameNbr="598">organization to be a DoD CSP, the organization must successfully complete the DoD cybersecurity certification and</Txt>
						<Txt frameNbr="811">accreditation process for CSPs. Cybersecurity Service Providers can be a DoD or Federal organization. If the CSP is a</Txt>
						<Txt frameNbr="1051">DoD organization, it can be internal to the DoD Component as long as the internal organization is certified and</Txt>
						<Txt frameNbr="1245">accredited. Some CSPs focus on various cybersecurity services, but not all CSPs perform all cybersecurity</Txt>
						<Txt frameNbr="1438">services. Since all information systems must be assigned a CSP, DoD Components may need to have relationships with</Txt>
						<Txt frameNbr="1648">more than one service provider to ensure that all information systems have a CSP for all required cybersecurity services.</Txt>
						<Txt frameNbr="1836">Although a CSP can be internal to the DoD Component, and internal cybersecurity professionals might be</Txt>
						<Txt frameNbr="2013">performing tasks related to cyberspace defense as part of their cybersecurity duties, those internal DoD cybersecurity</Txt>
						<Txt frameNbr="2209">professionals who are not part of a certified CSP organization may not be authorized to perform the functions required</Txt>
						<Txt frameNbr="2383">of CSPs. For example Information Systems Security Manager, or ISSM, for a system who is not part of a CSP</Txt>
						<Txt frameNbr="2606">organization is not considered authorized to perform any cyberspace defense functions. Currently, there are 23 certified</Txt>
						<Txt frameNbr="2796">and accredited DoD CSPs and 2 Federal CSPs equivalents.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Knowledge Check</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv203_04</Filename>
					<PageNbr>4</PageNbr>
					<PageType>Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>425</DfltFBWidth>
					<Instructions>Select True or False for each statement; then select Submit.</Instructions>
					<Questions>
						<Question qType="MC">
							<Txt>DoD CSPs must be certified and accredited to perform cybersecurity services.</Txt>
							<Response valid="true">
								<Txt>True</Txt>
							</Response>
							<Response>
								<Txt>False</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. DoD CSPs must be certified and accredited to perform cybersecurity services.</DfltCorrect>
								<DfltIncorrect>Incorrect. DoD CSPs must be certified and accredited to perform cybersecurity services.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Internal DoD cybersecurity professionals who are not part of a certified CSP organization are authorized to perform the functions required of CSPs.</Txt>
							<Response>
								<Txt>True</Txt>
							</Response>
							<Response valid="true">
								<Txt>False</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Internal DoD cybersecurity professionals who are not part of a certified CSP organization are not qualified or authorized to perform the functions required of CSPs.</DfltCorrect>
								<DfltIncorrect>Incorrect. Internal DoD cybersecurity professionals who are not part of a certified CSP organization are not qualified or authorized to perform the functions required of CSPs.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>CSPs for the DoD must be a DoD organization.</Txt>
							<Response>
								<Txt>True</Txt>
							</Response>
							<Response valid="true">
								<Txt>False</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. CSPs for the DoD can be DoD or Federal organization.</DfltCorrect>
								<DfltIncorrect>Incorrect. CSPs for the DoD can be DoD or Federal organization.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>DoD Components must have all cybersecurity services provided by CSPs.</Txt>
							<Response valid="true">
								<Txt>True</Txt>
							</Response>
							<Response>
								<Txt>False</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. DoD Components must have all cybersecurity services provided by CSPs.</DfltCorrect>
								<DfltIncorrect>Incorrect. DoD Components must have all cybersecurity services provided by CSPs.</DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<Sec508Data Page="disacndv203_04"></Sec508Data>
					<ShowText Page="disacndv203_04">
						<Txt frameNbr="5">Now check your knowledge.</Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>CSP Structure and Requirements</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>CSP Structure</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv203_05</Filename>
					<PageNbr>5</PageNbr>
					<Popups>
						<Popup>
							<Title>CSP Structure</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv203_05_01</Filename>
							<PageNbr>5</PageNbr>
							<Sec508TriggerName>GENSER</Sec508TriggerName>
							<Controls>
								<RollOverButtonControl name="rollover1">
									<RMAText>NIPRNET, 
Nonsecure Internet Protocol Router Network
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover2">
									<RMAText>SIPRNET, 
SECRET Internet Protocol Router Network
</RMAText>
								</RollOverButtonControl>
							</Controls>
							<Sec508Data Page="disacndv203_05_01"></Sec508Data>
							<ShowText Page="disacndv203_05_01">
								<Txt frameNbr="5">A GENSER DoD information system is one not specifically designated as a special enclave that has additional security</Txt>
								<Txt frameNbr="190">requirements. Information systems that are part of the NIPRNET or SIPRNET are considered GENSER.</Txt>
							</ShowText>
						</Popup>
						<Popup>
							<Title>CSP Structure</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv203_05_02</Filename>
							<PageNbr>5</PageNbr>
							<Sec508TriggerName>Special Enclave</Sec508TriggerName>
							<Controls>
								<RollOverButtonControl name="rollover1">
									<RMAText>SAPs, 
Special Access Programs
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover2">
									<RMAText>NSANet, 
National Security Agency Network
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover3">
									<RMAText>JWICS, 
Joint Worldwide Intelligence Communications System
</RMAText>
								</RollOverButtonControl>
							</Controls>
							<Sec508Data Page="disacndv203_05_02"></Sec508Data>
							<ShowText Page="disacndv203_05_02">
								<Txt frameNbr="5">A special enclave DoD information system is one that has special security requirements which are more</Txt>
								<Txt frameNbr="166">stringent than the requirements for GENSER systems. For example, the systems used for special access programs, or</Txt>
								<Txt frameNbr="342">SAPs, or connected to National Security Agency Network, or NSANet, or the Joint Worldwide Intelligence Communications</Txt>
								<Txt frameNbr="560">System, or JWICS, are Special Enclave.</Txt>
							</ShowText>
						</Popup>
					</Popups>
					<Sec508Data Page="disacndv203_05"></Sec508Data>
					<ShowText Page="disacndv203_05">
						<Txt frameNbr="5">Cybersecurity services are provided to the DoD at three levels, or tiers. The first tier of service consists of the</Txt>
						<Txt frameNbr="212">cybersecurity services, operations, and policies that affect all DoD information systems and provide guidance</Txt>
						<Txt frameNbr="385">to the other two tiers of service. The second tier consists of the services, operations, and policies that are provided to</Txt>
						<Txt frameNbr="569">each DoD combatant command, Service, agency, or field activity. The second tier also provides guidance to the third</Txt>
						<Txt frameNbr="775">tier. The third tier consists of services and operations at the local control centers of each DoD Component, typically</Txt>
						<Txt frameNbr="981">located at each base, post, camp, or station. These three tiers of services make up a hierarchy of cybersecurity</Txt>
						<Txt frameNbr="1181">services and the organizations that provide those services. For the purposes of cyberspace defense, all information systems</Txt>
						<Txt frameNbr="1377">are classified as one of two system types: either General Services, or GENSER, or Special Enclave. On the</Txt>
						<Txt frameNbr="1592">following screens, you will learn about the different CSP responsibilities, including the responsibilities related to each</Txt>
						<Txt frameNbr="1744">system type. Select GENSER and Special Enclave to learn about each type of information system.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Tier 1 CSPs</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv203_06</Filename>
					<PageNbr>6</PageNbr>
					<Popups>
						<Popup>
							<Title>Tier 1 CSPs</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv203_06_02</Filename>
							<PageNbr>6</PageNbr>
							<Sec508TriggerName>National Security Incident Response Center (NSIRC)</Sec508TriggerName>
							<Sec508Data Page="disacndv203_06_02"></Sec508Data>
							<ShowText Page="disacndv203_06_02">
								<Txt frameNbr="5">The Tier 1 incident response center for the general DoD community is the National Security Incident Response</Txt>
								<Txt frameNbr="174">Center. The incident response centers are focused on cyberspace attack sensing and warning, or AS&W, activities.</Txt>
								<Txt frameNbr="390">The specific responsibilities of the incident response centers include: providing the overall focus and coordination of attack</Txt>
								<Txt frameNbr="587">sensing and warning activities; providing specialized AS&W analysis to detect Defense-wide and long-term trends and</Txt>
								<Txt frameNbr="793">patterns that may indicate an attack; providing direct AS&W support to USSTRATCOM; and providing AS&W support as</Txt>
								<Txt frameNbr="1021">required to the DoD Component-level cybersecurity service providers.</Txt>
							</ShowText>
						</Popup>
						<Popup>
							<Title>Tier 1 CSPs</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv203_06_01</Filename>
							<PageNbr>6</PageNbr>
							<Sec508TriggerName>USSTRATCOM General Services CSP/AA USCYBERCOM</Sec508TriggerName>
							<Sec508Data Page="disacndv203_06_01"></Sec508Data>
							<ShowText Page="disacndv203_06_01">
								<Txt frameNbr="6">USSTRATCOM has the lead responsibility for conducting Defense-wide and multi-component cyberspace defense</Txt>
								<Txt frameNbr="173">operations. USSTRATCOM has tasked USCYBERCOM with implementing those specific responsibilities. USSTRATCOM</Txt>
								<Txt frameNbr="388">delegated responsibilities include acting as the Accreditation Authority, or AA, for GENSER CSPs and</Txt>
								<Txt frameNbr="577">directing cyberspace defense activities across the DoD. USCYBERCOM is tasked with establishing the DoD</Txt>
								<Txt frameNbr="777">procedures for disseminating cyberspace defense-related advisories, alerts, and warnings; monitoring</Txt>
								<Txt frameNbr="954">compliance with information assurance vulnerability notifications; assisting DISA in developing and refining the</Txt>
								<Txt frameNbr="1138">certification and accreditation process for cybersecurity service providers; coordinating with the directors of the DIA and</Txt>
								<Txt frameNbr="1324">the National Security Agency, or NSA, to maintain awareness of and prevent conflicts between external assessments and</Txt>
								<Txt frameNbr="1514">operations associated with DoD information systems and networks; developing and requesting changes to the</Txt>
								<Txt frameNbr="1689">Standing Rules of Engagement for cyberspace defense; and using combatant command and tactical control of forces to</Txt>
								<Txt frameNbr="1874">execute operations to protect and defend DoD cyberspace or other national security interests from intentional, unauthorized</Txt>
								<Txt frameNbr="2083">cyberspace intrusions or attacks.</Txt>
							</ShowText>
						</Popup>
						<Popup>
							<Title>Tier 1 CSPs</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv203_06_04</Filename>
							<PageNbr>6</PageNbr>
							<Sec508TriggerName>Director National Intelligence (DNI) Special Enclave CSP/AA</Sec508TriggerName>
							<Sec508Data Page="disacndv203_06_04"></Sec508Data>
							<ShowText Page="disacndv203_06_04">
								<Txt frameNbr="5">The DNI has the lead responsibility for intelligence community information systems and networks. The</Txt>
								<Txt frameNbr="172">DNI's specific cyberspace defense responsibilities include: providing operational direction</Txt>
								<Txt frameNbr="330">to the DIA regarding cyberspace defense for intelligence community information systems and</Txt>
								<Txt frameNbr="472">networks; acting as the Accreditation Authority, or AA, for Special Enclave CSPs; and coordinating with</Txt>
								<Txt frameNbr="682">USSTRATCOM, USCYBERCOM, and the incident response center for the intelligence community.</Txt>
							</ShowText>
						</Popup>
						<Popup>
							<Title>Tier 1 CSPs</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv203_06_07</Filename>
							<PageNbr>6</PageNbr>
							<Sec508TriggerName>Intelligence Community Incident Response Center (ICIRC)</Sec508TriggerName>
							<Sec508Data Page="disacndv203_06_07"></Sec508Data>
							<ShowText Page="disacndv203_06_07">
								<Txt frameNbr="6">The Tier 1 incident response center for the intelligence community is the Intelligence Community Incident Response</Txt>
								<Txt frameNbr="183">Center. The incident response centers are focused on cyberspace attack sensing and warning, or AS&W, activities.</Txt>
								<Txt frameNbr="392">The specific responsibilities of the incident response centers include: providing the overall focus and coordination of attack</Txt>
								<Txt frameNbr="587">sensing and warning activities; providing specialized AS&W analysis to detect Defense-wide and long-term trends and</Txt>
								<Txt frameNbr="800">patterns that may indicate an attack; providing direct AS&W support to USSTRATCOM; and providing AS&W support as</Txt>
								<Txt frameNbr="1014">required to the DoD Component-level cybersecurity service providers.</Txt>
							</ShowText>
						</Popup>
						<Popup>
							<Title>Tier 1 CSPs</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv203_06_03</Filename>
							<PageNbr>6</PageNbr>
							<Sec508TriggerName>DCIO Law Enforcement & Counterintelligence Center</Sec508TriggerName>
							<Sec508Data Page="disacndv203_06_03"></Sec508Data>
							<ShowText Page="disacndv203_06_03">
								<Txt frameNbr="5">The DCIO Law Enforcement and Counterintelligence Center coordinates and facilitates law enforcement and</Txt>
								<Txt frameNbr="164">counterintelligence investigations and operations among DoD Components. The law enforcement and</Txt>
								<Txt frameNbr="323">counterintelligence center's specific responsibilities include: coordinating, facilitating, and</Txt>
								<Txt frameNbr="470">removing conflicts from law enforcement and counterintelligence cyberspace defense investigations and</Txt>
								<Txt frameNbr="615">operations among the DoD Components; implementing operational direction for law enforcement from the Defense</Txt>
								<Txt frameNbr="782">Criminal Investigative Office and responding to the information requirements from USSTRATCOM and the</Txt>
								<Txt frameNbr="918">Component-level CSPs; serving as primary interface with the National Infrastructure Protection Center, or NIPC;</Txt>
								<Txt frameNbr="1101">providing analytical services to support cyberspace defense investigations and operations; coordinating information</Txt>
								<Txt frameNbr="1300">sharing on law enforcement and counterintelligence issues; and supporting cyberspace defense</Txt>
								<Txt frameNbr="1458">planning and policy development.</Txt>
							</ShowText>
						</Popup>
						<Popup>
							<Title>Tier 1 CSPs</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv203_06_05</Filename>
							<PageNbr>6</PageNbr>
							<Sec508TriggerName>General Services CSP/CA (DISA)</Sec508TriggerName>
							<Controls>
								<RollOverButtonControl name="rollover1">
									<RMAText>AA, 
Accreditation Authority
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover2">
									<RMAText>CA, 
Certifying Authority
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover3">
									<RMAText>DISA, 
Defense Information Systems Agency
</RMAText>
								</RollOverButtonControl>
							</Controls>
							<Sec508Data Page="disacndv203_06_05"></Sec508Data>
							<ShowText Page="disacndv203_06_05">
								<Txt frameNbr="8">As the GENSER certifying authority, DISA ensures that the CSPs are qualified to adequately protect and defend</Txt>
								<Txt frameNbr="190">DoD information systems and networks. The responsibilities of the certifying authorities, or CAs, include: working together</Txt>
								<Txt frameNbr="406">to develop and refine the certification process for CSPs; acting as the certifying authorities for the types of</Txt>
								<Txt frameNbr="579">systems under their purview; and providing certifier recommendations to their respective Accreditation</Txt>
								<Txt frameNbr="723">Authorities to accredit CSPs. In addition, DISA is tasked with functioning as the systems integrator for Defense-wide</Txt>
								<Txt frameNbr="942">cyberspace defense related systems and managing the Information Assurance Vulnerability Management,</Txt>
								<Txt frameNbr="1091">or IAVM, Program.</Txt>
							</ShowText>
						</Popup>
						<Popup>
							<Title>Tier 1 CSPs</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv203_06_06</Filename>
							<PageNbr>6</PageNbr>
							<Sec508TriggerName>Special Enclave CSP/CA (DIA)</Sec508TriggerName>
							<Controls>
								<RollOverButtonControl name="rollover1">
									<RMAText>AA, 
Accreditation Authority
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover2">
									<RMAText>CA, 
Certifying Authority
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover3">
									<RMAText>PM, 
Program Manager
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover4">
									<RMAText>DIA, 
Director Intelligence Agency
</RMAText>
								</RollOverButtonControl>
							</Controls>
							<Sec508Data Page="disacndv203_06_06"></Sec508Data>
							<ShowText Page="disacndv203_06_06">
								<Txt frameNbr="7">As the certifying authority for special enclave systems, the DIA ensures that the CSPs are qualified to adequately protect</Txt>
								<Txt frameNbr="218">and defend DoD information systems and networks. The responsibilities of the certifying authorities, or CAs, include:</Txt>
								<Txt frameNbr="399">working together to develop and refine the certification process for CSPs; acting as the certifying authorities for the</Txt>
								<Txt frameNbr="587">types of systems under their purview; and providing certifier recommendations to their respective Accreditation</Txt>
								<Txt frameNbr="742">Authorities to accredit CSPs. The DIA is tasked with functioning as the Program Manager, or PM, for Defense-</Txt>
								<Txt frameNbr="962">wide cyberspace defense research and technology, or R&T; establishing and maintaining a network and</Txt>
								<Txt frameNbr="1142">procedures for the reporting of cybersecurity external assessment activities; and providing specialized attack</Txt>
								<Txt frameNbr="1309">sensing and warning, or AS&W, support to USSTRATCOM and the DoD Components.</Txt>
							</ShowText>
						</Popup>
					</Popups>
					<Sec508Data Page="disacndv203_06"></Sec508Data>
					<ShowText Page="disacndv203_06">
						<Txt frameNbr="5">The Tier 1 CSPs consist of the two CSP Accreditation Authorities: USSTRATCOM, who serves as the GENSER</Txt>
						<Txt frameNbr="216">CSP Accreditation Authority, and USSTRATCOM's sub-command, USCYBERCOM; and the Director of National</Txt>
						<Txt frameNbr="411">Intelligence, or DNI, who serves as the Special Enclave CSP Accreditation Authority. Tier 1 also includes two incident</Txt>
						<Txt frameNbr="635">response centers, one for general national security and one for the intelligence community special enclaves, or</Txt>
						<Txt frameNbr="805">SE; as well as the joint Defense Criminal Investigative Office, or DCIO, Law Enforcement and Counterintelligence,</Txt>
						<Txt frameNbr="1030">or LE/CI, Center. Finally, tier 1 includes two CSP certification authorities, or CAs: the Defense Information Systems</Txt>
						<Txt frameNbr="1270">Agency, or DISA, who serves as the GENSER CSP certification authority; and the Defense Intelligence Agency, or DIA who</Txt>
						<Txt frameNbr="1494">is the CSP certification authority for special enclaves. Select each Tier 1 service provider to learn more about its</Txt>
						<Txt frameNbr="1702">cybersecurity services and responsibilities.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Tier 2 CSPs</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv203_07</Filename>
					<PageNbr>7</PageNbr>
					<Sec508Data Page="disacndv203_07"></Sec508Data>
					<ShowText Page="disacndv203_07">
						<Txt frameNbr="5">Tier 2 service providers are regional computer emergency response teams, or RCERTs, and those organizations that</Txt>
						<Txt frameNbr="204">are formally certified and accredited to provide required cybersecurity services to Combatant Commands,</Txt>
						<Txt frameNbr="362">Services, agencies, and field activities.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Tier 3 CSPs</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv203_08</Filename>
					<PageNbr>8</PageNbr>
					<Sec508Data Page="disacndv203_08"></Sec508Data>
					<ShowText Page="disacndv203_08">
						<Txt frameNbr="5">Tier 3 local control centers are those entities that subscribe to and take direction from CSPs and implement the policies of</Txt>
						<Txt frameNbr="206">Tier 2 providers within each DoD Component.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>CSP Requirements</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv203_09</Filename>
					<PageNbr>9</PageNbr>
					<Popups>
						<Popup>
							<Title>CSP Requirements</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv203_09_01</Filename>
							<PageNbr>9</PageNbr>
							<Sec508TriggerName>CSP Organization - Certified and Accredited</Sec508TriggerName>
							<Sec508Data Page="disacndv203_09_01"></Sec508Data>
							<ShowText Page="disacndv203_09_01">
								<Txt frameNbr="5">The CSPs that provide services to DoD Components must be certified and accredited specifically for the cyberspace</Txt>
								<Txt frameNbr="193">defense types of systems they defend. A CSP can only provide services to the types of information systems for which</Txt>
								<Txt frameNbr="393">they are certified. For example, CSPs that are certified and accredited for GENSER systems may only provide</Txt>
								<Txt frameNbr="567">cybersecurity services to GENSER systems. They may not provide cybersecurity services for Special Enclave</Txt>
								<Txt frameNbr="739">systems. CSPs can be certified and accredited as both GENSER and Special Enclave providers. Although the</Txt>
								<Txt frameNbr="950">certification and accreditation process is the same for both types of systems, each certification and accreditation</Txt>
								<Txt frameNbr="1114">must occur separately and has a different certifying authority and accreditation authority. DISA and USSTRATCOM are</Txt>
								<Txt frameNbr="1330">responsible for GENSER certification and accreditation, and DIA and DNI are responsible for Special Enclave</Txt>
								<Txt frameNbr="1516">certification and accreditation. The CSP certification and accreditation, or C&A, process is a rigorous four-</Txt>
								<Txt frameNbr="1726">phased process which must recur, at a minimum, every three years. During the process, the CSP is evaluated</Txt>
								<Txt frameNbr="1925">against specific metrics. They either pass or fail each metric, and their performance results in a score that determines</Txt>
								<Txt frameNbr="2106">whether they are accredited, and the level to which they are accredited. Accreditation level 1 is the minimum acceptable</Txt>
								<Txt frameNbr="2286">performance, accreditation level 2 indicates commendable performance, and accreditation level 3 recognizes exemplary performance.</Txt>
							</ShowText>
						</Popup>
						<Popup>
							<Title>CSP Requirements</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv203_09_02</Filename>
							<PageNbr>9</PageNbr>
							<Controls>
								<RollOverButtonControl name="rollover1">
									<RMAText>IAVM, 
Information Assurance Vulnerability Management
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover2">
									<RMAText>AS&W, 
Attack Sensing and Warning
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover3">
									<RMAText>IAT, 
Information Assurance Technical
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover4">
									<RMAText>IAM, 
Information Assurance Management
</RMAText>
								</RollOverButtonControl>
							</Controls>
							<Sec508TriggerName>CSP Personnel - Trained and Certified</Sec508TriggerName>
							<Sec508Data Page="disacndv203_09_02"></Sec508Data>
							<ShowText Page="disacndv203_09_02">
								<Txt frameNbr="1188">To perform cybersecurity services for DoD information systems and networks, CSP personnel must specifically be</Txt>
								<Txt frameNbr="184">trained and certified to perform the required cybersecurity services. When DoD Components enter a</Txt>
								<Txt frameNbr="346">relationship with a certified CSP organization, their expectation is that the personnel working for that organization are</Txt>
								<Txt frameNbr="532">adequately trained and certified to protect their DoD information systems. DoD 8570.01-M, Information Assurance</Txt>
								<Txt frameNbr="775">Workforce Improvement Program, requires DoD cybersecurity professionals to be trained and certified in their</Txt>
								<Txt frameNbr="955">cybersecurity category and cybersecurity service provider professionals to be trained and certified in their cybersecurity</Txt>
								<Txt frameNbr="1131">category and specialty.</Txt>
							</ShowText>
						</Popup>
					</Popups>
					<Sec508Data Page="disacndv203_09"></Sec508Data>
					<ShowText Page="disacndv203_09">
						<Txt frameNbr="5">A CSP must meet certain requirements. Those providers that do not meet these requirements are not</Txt>
						<Txt frameNbr="152">acceptable as DoD CSPs. The CSP organization must be certified and accredited, and the CSP personnel that perform</Txt>
						<Txt frameNbr="373">cybersecurity services for DoD must be specifically trained and certified to adequately perform their cyberspace defense</Txt>
						<Txt frameNbr="575">responsibilities. Select each requirement to learn more about it.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Knowledge Check</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv203_10</Filename>
					<PageNbr>10</PageNbr>
					<PageType display="Sequential">Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>425</DfltFBWidth>
					<Instructions>Select the best response; then select Submit.</Instructions>
					<Questions>
						<Question qType="MC">
							<Txt>Component-wide cyberspace defense falls under which tier of the CSP hierarchy?</Txt>
							<Response>
								<Txt>A.	Tier 1</Txt>
							</Response>
							<Response valid="true">
								<Txt>B.	Tier 2</Txt>
							</Response>
							<Response>
								<Txt>C.	Tier 3</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Component-wide cyberspace defense falls under Tier 2 of the CSP hierarchy.</DfltCorrect>
								<DfltIncorrect>Incorrect. Component-wide cyberspace defense falls under Tier 2 of the CSP hierarchy.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Defense-wide cyberspace defense falls under which tier of the CSP hierarchy?</Txt>
							<Response valid="true">
								<Txt>A.	Tier 1</Txt>
							</Response>
							<Response>
								<Txt>B.	Tier 2</Txt>
							</Response>
							<Response>
								<Txt>C.	Tier 3</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Defense-wide cyberspace defense falls under Tier 1 of the CSP hierarchy.</DfltCorrect>
								<DfltIncorrect>Incorrect. Defense-wide cyberspace defense falls under Tier 1 of the CSP hierarchy.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Component Local Control Center cyberspace defense falls under which tier of the CSP hierarchy?</Txt>
							<Response>
								<Txt>A.	Tier 1</Txt>
							</Response>
							<Response>
								<Txt>B.	Tier 2</Txt>
							</Response>
							<Response valid="true">
								<Txt>C.	Tier 3</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Component Local Control Center cyberspace defense falls under Tier 3 of the CSP hierarchy.</DfltCorrect>
								<DfltIncorrect>Incorrect. Component Local Control Center cyberspace defense falls under Tier 3 of the CSP hierarchy.</DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<Sec508Data Page="disacndv203_10"></Sec508Data>
					<ShowText Page="disacndv203_10">
						<Txt frameNbr="1">Check your knowledge of the CSP hierarchy. </Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Knowledge Check</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv203_11</Filename>
					<PageNbr>11</PageNbr>
					<PageType display="Sequential">Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>425</DfltFBWidth>
					<Instructions>Select the best response; then select Submit.</Instructions>
					<Questions>
						<Question qType="MC">
							<Txt>A system connected to the NIPRNET is considered to be which type of system?</Txt>
							<Response valid="true">
								<Txt>A. GENSER</Txt>
							</Response>
							<Response>
								<Txt>B. Special Enclave </Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. A system connected to the NIPRNET is considered GENSER.</DfltCorrect>
								<DfltIncorrect>Incorrect. A system connected to the NIPRNET is considered GENSER.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>A system connected to the SIPRNET is considered to be which type of system?</Txt>
							<Response valid="true">
								<Txt>A. GENSER</Txt>
							</Response>
							<Response>
								<Txt>B. Special Enclave </Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. A system connected to the SIPRNET is considered GENSER.</DfltCorrect>
								<DfltIncorrect>Incorrect. A system connected to the SIPRNET is considered GENSER.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>A system for a special access program is considered to be which type of system?</Txt>
							<Response>
								<Txt>A. GENSER</Txt>
							</Response>
							<Response valid="true">
								<Txt>B. Special Enclave </Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Information systems with special security requirements, such as special access programs, are considered Special Enclave.</DfltCorrect>
								<DfltIncorrect>Incorrect. Information systems with special security requirements, such as special access programs, are considered Special Enclave.</DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<Sec508Data Page="disacndv203_11"></Sec508Data>
					<ShowText Page="disacndv203_11">
						<Txt frameNbr="1">Now check your knowledge of the two cyberspace defense system types. </Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Knowledge Check</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv203_12</Filename>
					<PageNbr>12</PageNbr>
					<PageType>Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>425</DfltFBWidth>
					<Instructions>Select Compliant or Non-compliant for each statement; then select Submit.</Instructions>
					<Questions>
						<Question qType="MC">
							<Txt>A Navy organization has a certified and accredited internal CSP.</Txt>
							<Response valid="true">
								<Txt>Compliant</Txt>
							</Response>
							<Response>
								<Txt>Non-Compliant</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. This is compliant. The CSP can be internal to a DoD Component as long as it is certified and accredited as a CSP.</DfltCorrect>
								<DfltIncorrect>Incorrect. This is compliant. The CSP can be internal to a DoD Component as long as it is certified and accredited as a CSP.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>An Army organization has a certified and accredited CSP that uses cleared contractor personnel under DoD contract.</Txt>
							<Response valid="true">
								<Txt>Compliant</Txt>
							</Response>
							<Response>
								<Txt>Non-Compliant</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. This is compliant. The CSP can be a non-DoD organization as long as it is certified and accredited as a CSP.</DfltCorrect>
								<DfltIncorrect>Incorrect. This is compliant. The CSP can be a non-DoD organization as long as it is certified and accredited as a CSP.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>A Defense Agency has a certified and accredited non-DoD CIRT as its only CSP. The CIRT does not perform Vulnerability Assessment support.</Txt>
							<Response>
								<Txt>Compliant</Txt>
							</Response>
							<Response valid="true">
								<Txt>Non-Compliant</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. This is non-compliant. Each DoD Component must ensure that all required cybersecurity services are being performed which may require having more than one CSP.</DfltCorrect>
								<DfltIncorrect>Incorrect. This is non-compliant. Each DoD Component must ensure that all required cybersecurity services are being performed which may require having more than one CSP.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>A Marine Corps organization uses the Navy CIRT, which is a certified and accredited CSP.</Txt>
							<Response valid="true">
								<Txt>Compliant</Txt>
							</Response>
							<Response>
								<Txt>Non-Compliant</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. This is compliant. The CSP can be a DoD Component that is external to another DoD Component as long as it is certified and accredited as a CSP.</DfltCorrect>
								<DfltIncorrect>Incorrect. This is compliant. The CSP can be a DoD Component that is external to another DoD Component as long as it is certified and accredited as a CSP.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>An Air Force organization has an internal cybersecurity professional, who has attended cyberspace defense training, but who is not part of a certified and accredited CSP organization, performing some cybersecurity services.</Txt>
							<Response>
								<Txt>Compliant</Txt>
							</Response>
							<Response valid="true">
								<Txt>Non-Compliant</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. This is non-compliant. A cybersecurity professional who is not part of a certified and accredited CSP organization may not perform cybersecurity services. </DfltCorrect>
								<DfltIncorrect>Incorrect. This is non-compliant. A cybersecurity professional who is not part of a certified and accredited CSP organization may not perform cybersecurity services. </DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<Sec508Data Page="disacndv203_12"></Sec508Data>
					<ShowText Page="disacndv203_12">
						<Txt frameNbr="5">Check your knowledge regarding the DoD cyberspace defense requirements. </Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Knowledge Check</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv203_13</Filename>
					<PageNbr>13</PageNbr>
					<PageType>Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>425</DfltFBWidth>
					<Instructions>For each described CSP, indicate whether it would be acceptable to provide services for a DoD Component's GENSER and Special Enclave systems; then select Submit.</Instructions>
					<Questions>
						<Question qType="MC">
							<Txt>The CSP was certified four years ago.</Txt>
							<Response>
								<Txt>Acceptable</Txt>
							</Response>
							<Response valid="true">
								<Txt>Not Acceptable</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. This CSP would not be acceptable because CSPs must be reaccredited every 3 years. </DfltCorrect>
								<DfltIncorrect>Incorrect. This CSP would not be acceptable because CSPs must be reaccredited every 3 years. </DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>The CSP is certified as a GENSER CSP, with a Level 3 performance accreditation</Txt>
							<Response>
								<Txt>Acceptable</Txt>
							</Response>
							<Response valid="true">
								<Txt>Not Acceptable</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. This CSP is not acceptable because even though it has the highest level of certification for GENSER systems, it would not be able to provide services for your Special Enclave systems.</DfltCorrect>
								<DfltIncorrect>Incorrect. This CSP is not acceptable because even though it has the highest level of certification for GENSER systems, it would not be able to provide services for your Special Enclave systems. </DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>The CSP is certified as a GENSER CSP, with a Level 2 performance accreditation, and a Special Enclave CSP, with a Level 1 performance accreditation.</Txt>
							<Response valid="true">
								<Txt>Acceptable</Txt>
							</Response>
							<Response>
								<Txt>Not Acceptable</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. This CSP is acceptable because you have both GENSER and Special Enclave Systems and the CSP is accredited for both types of systems. </DfltCorrect>
								<DfltIncorrect>Incorrect. This CSP is acceptable because you have both GENSER and Special Enclave Systems and the CSP is accredited for both types of systems. </DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>The CSP is certified as a GENSER and a Special Enclave CSP, but wants to provide personnel who have not yet been trained in cybersecurity services. </Txt>
							<Response>
								<Txt>Acceptable</Txt>
							</Response>
							<Response valid="true">
								<Txt>Not Acceptable</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. This CSP is not acceptable because its personnel would not be already trained in the cybersecurity services they need to perform for your Component. </DfltCorrect>
								<DfltIncorrect>Incorrect. This CSP is not acceptable because its personnel would not be already trained in the cybersecurity services they need to perform for your Component. </DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<Sec508Data Page="disacndv203_13"></Sec508Data>
					<ShowText Page="disacndv203_13">
						<Txt frameNbr="1">Check your knowledge of CSP requirements. </Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>Conclusion</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>Summary and Conclusion</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv203_14</Filename>
					<PageNbr>14</PageNbr>
					<Sec508Data Page="disacndv203_14"></Sec508Data>
					<ShowText Page="disacndv203_14">
						<Txt frameNbr="5">Congratulations! You have completed the Cybersecurity Service Providers lesson. You should now be able to identify</Txt>
						<Txt frameNbr="171">the key requirements for cyberspace defense that DoD Components must meet to help protect the DoDIN. You should</Txt>
						<Txt frameNbr="358">also be able to identify what CSPs are, and identify the three tiers of service providers that provide cybersecurity services</Txt>
						<Txt frameNbr="556">to the DoD. Finally, you should be able to identify the requirements CSPs must meet to be able to provide</Txt>
						<Txt frameNbr="745">cybersecurity services to DoD Components.</Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
	</Topics>
</Module>