<?xml version="1.0"?>
<Module projectID="1386" moduleID="1729" filePath="disa/ia/cw/disa_cnd_v2_fy13/dev/M01_L04/data.xml" showTextDisplayMode="captionsAndHTML">
	<CourseTitle>Cyberspace Defense (CD) Course</CourseTitle>
	<AU>M01_L04</AU>
	<Title>Principal Cybersecurity Services</Title>
	<LinkSet>links</LinkSet>
	<DefaultControlText name="Done" value="Submit"></DefaultControlText>
	<DefaultControlText name="NextFeedback" value="Next Feedback"></DefaultControlText>
	<DefaultControlText name="PreviousFeedback" value="Previous Feedback"></DefaultControlText>
	<DefaultControlText name="CloseFeedback" value="Close Feedback"></DefaultControlText>
	<DefaultControlText name="TryAgain" value="Try Again"></DefaultControlText>
	<DefaultControlText name="button_print" value="Print Certificate"></DefaultControlText>
	<NavBtns order="referenceObj,skipTopNavBtn,helpBtn,exitBtn,[PAGE],doneBtn,prevFeedbackBtn,nextFeedbackBtn,skipBtmNavBtn,courseMapBtn,resourcesBtn,glossaryBtn,transcriptBtn,turnAudioDescriptionsOffBtn,turnAudioDescriptionsOnBtn,hideCCBtn,showCCBtn,replayBtn,skipReverseBtn,skipForwardBtn,pauseBtn,resumeBtn,previousPgBtn,pageLocation,nextPgBtn,showtext">
		<NavBtn>
			<ControlType>ReferenceOnlyObject</ControlType>
			<ID>referenceObj</ID>
			<RMAText>Testing This Reference Object</RMAText>
		</NavBtn>
		<NavBtn>
			<ControlType>ReadOnlyText</ControlType>
			<ID>pageLocation</ID>
			<RMAText>Page x of y</RMAText>
		</NavBtn>
		<NavBtn>
			<ID>skipTopNavBtn</ID>
			<Label>SKIP TO CONTENT</Label>
			<RMAText>SKIP TO CONTENT</RMAText>
			<ClickEventName>SkipTopNavButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>skipBtmNavBtn</ID>
			<Label>SKIP NAVIGATION</Label>
			<RMAText>SKIP NAVIGATION</RMAText>
			<ClickEventName>SkipBtmNavButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>helpBtn</ID>
			<Label>Help</Label>
			<RMAText>Help. Select this button to open the help panel.</RMAText>
			<ClickEventName>HelpButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>exitBtn</ID>
			<Label>Exit</Label>
			<RMAText>Exit. Select this button to exit the course.</RMAText>
			<ClickEventName>ExitButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>courseMapBtn</ID>
			<Label>Course Map</Label>
			<RMAText>Course map. Select this button to access the course map.</RMAText>
			<ClickEventName>CourseMapButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>glossaryBtn</ID>
			<Label>Glossary</Label>
			<RMAText>Glossary. Select this button open the glossary.</RMAText>
			<ClickEventName>GlossaryButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resourcesBtn</ID>
			<Label>Resources</Label>
			<RMAText>Resources. Select this button to access the resources for the course.</RMAText>
			<ClickEventName>ResourcesButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>hideCCBtn</ID>
			<Label>Hide Captions</Label>
			<RMAText>Hide Captions. Select this button to hide the caption text.</RMAText>
			<ClickEventName>HideCCButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>showCCBtn</ID>
			<Label>Show Captions</Label>
			<RMAText>Show Captions. Select this button to show the caption text.</RMAText>
			<ClickEventName>ShowCCButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>turnAudioDescriptionsOffBtn</ID>
			<Label>Turn Audio Descriptions Off</Label>
			<RMAText>Turn Audio Descriptions Off. Select this button to turn off audio descriptions.</RMAText>
			<ClickEventName>AudioDescriptionsOffButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>turnAudioDescriptionsOnBtn</ID>
			<Label>Turn Audio Descriptions On</Label>
			<RMAText>Turn Audio Descriptions On. Select this button to turn on audio descriptions.</RMAText>
			<ClickEventName>AudioDescriptionsOnButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>skipReverseBtn</ID>
			<Label>Skip Backward</Label>
			<RMAText>Skip Backward. Select this button to skip a few frames back.</RMAText>
			<ClickEventName>SkipReverseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>skipForwardBtn</ID>
			<Label>Skip Forward</Label>
			<RMAText>Skip Forward. Select this button to skip a few frames ahead.</RMAText>
			<ClickEventName>SkipForwardButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>replayBtn</ID>
			<Label>Replay</Label>
			<RMAText>Replay. Select this button to replay the current screen.</RMAText>
			<ClickEventName>ReplayButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>transcriptBtn</ID>
			<Label>Transcript</Label>
			<RMAText>Transcript. Select this button for a transcript of the current page.</RMAText>
			<ClickEventName>ShowTextButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>pauseBtn</ID>
			<Label>Pause</Label>
			<RMAText>Pause. Select this button to pause the course.</RMAText>
			<ClickEventName>PauseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resumeBtn</ID>
			<Label>Resume</Label>
			<RMAText>Resume. Select this button to resume the course.</RMAText>
			<ClickEventName>ResumeButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn prevBtn="true" toggleOffSilent="false">
			<ID>previousPgBtn</ID>
			<Label>Back</Label>
			<RMAText>Back. Select this button to go to the previous screen.</RMAText>
			<ClickEventName>PreviousButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn h="19.1" nextBtn="true" toggleOffSilent="false" w="67.6">
			<ID>nextPgBtn</ID>
			<Label>Next</Label>
			<RMAText>Next. Select this button to go to the next screen.</RMAText>
			<ClickEventName>NextButtonClicked</ClickEventName>
		</NavBtn>
	</NavBtns>
	<Topics>
		<Topic>
			<Title>Introduction</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>Objectives and Topics</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_01</Filename>
					<PageNbr>1</PageNbr>
					<Sec508Data Page="disacndv204_01"></Sec508Data>
					<ShowText Page="disacndv204_01">
						<Txt frameNbr="6">Welcome to the Principal Cybersecurity Services lesson. When you have completed this lesson, you will be able to</Txt>
						<Txt frameNbr="165">identify the individual services that comprise cybersecurity services. You will also be able to identify the role that</Txt>
						<Txt frameNbr="343">cybersecurity service providers, or CSPs, play in delivering these services to DoD Components. There are seven</Txt>
						<Txt frameNbr="547">topics in this lesson. After you have completed this Introduction, you will learn about the four different types of</Txt>
						<Txt frameNbr="689">cybersecurity services and the principal cybersecurity services each type includes. Next, you will learn about the key</Txt>
						<Txt frameNbr="870">cybersecurity services that proactively protect the DoD information networks, or DoDIN. Then, you will learn about the</Txt>
						<Txt frameNbr="1055">main cybersecurity services that monitor, analyze, and detect anomalies that may indicate that the DoDIN have been</Txt>
						<Txt frameNbr="1239">compromised, or are about to be compromised. Next, you will learn about the cybersecurity services that respond to</Txt>
						<Txt frameNbr="1419">computer security incidents to limit their damaging effects on the DoDIN. Finally, you will learn how these services are</Txt>
						<Txt frameNbr="1589">sustained throughout their lifecycle.</Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>Cybersecurity Services Overview</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>DoD Cybersecurity Services</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_02</Filename>
					<PageNbr>2</PageNbr>
					<Sec508Data Page="disacndv204_02"></Sec508Data>
					<ShowText Page="disacndv204_02">
						<Txt frameNbr="6">The DoD Cyberspace Defense Architect, Office of the DoD Chief Information Officer, establishes and oversees the</Txt>
						<Txt frameNbr="194">DoD Cybersecurity Service Provider program. Cybersecurity services are an integral part of DoD warfighting</Txt>
						<Txt frameNbr="371">readiness. A wide spectrum of cybersecurity services is necessary to protect and defend the DoDIN.</Txt>
						<Txt frameNbr="559">Cybersecurity services, protect the network from adverse events, detect adverse events that do occur, respond to those</Txt>
						<Txt frameNbr="771">adverse events, and then sustain all of the protect, detect, and response services throughout their lifecycles.</Txt>
						<Txt frameNbr="980">The principal cybersecurity protection services consist of malware protection support; information operations</Txt>
						<Txt frameNbr="1137">conditions, or INFOCONs; information assurance vulnerability management, or IAVM, support; vulnerability</Txt>
						<Txt frameNbr="1353">assessment, or VA, support; external assessments; and cybersecurity education, training, and awareness, or</Txt>
						<Txt frameNbr="1508">ETA. The principal cybersecurity monitoring, analysis, and detection services include situational awareness</Txt>
						<Txt frameNbr="1704">with network security monitoring and intrusion detection; attack sensing and warning, or AS&#38;W; and indications and</Txt>
						<Txt frameNbr="1908">warnings, or I&#38;W. The principal cybersecurity incident response services include incident reporting, incident</Txt>
						<Txt frameNbr="2059">response, and incident analysis. These services provide the courses of action to take when computer security</Txt>
						<Txt frameNbr="2271">incidents occur. The principal sustainment services include Memorandums of Agreement, or MOAs, and contracts;</Txt>
						<Txt frameNbr="2518">cyberspace defense functional level policies and procedures; cyberspace defense technology development, evaluation, and</Txt>
						<Txt frameNbr="2699">implementation; personnel; security administration; and cyberspace defense information systems. You need to</Txt>
						<Txt frameNbr="2903">understand what each cybersecurity service entails, and the role of CSPs in providing each service to your DoD Component.</Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>Protection Services</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>Malware Protection Support</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_03</Filename>
					<PageNbr>3</PageNbr>
					<Popups>
						<Popup>
							<Title>Malware Protection Support</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv204_03_01</Filename>
							<PageNbr>3</PageNbr>
							<Sec508TriggerName>Malware Protection Support</Sec508TriggerName>
							<Sec508Data Page="disacndv204_03_01"></Sec508Data>
							<ShowText Page="disacndv204_03_01">
								<Txt frameNbr="7">Malware protection protects information systems and networks from known malware. It accomplishes this by</Txt>
								<Txt frameNbr="178">implementing anti-virus software just inside the perimeter of the system. In other words, it prevents malware from entering</Txt>
								<Txt frameNbr="373">and infecting the network servers and workstations.</Txt>
							</ShowText>
						</Popup>
						<Popup>
							<Title>Malware Protection Support</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv204_03_02</Filename>
							<PageNbr>3</PageNbr>
							<Sec508TriggerName>Host-Based Security System (HBSS)</Sec508TriggerName>
							<Sec508Data Page="disacndv204_03_02"></Sec508Data>
							<ShowText Page="disacndv204_03_02">
								<Txt frameNbr="6">A host-based security system provides a second line of defense, by implementing system protection tools on the</Txt>
								<Txt frameNbr="178">host, which may be a single network workstation, computer or laptop. If a worm, virus, or human attacker succeeds in</Txt>
								<Txt frameNbr="381">entering the information system, the HBSS provides a second chance to stop the attack before it further compromises</Txt>
								<Txt frameNbr="548">the system. The most common type of host-based protection is desktop antivirus software that identifies and stops most known</Txt>
								<Txt frameNbr="756">viruses. Another common form of host-based protection is the workstation or the computer personal firewall. This software</Txt>
								<Txt frameNbr="956">works very much like a perimeter firewall, except that it protects only one device: the host computer or workstation.</Txt>
								<Txt frameNbr="1141">Much less common is the host-based intrusion detection system, or HIDS. These software security components</Txt>
								<Txt frameNbr="1342">observe the computer, either at the operating system or at the network interface, sniffing for malicious activity. If malicious</Txt>
								<Txt frameNbr="1539">activity is detected, the HIDS will either terminate the offending activity or send an alert to a security manager. The host-</Txt>
								<Txt frameNbr="1750">based security system can act as a sensor on the cyberspace defense systems' sensor grid. This provides visibility to the</Txt>
								<Txt frameNbr="1943">three tiers of CSPs on the health of the DoDIN.</Txt>
							</ShowText>
						</Popup>
					</Popups>
					<Sec508Data Page="disacndv204_03"></Sec508Data>
					<ShowText Page="disacndv204_03">
						<Txt frameNbr="6">First, let's focus on the cybersecurity services that comprise the DoD's cybersecurity protection</Txt>
						<Txt frameNbr="161">services. Malware protection support services include malware protection and host-based security system, or</Txt>
						<Txt frameNbr="363">HBSS. Select each component of malware protection support services to learn more about it.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>CSP Role in Malware Protection Support</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_04</Filename>
					<PageNbr>4</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>SA, 
System Administrator
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<Sec508Data Page="disacndv204_04"></Sec508Data>
					<ShowText Page="disacndv204_04">
						<Txt frameNbr="7">Take a few moments to review the CSP Role in implementing antivirus services at Tier 1, Tier 2, and Tier 3. Because host-</Txt>
						<Txt frameNbr="245">based protection must be implemented at each individual network workstation, computer, or laptop, the system</Txt>
						<Txt frameNbr="406">administrators, or SAs, at each DoD installation also play a role. SAs install and maintain the host-based software on</Txt>
						<Txt frameNbr="635">each machine. They also ensure that the individual machines are configured to the baseline standards determined</Txt>
						<Txt frameNbr="810">by Tier 1 CSPs.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>INFOCON System</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_05</Filename>
					<PageNbr>5</PageNbr>
					<Sec508Data Page="disacndv204_05"></Sec508Data>
					<ShowText Page="disacndv204_05">
						<Txt frameNbr="5">Use of the DoD Information Operations Condition, or INFOCON, System is a readiness strategy that</Txt>
						<Txt frameNbr="162">provides the ability to continuously maintain and sustain DoD's information systems and networks. An</Txt>
						<Txt frameNbr="359">INFOCON provides a framework of prescribed actions necessary for establishing a level of confidence in the security of</Txt>
						<Txt frameNbr="535">information systems supporting the DoDIN. The INFOCON strategy shifts the DoD from a threat-based, reactive system</Txt>
						<Txt frameNbr="756">to a readiness-based, proactive one. The DoD INFOCON System is a uniform system of five progressive readiness</Txt>
						<Txt frameNbr="950">conditions. INFOCON 5 is normal readiness and INFOCON 1 is maximum readiness. The impact of the</Txt>
						<Txt frameNbr="1158">INFOCON levels on system availability to the end user is limited at INFOCON 5, but can significantly affect system</Txt>
						<Txt frameNbr="1351">availability for short periods at INFOCON 1. The DoD INFOCON System is intended to raise or lower the defensive</Txt>
						<Txt frameNbr="1550">posture of the DoDIN uniformly, to respond to unauthorized activity on DoD information systems, and to mitigate the</Txt>
						<Txt frameNbr="1735">potential damage to DoD information systems and networks.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>CSP Role in INFOCON</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_06</Filename>
					<PageNbr>6</PageNbr>
					<Sec508Data Page="disacndv204_06"></Sec508Data>
					<ShowText Page="disacndv204_06">
						<Txt frameNbr="5">USSTRATCOM has the authority to change the INFOCON level. Tier 2 and Tier 3 CSPs can set a more</Txt>
						<Txt frameNbr="213">restrictive level than USSTRATCOM, but do not have the authority to set a less restrictive INFOCON. Take a</Txt>
						<Txt frameNbr="403">moment to review the remaining CSP INFOCON responsibilities role at Tier 1, Tier 2, and Tier 3.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>IAVM Support</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_07</Filename>
					<PageNbr>7</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>TA, 
Technical Advisory
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover2">
							<RMAText>IAVA, 
Information Assurance Vulnerability Alert
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover3">
							<RMAText>IAVB, 
Information Assurance Vulnerability Bulletin
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<Popups>
						<Popup>
							<Title>IAVM Support</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv204_07_01</Filename>
							<PageNbr>7</PageNbr>
							<Sec508TriggerName>Vulnerability Notifications</Sec508TriggerName>
							<Controls>
								<RollOverButtonControl name="rollover1">
									<RMAText>TA, 
Technical Advisory
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover2">
									<RMAText>IAVA, 
Information Assurance Vulnerability Alert
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover3">
									<RMAText>IAVB, 
Information Assurance Vulnerability Bulletin
</RMAText>
								</RollOverButtonControl>
							</Controls>
							<Sec508Data Page="disacndv204_07_01"></Sec508Data>
							<ShowText Page="disacndv204_07_01">
								<Txt frameNbr="4">IAVAs, IAVBs, and TAs have different levels of urgency, and therefore present different requirements for cybersecurity</Txt>
								<Txt frameNbr="230">professionals. The urgency drives the type of notification that is appropriate. Urgency is determined by the risk to the</Txt>
								<Txt frameNbr="432">DoD if the vulnerability were exploited. A TA is the least urgent and lowest risk type of notification. Therefore,</Txt>
								<Txt frameNbr="644">corrective action is recommended, but not required. Potential escalation of these vulnerabilities is deemed</Txt>
								<Txt frameNbr="816">unlikely, but the advisories are issued so that any risk of escalation in the future can be mitigated. A TA does not</Txt>
								<Txt frameNbr="1024">require acknowledgement within a specified amount of time since the vulnerability information has been received. Compliance</Txt>
								<Txt frameNbr="1215">reporting for TAs is not required; but, again, it is a best practice for cybersecurity professionals to take any</Txt>
								<Txt frameNbr="1393">necessary actions to address the vulnerabilities identified in TAs as soon as possible. An IAVB is used for vulnerabilities</Txt>
								<Txt frameNbr="1618">that are more urgent than those documented in TAs. Vulnerabilities presented in an IAVB pose a medium risk to the</Txt>
								<Txt frameNbr="1837">DoD, and, therefore, corrective action is recommended, but not required. IAVBs require an acknowledgement within an</Txt>
								<Txt frameNbr="2034">amount of time specified in the IAVB since the vulnerability information has been received. The local Authorizing Official, or</Txt>
								<Txt frameNbr="2229">AO, ensures compliance requirements and decisions are in support of local command requirements. Compliance</Txt>
								<Txt frameNbr="2413">reporting for IAVBs is not required, although individual DoD Components may require reporting compliance for IAVBs.</Txt>
								<Txt frameNbr="2622">However, it is still a best practice for cybersecurity professionals to take any necessary actions to address</Txt>
								<Txt frameNbr="2774">the vulnerabilities identified in IAVBs as soon as possible. The most urgent type of notification is an IAVA, which addresses</Txt>
								<Txt frameNbr="3012">severe network vulnerabilities resulting in immediate and potentially severe threats to DoD systems and information.</Txt>
								<Txt frameNbr="3213">IAVAs require corrective action on an urgent basis. IAVAs require an acknowledgement within an amount of time</Txt>
								<Txt frameNbr="3417">specified in the IAVA once the vulnerability information has been received. IAVAs also require compliance reporting,</Txt>
								<Txt frameNbr="3642">directing a response time for the first report on the status of corrective action. Compliance reporting indicates that directed</Txt>
								<Txt frameNbr="3845">actions are being taken to correct the vulnerability. The IAVA will also direct any changes to the standard</Txt>
								<Txt frameNbr="4035">monthly reporting requirement.</Txt>
							</ShowText>
						</Popup>
						<Popup>
							<Title>IAVM Support</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv204_07_02</Filename>
							<PageNbr>7</PageNbr>
							<Sec508TriggerName>IAVM Process</Sec508TriggerName>
							<Controls>
								<RollOverButtonControl name="rollover1">
									<RMAText>IAVA, 
Information Assurance Vulnerability Alert
</RMAText>
								</RollOverButtonControl>
							</Controls>
							<Sec508Data Page="disacndv204_07_02"></Sec508Data>
							<ShowText Page="disacndv204_07_02">
								<Txt frameNbr="6">When vulnerabilities have been reported to or identified by USCYBERCOM, the command determines the urgency of the</Txt>
								<Txt frameNbr="186">information and decides whether to issue an IAVA, IAVB, or technical advisory. The notification is then sent out to</Txt>
								<Txt frameNbr="397">Combatant Command, Service, agency, and field activity points of contact. The points of contact then distribute the</Txt>
								<Txt frameNbr="586">information down their notification chain. When the system administrator or other appropriate personnel receive</Txt>
								<Txt frameNbr="752">the notification, they must acknowledge receipt of the information within the specified time period. The</Txt>
								<Txt frameNbr="910">acknowledgement reporting goes back up the notification chain to the originating Combatant Command, Service,</Txt>
								<Txt frameNbr="1071">agency, or field activity point of contact, who reports the acknowledgement back to USCYBERCOM. The system</Txt>
								<Txt frameNbr="1233">administrators or other appropriate personnel must also comply with mandated actions in the notification, and</Txt>
								<Txt frameNbr="1400">respond with what degree of compliance has been achieved within the specified timeframe. If necessary, a plan of action and</Txt>
								<Txt frameNbr="1593">milestones, or POA&#38;M, is developed for assets that will be non-compliant until mitigation actions are completed. The</Txt>
								<Txt frameNbr="1820">compliance reporting goes back up the notification chain to the originating point of contact, </Txt>
								<Txt frameNbr="1942">who again reports back to USCYBERCOM.</Txt>
							</ShowText>
						</Popup>
					</Popups>
					<Sec508Data Page="disacndv204_07"></Sec508Data>
					<ShowText Page="disacndv204_07">
						<Txt frameNbr="9">When vulnerabilities in DoD information systems are reported or identified, this information must be shared</Txt>
						<Txt frameNbr="157">within the DoD at global, regional, and local levels so that appropriate actions can be taken to protect DoD</Txt>
						<Txt frameNbr="335">information systems. Vulnerability information is distributed within the Department of Defense through</Txt>
						<Txt frameNbr="506">the Information Assurance Vulnerability Management, or IAVM, Program. The DoD IAVM Program focuses on the status</Txt>
						<Txt frameNbr="709">of DoD networks to mitigate or eliminate known vulnerabilities. The IAVM Program provides the ability to quickly notify Services,</Txt>
						<Txt frameNbr="938">combatant commands, Defense agencies, field activities, and other DoD Components of vulnerabilities and the actions</Txt>
						<Txt frameNbr="1150">needed to correct those vulnerabilities. The IAVM Program also assesses the impact of vulnerabilities on the</Txt>
						<Txt frameNbr="1316">DoD infrastructure, monitors the status and closure of vulnerabilities, and reports on compliance with required</Txt>
						<Txt frameNbr="1479">actions to address vulnerabilities. There are three types of vulnerability notifications: an information</Txt>
						<Txt frameNbr="1668">assurance vulnerability alert, or IAVA, an information assurance vulnerability bulletin, or IAVB, and a technical advisory, or TA.</Txt>
						<Txt frameNbr="1912">The DoD IAVM Program's reporting process applies to all types of vulnerability notifications. Select</Txt>
						<Txt frameNbr="2152">Vulnerability Notifications and IAVM process to learn more.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>CSP Role in IAVM Support</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_08</Filename>
					<PageNbr>8</PageNbr>
					<Sec508Data Page="disacndv204_08"></Sec508Data>
					<ShowText Page="disacndv204_08">
						<Txt frameNbr="6">Take a moment to review the CSP role in IAVM support at Tier 1, Tier 2, and Tier 3.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Vulnerability Assessment Support</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_09</Filename>
					<PageNbr>9</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>SCCVI, 
Secure Configuration and Compliance Validation Initiative
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover2">
							<RMAText>ACAS, 
Assured Compliance Assessment Solution
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover3">
							<RMAText>Malicious code eradication, 
Tools that detect and remove malicious code of all types, such as virus and keystroke logging software
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<Popups>
						<Popup>
							<Title>Vulnerability Assessment Support</Title>
							<Subtitle></Subtitle>
							<Filename>disacndv204_09_01</Filename>
							<PageNbr>9</PageNbr>
							<Controls>
								<RollOverButtonControl name="rollover1">
									<RMAText>SCCVI, 
Secure Configuration and Compliance Validation Initiative
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover2">
									<RMAText>ACAS, 
Assured Compliance Assessment Solution
</RMAText>
								</RollOverButtonControl>
								<RollOverButtonControl name="rollover3">
									<RMAText>Malicious code eradication, 
Tools that detect and remove malicious code of all types, such as virus and keystroke logging software
</RMAText>
								</RollOverButtonControl>
							</Controls>
							<Sec508TriggerName>VA Tools</Sec508TriggerName>
							<Sec508Data Page="disacndv204_09_01"></Sec508Data>
							<ShowText Page="disacndv204_09_01">
								<Txt frameNbr="4">DoD Enterprise vulnerability assessment tools include SCCVI and ACAS, as well as other tools, such as malicious</Txt>
								<Txt frameNbr="208">code eradication tools. SCCVI is a legacy system scanning tool that assesses vulnerabilities and downloads information</Txt>
								<Txt frameNbr="411">assurance vulnerability management, or IAVM information. SCCVI uses eEye Digital Security's Retina</Txt>
								<Txt frameNbr="617">Network Security Scanner and its Remote Enterprise Management, or REM, console. SCCVI is able to conduct scans</Txt>
								<Txt frameNbr="837">to identify network assets impacted by a vulnerability; pass information regarding impacted network assets; and</Txt>
								<Txt frameNbr="1041">report IAVM compliance status to the Vulnerability Management System, or VMS, database. SCCVI also allows</Txt>
								<Txt frameNbr="1251">multiple scanners to be managed from a centralized location; and provides the ability for scanners to report</Txt>
								<Txt frameNbr="1389">their findings to a centralized location. ACAS, which is replacing the SCCVI tool, is an automated tool using an</Txt>
								<Txt frameNbr="1598">integrated software solution that is scalable to an unlimited number of locations. ACAS uses the NESSUS Vulnerability</Txt>
								<Txt frameNbr="1808">Scanner's User Interface to derive scanning information on impacted network assets. ACAS provides the required</Txt>
								<Txt frameNbr="1991">automated network vulnerability scanning, configuration assessment, application vulnerability scanning, device</Txt>
								<Txt frameNbr="2188">configuration assessment, and network discovery. Malicious code eradication tools, after evaluation, are being deployed</Txt>
								<Txt frameNbr="2387">to prevent the presence of malicious code on DoD information systems. These tools detect and remove</Txt>
								<Txt frameNbr="2545">multiple types of malicious code, such as: virus spyware, adware, Trojans, hacker tools, and peer-to-peer software.</Txt>
							</ShowText>
						</Popup>
					</Popups>
					<Sec508Data Page="disacndv204_09"></Sec508Data>
					<ShowText Page="disacndv204_09">
						<Txt frameNbr="4">Vulnerability Assessment, or VA, is a systematic examination of an information system to determine the adequacy of its</Txt>
						<Txt frameNbr="205">security measures. Vulnerability assessment identifies security deficiencies, which could include security deficiencies in</Txt>
						<Txt frameNbr="388">hardware, software and vulnerabilities caused by misconfigurations. Vulnerability assessment provides data that</Txt>
						<Txt frameNbr="579">can aide in predicting the effectiveness of proposed security measures. After the proposed security measures</Txt>
						<Txt frameNbr="750">have been implemented, VA can determine if they are adequately protecting the system. The enterprise-wide</Txt>
						<Txt frameNbr="903">tools that the DoD uses to provide vulnerability assessment include the Secure Configuration and Compliance</Txt>
						<Txt frameNbr="1065">Validation Initiative, or SCCVI, which is nearing the end of its life cycle. The SCCVI tool is being replaced by the Assured</Txt>
						<Txt frameNbr="1269">Compliance Assessment Solution, or ACAS. DoD also has available various malicious code eradication tools, such as</Txt>
						<Txt frameNbr="1495">antivirus applications. Select VA tools to learn about what each tool does.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>CSP Role in Vulnerability Assessment Support</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_10</Filename>
					<PageNbr>10</PageNbr>
					<Sec508Data Page="disacndv204_10"></Sec508Data>
					<ShowText Page="disacndv204_10">
						<Txt frameNbr="5">Take a moment to review the CSP role in vulnerability assessment support at Tier 1, Tier 2, and Tier 3.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>External Assessments</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_11</Filename>
					<PageNbr>11</PageNbr>
					<Sec508Data Page="disacndv204_11"></Sec508Data>
					<ShowText Page="disacndv204_11">
						<Txt frameNbr="6">External assessments are independent, threat-based activities that simulate an opposing force trying to break</Txt>
						<Txt frameNbr="174">into a DoD information system. They are usually performed at the request of a DoD information system owner.</Txt>
						<Txt frameNbr="345">External assessments help find information system vulnerabilities that adversaries can exploit. The teams,</Txt>
						<Txt frameNbr="498">sometimes called "Red Teams" created for external assessments, suggest countermeasures based on the</Txt>
						<Txt frameNbr="660">vulnerabilities they find during external assessment activities, so DoD information system owners can better protect their</Txt>
						<Txt frameNbr="839">systems. Information system owners and developers can then make informed risk management decisions</Txt>
						<Txt frameNbr="1002">regarding their information systems, networks, and supporting infrastructure based on external assessment</Txt>
						<Txt frameNbr="1150">teams' assessments.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>CSP Role in External Assessments</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_12</Filename>
					<PageNbr>12</PageNbr>
					<Sec508Data Page="disacndv204_12"></Sec508Data>
					<ShowText Page="disacndv204_12">
						<Txt frameNbr="5">Take a moment to review the CSP role in external assessments at Tier 1, Tier 2, and Tier 3.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Cybersecurity Education, Training, and Awareness</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_13</Filename>
					<PageNbr>13</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>CSP, 
Cybersecurity Service Provider
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<Sec508Data Page="disacndv204_13"></Sec508Data>
					<ShowText Page="disacndv204_13">
						<Txt frameNbr="10">Cybersecurity Education, Training, and Awareness, or ETA, forms the basis for a robust cybersecurity capability</Txt>
						<Txt frameNbr="218">and ensures a consistent level of knowledge across the DoD. Although Cybersecurity ETA is considered one of the principal</Txt>
						<Txt frameNbr="410">cybersecurity protection services for all of the DoD, cyberspace defense-specific Cybersecurity ETA services are</Txt>
						<Txt frameNbr="609">internal to the CSPs, rather than a service that they deliver to DoD Components. To perform cybersecurity services</Txt>
						<Txt frameNbr="806">for DoD information systems and networks, CSP personnel must be trained to perform the required cybersecurity services.</Txt>
						<Txt frameNbr="1003">When DoD Components enter a relationship with a certified and accredited CSP organization, their expectation is that the</Txt>
						<Txt frameNbr="1211">personnel working for that organization are adequately trained to protect their DoD information systems. DoD</Txt>
						<Txt frameNbr="1391">8570.01-M, The "Information Assurance Workforce Improvement Program" manual requires DoD cybersecurity</Txt>
						<Txt frameNbr="1600">professionals to be trained and certified in their cybersecurity role. CSP professionals must also meet specific DoD</Txt>
						<Txt frameNbr="1796">training and certification requirements.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>CSP Role in Cyberspace Defense-Specific Cybersecurity ETA</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_14</Filename>
					<PageNbr>14</PageNbr>
					<Sec508Data Page="disacndv204_14"></Sec508Data>
					<ShowText Page="disacndv204_14">
						<Txt frameNbr="8">Take a moment to review the CSP roles in cybersecurity education, training, and awareness at Tier 1, Tier 2, and Tier 3.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Knowledge Check</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_15</Filename>
					<PageNbr>15</PageNbr>
					<PageType display="Sequential">Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>425</DfltFBWidth>
					<Instructions>Select the best response; then select Submit.</Instructions>
					<Questions>
						<Question qType="MC">
							<Txt>Which of the following services detects unauthorized activity and notifies affected parties?</Txt>
							<Response>
								<Txt>A.	INFOCON</Txt>
							</Response>
							<Response>
								<Txt>B.	Situational Awareness</Txt>
							</Response>
							<Response valid="true">
								<Txt>C.	Attack, Sensing &#38; Warning</Txt>
							</Response>
							<Response>
								<Txt>D.	VA Support</Txt>
							</Response>
							<Response>
								<Txt>E.	Indications and Warnings (I&#38;W)</Txt>
							</Response>
							<Response>
								<Txt>F.	IAVM Support</Txt>
							</Response>
							<Response>
								<Txt>G.	External Assessments</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Attack, sensing, and warning activities detect unauthorized activity and notify affected parties. </DfltCorrect>
								<DfltIncorrect>Incorrect. Attack, sensing, and warning activities detect unauthorized activity and notify affected parties. </DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Which of the following services is a readiness strategy that provides a framework of prescribed actions?</Txt>
							<Response valid="true">
								<Txt>A.	INFOCON</Txt>
							</Response>
							<Response>
								<Txt>B.	Situational Awareness</Txt>
							</Response>
							<Response>
								<Txt>C.	Attack, Sensing &#38; Warning</Txt>
							</Response>
							<Response>
								<Txt>D.	VA Support</Txt>
							</Response>
							<Response>
								<Txt>E.	Indications and Warnings (I&#38;W)</Txt>
							</Response>
							<Response>
								<Txt>F.	IAVM Support</Txt>
							</Response>
							<Response>
								<Txt>G.	External Assessments</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. INFOCON is a readiness strategy that provides a framework of prescribed actions. </DfltCorrect>
								<DfltIncorrect>Incorrect. INFOCON is a readiness strategy that provides a framework of prescribed actions. </DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Which of the following services detects and reports time-sensitive intelligence on foreign developments?</Txt>
							<Response>
								<Txt>A.	INFOCON</Txt>
							</Response>
							<Response>
								<Txt>B.	Situational Awareness</Txt>
							</Response>
							<Response>
								<Txt>C.	Attack, Sensing &#38; Warning</Txt>
							</Response>
							<Response>
								<Txt>D.	VA Support</Txt>
							</Response>
							<Response valid="true">
								<Txt>E.	Indications and Warnings (I&#38;W)</Txt>
							</Response>
							<Response>
								<Txt>F.	IAVM Support</Txt>
							</Response>
							<Response>
								<Txt>G.	External Assessments</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Indications and warnings are intelligence activities to detect and report time-sensitive intelligence on foreign developments. </DfltCorrect>
								<DfltIncorrect>Incorrect. Indications and warnings are intelligence activities to detect and report time-sensitive intelligence on foreign developments. </DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Which of the following services provides a common operational picture of the DoDIN and the missions it supports?</Txt>
							<Response>
								<Txt>A.	INFOCON</Txt>
							</Response>
							<Response valid="true">
								<Txt>B.	Situational Awareness</Txt>
							</Response>
							<Response>
								<Txt>C.	Attack, Sensing &#38; Warning</Txt>
							</Response>
							<Response>
								<Txt>D.	VA Support</Txt>
							</Response>
							<Response>
								<Txt>E.	Indications and Warnings (I&#38;W)</Txt>
							</Response>
							<Response>
								<Txt>F.	IAVM Support</Txt>
							</Response>
							<Response>
								<Txt>G.	External Assessments</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Situational awareness provides a common operational picture of the DoDIN and the missions it supports. </DfltCorrect>
								<DfltIncorrect>Incorrect. Situational awareness provides a common operational picture of the DoDIN and the missions it supports. </DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Which of the following services ensures awareness of newly identified system vulnerabilities?</Txt>
							<Response>
								<Txt>A.	INFOCON</Txt>
							</Response>
							<Response>
								<Txt>B.	Situational Awareness</Txt>
							</Response>
							<Response>
								<Txt>C.	Attack, Sensing &#38; Warning</Txt>
							</Response>
							<Response>
								<Txt>D.	VA Support</Txt>
							</Response>
							<Response>
								<Txt>E.	Indications and Warnings (I&#38;W)</Txt>
							</Response>
							<Response valid="true">
								<Txt>F.	IAVM Support</Txt>
							</Response>
							<Response>
								<Txt>G.	External Assessments</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. IAVM support ensures awareness of newly identified system vulnerabilities. </DfltCorrect>
								<DfltIncorrect>Incorrect. IAVM support ensures awareness of newly identified system vulnerabilities. </DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Which of the following services includes simulating an opposing force to detect vulnerabilities?</Txt>
							<Response>
								<Txt>A.	INFOCON</Txt>
							</Response>
							<Response>
								<Txt>B.	Situational Awareness</Txt>
							</Response>
							<Response>
								<Txt>C.	Attack, Sensing &#38; Warning</Txt>
							</Response>
							<Response>
								<Txt>D.	VA Support</Txt>
							</Response>
							<Response>
								<Txt>E.	Indications and Warnings (I&#38;W)</Txt>
							</Response>
							<Response>
								<Txt>F.	IAVM Support</Txt>
							</Response>
							<Response valid="true">
								<Txt>G.	External Assessments</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. External assessments include simulating an opposing force to detect vulnerabilities. </DfltCorrect>
								<DfltIncorrect>Incorrect. External assessments include simulating an opposing force to detect vulnerabilities. </DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Which of the following services proactively scans systems and networks to detect vulnerabilities?</Txt>
							<Response>
								<Txt>A.	INFOCON</Txt>
							</Response>
							<Response>
								<Txt>B.	Situational Awareness</Txt>
							</Response>
							<Response>
								<Txt>C.	Attack, Sensing &#38; Warning</Txt>
							</Response>
							<Response valid="true">
								<Txt>D.	VA Support</Txt>
							</Response>
							<Response>
								<Txt>E.	Indications and Warnings (I&#38;W)</Txt>
							</Response>
							<Response>
								<Txt>F.	IAVM Support</Txt>
							</Response>
							<Response>
								<Txt>G.	External Assessments</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. VA Support proactively scans systems and networks to detect vulnerabilities.</DfltCorrect>
								<DfltIncorrect>Incorrect. VA Support proactively scans systems and networks to detect vulnerabilities.</DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<Sec508Data Page="disacndv204_15"></Sec508Data>
					<ShowText Page="disacndv204_15">
						<Txt frameNbr="5">Now try this.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Knowledge Check</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_16</Filename>
					<PageNbr>16</PageNbr>
					<PageType display="Sequential">Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>425</DfltFBWidth>
					<Instructions>Refer to the CSP Roles in Cybersecurity Services Job Aid under Resources to answer these questions. Select the best response; then select Submit.</Instructions>
					<Questions>
						<Question qType="MC">
							<Txt>Which CSP has the authority to change the INFOCON level from INFOCON 2 to INFOCON 3?
</Txt>
							<Response valid="true">
								<Txt>A.	Tier 1</Txt>
							</Response>
							<Response>
								<Txt>B.	Tier 2</Txt>
							</Response>
							<Response>
								<Txt>C.	Tier 3</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Tier 1 CSPs have the authority to change INFOCON levels. Tier 2 and Tier 3 CSPs can only implement a more stringent INFOCON than the INFOCON set by Tier 1.</DfltCorrect>
								<DfltIncorrect>Incorrect. Tier 1 CSPs have the authority to change INFOCON levels. Tier 2 and Tier 3 CSPs can only implement a more stringent INFOCON than the INFOCON set by Tier 1.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Which CSP implements the system protection services enterprise-wide tools and ensures host-based systems are configured to standards?</Txt>
							<Response>
								<Txt>A.	Tier 1</Txt>
							</Response>
							<Response>
								<Txt>B.	Tier 2</Txt>
							</Response>
							<Response valid="true">
								<Txt>C.	Tier 3</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Tier 3 CSPs implement the system protection services enterprise-wide tools and ensures host-based systems are configured to standards.</DfltCorrect>
								<DfltIncorrect>Incorrect. Tier 3 CSPs implement the system protection services enterprise-wide tools and ensures host-based systems are configured to standards.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Which CSP initiates IAVAs and manages the vulnerability management system (VMS)?
</Txt>
							<Response valid="true">
								<Txt>A.	Tier 1</Txt>
							</Response>
							<Response>
								<Txt>B.	Tier 2</Txt>
							</Response>
							<Response>
								<Txt>C.	Tier 3</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. DISA, which is a Tier 1 CSP, initiates IAVAs and manages the VMS.</DfltCorrect>
								<DfltIncorrect>Incorrect. DISA, which is a Tier 1 CSP, initiates IAVAs and manages the VMS.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Which CSP assesses the impact of vulnerability assessments on cyberspace defense and coordinates changes to in progress or planned VAs?</Txt>
							<Response>
								<Txt>A.	Tier 1</Txt>
							</Response>
							<Response valid="true">
								<Txt>B.	Tier 2</Txt>
							</Response>
							<Response>
								<Txt>C.	Tier 3</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Tier 2 CSPs assess the impact of vulnerability assessments on cyberspace defense and coordinate changes to in-progress or planned VAs.</DfltCorrect>
								<DfltIncorrect>Incorrect. Tier 2 CSPs assess the impact of vulnerability assessments on cyberspace defense and coordinate changes to in-progress or planned VAs.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Which CSP supports external assessments by complying with direction on external assessment notification, reporting, and coordination requirements?</Txt>
							<Response>
								<Txt>A.	Tier 1</Txt>
							</Response>
							<Response>
								<Txt>B.	Tier 2</Txt>
							</Response>
							<Response valid="true">
								<Txt>C.	Tier 3</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Tier 3 CSPs support external assessments by complying with Tier 1 and Tier 2 direction on external assessment notification, reporting, and coordination requirements.</DfltCorrect>
								<DfltIncorrect>Incorrect. Tier 3 CSPs support external assessments by complying with Tier 1 and Tier 2 direction on external assessment notification, reporting, and coordination requirements.</DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<Sec508Data Page="disacndv204_16"></Sec508Data>
					<ShowText Page="disacndv204_16">
						<Txt frameNbr="6">Now check your knowledge of the CSPs' roles in cybersecurity protection services.</Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>Monitoring, Analysis &#38; Detection Services</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>Situational Awareness</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_17</Filename>
					<PageNbr>17</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>Information systems and their missions, 
The first element of the Cyberspace Defense COP is the DoD global information and computing networks, and the military and business operations they support. This includes notification of any impending changes in configuration, capacity, utilization, assurance posture, user priorities or criticality of support for military operations.
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover2">
							<RMAText>Threats to DoD information systems, 
The first element of the Cyberspace Defense COP is the DoD global information and computing networks, and the military and business operations they support. This includes notification of any impending changes in configuration, capacity, utilization, assurance posture, user priorities or criticality of support for military operations.
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover3">
							<RMAText>Cyberspace defense operations, 
The third element of the Cyberspace Defense COP is a shared picture of cyberspace defense operations. This includes INFOCON levels and compliance, status and compliance with the IAVM program, schedule and status of vulnerability assessments, status of cyberspace defense courses of action, and any impending changes to cybersecurity services.
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<Sec508Data Page="disacndv204_17"></Sec508Data>
					<ShowText Page="disacndv204_17">
						<Txt frameNbr="5">Now, let's focus on the cybersecurity monitoring, analysis, and detection services, starting with</Txt>
						<Txt frameNbr="157">situational awareness. Situational awareness is necessary to defend DoD's highly</Txt>
						<Txt frameNbr="325">interconnected information systems. Key to situational awareness is effective Network Security Monitoring and</Txt>
						<Txt frameNbr="480">Intrusion Detection. Situational awareness is enabled by a suite of information systems that support and create a common</Txt>
						<Txt frameNbr="667">operational picture, or COP. The Cyberspace Defense COP consists of several elements. The first element is a shared</Txt>
						<Txt frameNbr="879">picture of the DoD global information and computing networks and the military and business operations they</Txt>
						<Txt frameNbr="1040">support. The second element of the Cyberspace Defense COP is a shared picture of the threat to DoD information systems</Txt>
						<Txt frameNbr="1242">developed from all sources. The third element of the Cyberspace Defense COP is a shared picture of</Txt>
						<Txt frameNbr="1401">cyberspace defense operations.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>CSP Role in Situational Awareness</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_18</Filename>
					<PageNbr>18</PageNbr>
					<Sec508Data Page="disacndv204_18"></Sec508Data>
					<ShowText Page="disacndv204_18">
						<Txt frameNbr="6">Take a moment to review the CSP role in situational awareness at Tier 1, Tier 2, and Tier 3.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Attack Sensing and Warning</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_19</Filename>
					<PageNbr>19</PageNbr>
					<Sec508Data Page="disacndv204_19"></Sec508Data>
					<ShowText Page="disacndv204_19">
						<Txt frameNbr="6">Attack Sensing and Warning, or AS&#38;W, is defined as the detection, correlation, identification, and</Txt>
						<Txt frameNbr="203">characterization of intentional unauthorized activity on DoD information systems, including computer intrusion or attack,</Txt>
						<Txt frameNbr="416">coupled with the notification to commanders and decision-makers so an appropriate response can be developed.</Txt>
						<Txt frameNbr="571">AS&#38;W also includes the collection and dissemination of intelligence related to a computer attack and may</Txt>
						<Txt frameNbr="739">include recommendations for a response to and an assessment of the impact of an attack or intrusion. AS&#38;W focuses</Txt>
						<Txt frameNbr="952">both on actual intrusions and preparatory actions or on preliminary network conditions that may indicate an attack is</Txt>
						<Txt frameNbr="1146">likely, is planned, or is underway.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>CSP Role in AS&#38;W</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_20</Filename>
					<PageNbr>20</PageNbr>
					<Sec508Data Page="disacndv204_20"></Sec508Data>
					<ShowText Page="disacndv204_20">
						<Txt frameNbr="8">Take a moment to review the CSP role in Attack Sensing and Warning at Tier 1, Tier 2, and Tier 3.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Indications and Warnings</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_21</Filename>
					<PageNbr>21</PageNbr>
					<Sec508Data Page="disacndv204_21"></Sec508Data>
					<ShowText Page="disacndv204_21">
						<Txt frameNbr="7">Indications and Warnings, or I&#38;W, are defined as those intelligence activities intended to detect and report</Txt>
						<Txt frameNbr="199">time-sensitive intelligence information on foreign developments that could involve a threat to the United States, or</Txt>
						<Txt frameNbr="355">allied military, political, or economic interests, or U.S. citizens abroad. I&#38;W includes forewarning of enemy</Txt>
						<Txt frameNbr="569">actions or intentions; the imminence of hostilities; insurgent activity; nuclear or non-nuclear attack on the U.S.,</Txt>
						<Txt frameNbr="776">its overseas forces, or allied nations; hostile reactions to U.S. reconnaissance activities; and terrorist attacks.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>CSP Role in Indications and Warnings (I&#38;W)</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_22</Filename>
					<PageNbr>22</PageNbr>
					<Sec508Data Page="disacndv204_22"></Sec508Data>
					<ShowText Page="disacndv204_22">
						<Txt frameNbr="7">Take a moment to review the CSP role in Indications and Warning at Tier 1, Tier 2, and Tier 3.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Knowledge Check</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_23</Filename>
					<PageNbr>23</PageNbr>
					<PageType>Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>425</DfltFBWidth>
					<Instructions>Select the best response for each statement; then select Submit.</Instructions>
					<Controls>
						<ScenarioControl name="scenario">
							<ControlType>ReadOnlyText</ControlType>
							<RMAText>Indicate the service to which each description applies.</RMAText>
						</ScenarioControl>
					</Controls>
					<Questions>
						<Question qType="MC">
							<Txt>Detects intentional unauthorized activity on information systems and networks</Txt>
							<Response>
								<Txt>Situational Awareness</Txt>
							</Response>
							<Response>
								<Txt>Indications &#38; Warnings (I&#38;W)</Txt>
							</Response>
							<Response valid="true">
								<Txt>Attack Sensing &#38; Warning(AS&#38;W)</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. AS&#38;W detects and identifies intentional unauthorized activity on information systems and networks.</DfltCorrect>
								<DfltIncorrect>Incorrect. AS&#38;W detects and identifies intentional unauthorized activity on information systems and networks.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Consists of intelligence activities to detect and report time-sensitive intelligence information on foreign developments</Txt>
							<Response>
								<Txt>Situational Awareness</Txt>
							</Response>
							<Response valid="true">
								<Txt>Indications &#38; Warnings (I&#38;W)</Txt>
							</Response>
							<Response>
								<Txt>Attack Sensing &#38; Warning(AS&#38;W)</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Indications &#38; Warnings consist of intelligence activities to detect and report time-sensitive intelligence information on foreign developments.</DfltCorrect>
								<DfltIncorrect>Incorrect. Indications &#38; Warnings consist of intelligence activities to detect and report time-sensitive intelligence information on foreign developments.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Provides a common operational picture (COP)</Txt>
							<Response valid="true">
								<Txt>Situational Awareness</Txt>
							</Response>
							<Response>
								<Txt>Indications &#38; Warnings (I&#38;W)</Txt>
							</Response>
							<Response>
								<Txt>Attack Sensing &#38; Warning(AS&#38;W)</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Situational awareness provides a common operational picture (COP).</DfltCorrect>
								<DfltIncorrect>Incorrect. Situational awareness provides a common operational picture (COP).</DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<Sec508Data Page="disacndv204_23"></Sec508Data>
					<ShowText Page="disacndv204_23">
						<Txt frameNbr="5">Now check your knowledge of the cybersecurity monitoring, analysis, and detection services.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Knowledge Check</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_24</Filename>
					<PageNbr>24</PageNbr>
					<PageType>Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>425</DfltFBWidth>
					<Instructions>Select True or False for each statement; then select Submit.</Instructions>
					<Controls>
						<ScenarioControl name="scenario">
							<ControlType>ReadOnlyText</ControlType>
							<RMAText>Refer to the CSP Roles in Cybersecurity Services Job Aid under Resources to answer these questions.</RMAText>
						</ScenarioControl>
					</Controls>
					<Questions>
						<Question qType="MC">
							<Txt>Tier 1 CSPs provide DoD Component-unique situational awareness requirements.</Txt>
							<Response>
								<Txt>True</Txt>
							</Response>
							<Response valid="true">
								<Txt>False</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. This is false. Tier 2 CSPs provide DoD Component-unique situational awareness requirements.</DfltCorrect>
								<DfltIncorrect>Incorrect. This is false. Tier 2 CSPs provide DoD Component-unique situational awareness requirements.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Tier 1 CSPs provide the intelligence community with PIR requirements and with I&#38;W requirements.</Txt>
							<Response valid="true">
								<Txt>True</Txt>
							</Response>
							<Response>
								<Txt>False</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. This is true. Tier 1 CSPs provide the intelligence community with PIR requirements and with I&#38;W requirements.</DfltCorrect>
								<DfltIncorrect>Incorrect. This is true. Tier 1 CSPs provide the intelligence community with PIR requirements and with I&#38;W requirements.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Tier 2 CSPs work with Tier 3 CSPs to ensure timely and accurate common operational picture (COP).</Txt>
							<Response valid="true">
								<Txt>True</Txt>
							</Response>
							<Response>
								<Txt>False</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. This is true. Tier 2 CSPs work with Tier 3 CSPs to ensure timely and accurate common operational picture (COP).</DfltCorrect>
								<DfltIncorrect>Incorrect. This is true. Tier 2 CSPs work with Tier 3 CSPs to ensure timely and accurate common operational picture (COP).</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Tier 3 CSPs support key cyberspace defense personnel in identifying AS&#38;W requirements.</Txt>
							<Response>
								<Txt>True</Txt>
							</Response>
							<Response valid="true">
								<Txt>False</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. This is false. Tier 2 CSPs support key cyberspace defense personnel in identifying AS&#38;W requirements.</DfltCorrect>
								<DfltIncorrect>Incorrect. This is false. Tier 2 CSPs support key cyberspace defense personnel in identifying AS&#38;W requirements.</DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<Sec508Data Page="disacndv204_24"></Sec508Data>
					<ShowText Page="disacndv204_24">
						<Txt frameNbr="1">Now check your knowledge of the roles each tier plays in Cyberspace Defense. </Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>Response Services</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>Incident Response, Reporting and Analysis</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_25</Filename>
					<PageNbr>25</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>USCYBERCOM, 
United States Cyber Command
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover2">
							<RMAText>CIRT or CERT®, 
Computer Incident Response Team/Computer Emergency Response Team
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover3">
							<RMAText>RCERTs, 
Regional Computer Emergency Response Teams
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover4">
							<RMAText>JIMS, 
Joint Incident Management System
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<ShowText Page="disacndv204_25">
						<Txt frameNbr="8">Incident response services are intended to report, respond to, and analyze computer security incidents that occur on DoD</Txt>
						<Txt frameNbr="205">information systems. CSPs are responsible for developing and implementing the incident response course of action, or</Txt>
						<Txt frameNbr="396">COA, that must be followed for all incidents that occur on DoD information systems. The incident response COA includes</Txt>
						<Txt frameNbr="603">identifying the incident, assessing its impact, informing the appropriate entities up the reporting chain, and responding</Txt>
						<Txt frameNbr="787">to the incident. Incidents must be reported up the reporting chain using the Joint Incident Management System, or JIMS.</Txt>
						<Txt frameNbr="986">As each level in the chain receives incident report information, that level performs the required COA. It is</Txt>
						<Txt frameNbr="1167">important to note that incidents must be reported to both the DoD Component affected by the incident and to USCYBERCOM.</Txt>
					</ShowText>
					<Sec508Data Page="disacndv204_25"></Sec508Data>
				</Page>
				<Page>
					<Title>CSP Role in Incident Response, Reporting and Analysis</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_26</Filename>
					<PageNbr>26</PageNbr>
					<ShowText Page="disacndv204_26">
						<Txt frameNbr="7">Take a moment to review the CSP role in Incident Response at Tier 1, Tier 2, and Tier 3.</Txt>
					</ShowText>
					<Sec508Data Page="disacndv204_26"></Sec508Data>
				</Page>
				<Page>
					<Title>Knowledge Check</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_27</Filename>
					<PageNbr>27</PageNbr>
					<PageType>Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>425</DfltFBWidth>
					<Instructions>Select the best response; then select Submit.</Instructions>
					<Questions>
						<Question qType="MC">
							<Txt>Which of the following statements best describes the purpose of Cybersecurity Response Services? </Txt>
							<Response>
								<Txt>Provide a Course of Action for Defense-wide information sharing regarding computer incidents and vulnerabilities</Txt>
							</Response>
							<Response>
								<Txt>Provide a Course of Action to develop a cyberspace defense common operational picture to determine when incidents have occurred</Txt>
							</Response>
							<Response>
								<Txt>Provide a Course of Action to investigate and prosecute the individuals responsible for computer incidents </Txt>
							</Response>
							<Response valid="true">
								<Txt>Provide a Course of Action for identifying, assessing, reporting, and responding to computer security incidents</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Cybersecurity Response Services are incident response services that provide a Course of Action for identifying, assessing, reporting, and responding to computer security incidents.</DfltCorrect>
								<DfltIncorrect>Incorrect. Cybersecurity Response Services are incident response services that provide a Course of Action for identifying, assessing, reporting, and responding to computer security incidents.</DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<ShowText Page="disacndv204_27">
						<Txt frameNbr="6">Now, check your understanding of Cybersecurity Response Services.</Txt>
					</ShowText>
					<Sec508Data Page="disacndv204_27"></Sec508Data>
				</Page>
				<Page>
					<Title>Knowledge Check</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_28</Filename>
					<PageNbr>28</PageNbr>
					<PageType>Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>425</DfltFBWidth>
					<Instructions>Refer to the CSP Roles in Cybersecurity Services Job Aid under Resources to answer these questions. Select the best response for each statement; then select Submit.</Instructions>
					<Controls>
						<ScenarioControl name="scenario">
							<ControlType>ReadOnlyText</ControlType>
							<RMAText>Indicate the service to which each description applies.</RMAText>
						</ScenarioControl>
					</Controls>
					<Questions>
						<Question qType="MC">
							<Txt>Ensures that information regarding course of action development and execution is timely and accurate</Txt>
							<Response>
								<Txt>Tier 1</Txt>
							</Response>
							<Response valid="true">
								<Txt>Tier 2</Txt>
							</Response>
							<Response>
								<Txt>Tier 3</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Tier 2 CSPs ensure that information regarding course of action development and execution is timely and accurate.</DfltCorrect>
								<DfltIncorrect>Incorrect. Tier 2 CSPs ensure that information regarding course of action development and execution is timely and accurate.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Responsible for managing the cyberspace defense course of action development and execution process</Txt>
							<Response valid="true">
								<Txt>Tier 1</Txt>
							</Response>
							<Response>
								<Txt>Tier 2</Txt>
							</Response>
							<Response>
								<Txt>Tier 3</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Tier 1 CSPs are responsible for managing the DoD cyberspace defense course of action development and execution process.</DfltCorrect>
								<DfltIncorrect>Incorrect. Tier 1 CSPs are responsible for managing the DoD cyberspace defense course of action development and execution process.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Works with other tiers to ensure effective lines of command, control, communication, and coordination</Txt>
							<Response>
								<Txt>Tier 1</Txt>
							</Response>
							<Response valid="true">
								<Txt>Tier 2</Txt>
							</Response>
							<Response>
								<Txt>Tier 3</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Tier 2 CSPs work with the other tiers to ensure effective lines of command, control, communication, and coordination. </DfltCorrect>
								<DfltIncorrect>Incorrect. Tier 2 CSPs work with the other tiers to ensure effective lines of command, control, communication, and coordination. </DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Follows direction regarding the course of action development and execution</Txt>
							<Response>
								<Txt>Tier 1</Txt>
							</Response>
							<Response>
								<Txt>Tier 2</Txt>
							</Response>
							<Response valid="true">
								<Txt>Tier 3</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Tier 3 CSPs follow Tier 1 and Tier 2 direction regarding the course of action development and execution.</DfltCorrect>
								<DfltIncorrect>Incorrect. Tier 3 CSPs follow Tier 1 and Tier 2 direction regarding the course of action development and execution.</DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<ShowText Page="disacndv204_28">
						<Txt frameNbr="10">Now check your knowledge about the CSPs' roles in incident response.</Txt>
					</ShowText>
					<Sec508Data Page="disacndv204_28"></Sec508Data>
				</Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>Sustainment Services</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>MOAs/Contracts</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_29</Filename>
					<PageNbr>29</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>MOA, 
Memorandum of Agreement
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover2">
							<RMAText>SLA, 
Service Level Agreement
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<ShowText Page="disacndv204_29">
						<Txt frameNbr="8">Sustainment services include the review of memorandums of agreement, or MOAs; service level agreements, or SLAs; and</Txt>
						<Txt frameNbr="222">contracts to ensure cybersecurity services are being provided and maintained as outlined in the MOAs, SLAs,</Txt>
						<Txt frameNbr="421">and contracts between the CSPs and their clients.</Txt>
					</ShowText>
					<Sec508Data Page="disacndv204_29"></Sec508Data>
				</Page>
				<Page>
					<Title>Functional Level Policies and Procedures</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_30</Filename>
					<PageNbr>30</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>TTPs, 
Tactics, Techniques, and Procedures
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover2">
							<RMAText>SOPs, 
Standard Operating Procedures
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<ShowText Page="disacndv204_30">
						<Txt frameNbr="5">Sustainment services ensure cyberspace defense functional level policies and procedures are in place. Sanitization</Txt>
						<Txt frameNbr="205">procedures protect classified information from unauthorized disclosure. Law Enforcement/Counter</Txt>
						<Txt frameNbr="357">Intelligence, or LE/CI, procedures and policies protect sensitive information and preserve evidence for</Txt>
						<Txt frameNbr="541">investigations. Other procedures are used to validate existing cyberspace defense policies and procedures;</Txt>
						<Txt frameNbr="718">tactics, techniques, and procedures, or TTPs; and standard operating procedures, or SOPs. Finally, procedures</Txt>
						<Txt frameNbr="940">exist to ensure support plans, financial plans, and metrics are in place to support cybersecurity services.</Txt>
					</ShowText>
					<Sec508Data Page="disacndv204_30"></Sec508Data>
				</Page>
				<Page>
					<Title>Technology Development, Evaluation, and Implementation</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_31</Filename>
					<PageNbr>31</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>AS&#38;W, 
Attack Sensing and Warning
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<ShowText Page="disacndv204_31">
						<Txt frameNbr="8">Sustainment services ensure that cyberspace defense technology is developed, evaluated, and implemented in</Txt>
						<Txt frameNbr="184">concert with the latest threats and emerging technologies available, both in the government and private sector.</Txt>
						<Txt frameNbr="340">This includes AS&#38;W procedures for cybersecurity services themselves, the creation of cybersecurity tool</Txt>
						<Txt frameNbr="523">deployment procedures, and testing prior to operational use of those services, followed</Txt>
						<Txt frameNbr="664">by post-deployment testing of those services.</Txt>
					</ShowText>
					<Sec508Data Page="disacndv204_31"></Sec508Data>
				</Page>
				<Page>
					<Title>Personnel</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_32</Filename>
					<PageNbr>32</PageNbr>
					<ShowText Page="disacndv204_32">
						<Txt frameNbr="6">Sustainment services ensure that sustainment personnel are correctly identified in any contract or service level</Txt>
						<Txt frameNbr="179">agreement, receive technical training on the cybersecurity tools that are deployed, and are maintaining technical currency,</Txt>
						<Txt frameNbr="362">such as by participating in government and industry external forums, for example, Black Hat briefings.</Txt>
					</ShowText>
					<Sec508Data Page="disacndv204_32"></Sec508Data>
				</Page>
				<Page>
					<Title>Security Administration</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_33</Filename>
					<PageNbr>33</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>OPSEC, 
Operations Security
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<ShowText Page="disacndv204_33">
						<Txt frameNbr="6">Security Administration ensures the data provided by CSPs is protected. To this end, Security Administration ensures</Txt>
						<Txt frameNbr="198">cybersecurity services are in compliance with physical security standards, protective measures for cybersecurity</Txt>
						<Txt frameNbr="382">tools and systems, Operations Security, or OPSEC, standards and personnel security measures, which include</Txt>
						<Txt frameNbr="568">procedures for foreign nationals.</Txt>
					</ShowText>
					<Sec508Data Page="disacndv204_33"></Sec508Data>
				</Page>
				<Page>
					<Title>Information Systems</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_34</Filename>
					<PageNbr>34</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>BCP, 
Business Continuity Plan
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover2">
							<RMAText>DRP, 
Disaster Recovery Plan
</RMAText>
						</RollOverButtonControl>
						<RollOverButtonControl name="rollover3">
							<RMAText>COOP, 
Continuity of Operations Plan
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<ShowText Page="disacndv204_34">
						<Txt frameNbr="9">Sustainment services include cyberspace defense information systems that show how the cybersecurity products provided</Txt>
						<Txt frameNbr="171">to customers are being protected. The types of protection applied to or performed on cyberspace</Txt>
						<Txt frameNbr="323">defense systems include defense-in-depth strategy, anti-malware program for CSP information; Backup and</Txt>
						<Txt frameNbr="534">Business Continuity Plans, Disaster Recovery Plans, and Continuity of Operations Plans; intrusion detection; INFOCON;</Txt>
						<Txt frameNbr="764">vulnerability assessments scans; annual external assessments; IAVM compliance; accreditation</Txt>
						<Txt frameNbr="964">procedures; lifecycle configuration management, or CM, plans; and site identification of confidentiality of</Txt>
						<Txt frameNbr="1171">sensitive data during transmission between subscriber and provider.</Txt>
					</ShowText>
					<Sec508Data Page="disacndv204_34"></Sec508Data>
				</Page>
				<Page>
					<Title>Knowledge Check</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_35</Filename>
					<PageNbr>35</PageNbr>
					<PageType display="Sequential">Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>425</DfltFBWidth>
					<Instructions>Select the best response; then select Submit.</Instructions>
					<Questions>
						<Question qType="MC">
							<Txt>Which of the following Sustainment services shows how cybersecurity services provided to customers are being protected?</Txt>
							<Response>
								<Txt>A.	MOAs/SLAs/Contracts</Txt>
							</Response>
							<Response>
								<Txt>B.	Cyberspace Defense Functional Level Policies/Procedures</Txt>
							</Response>
							<Response>
								<Txt>C.	Cyberspace Defense Technology Development, Evaluation, and Implementation</Txt>
							</Response>
							<Response>
								<Txt>D.	Sustainment Personnel</Txt>
							</Response>
							<Response>
								<Txt>E.	Security Administration</Txt>
							</Response>
							<Response valid="true">
								<Txt>F.	Cyberspace Defense Information Systems</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Cyberspace Defense Information Systems service shows how cybersecurity services provided to customers are being protected.</DfltCorrect>
								<DfltIncorrect>Incorrect. Cyberspace Defense Information Systems service shows how cybersecurity services provided to customers are being protected.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Which of the following Sustainment services ensures personnel receive technical training on cybersecurity tools that are deployed?</Txt>
							<Response>
								<Txt>A.	MOAs/SLAs/Contracts</Txt>
							</Response>
							<Response>
								<Txt>B.	Cyberspace Defense Functional Level Policies/Procedures</Txt>
							</Response>
							<Response>
								<Txt>C.	Cyberspace Defense Technology Development, Evaluation, and Implementation</Txt>
							</Response>
							<Response valid="true">
								<Txt>D.	Sustainment Personnel</Txt>
							</Response>
							<Response>
								<Txt>E.	Security Administration</Txt>
							</Response>
							<Response>
								<Txt>F.	Cyberspace Defense Information Systems</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Sustainment Personnel service ensures personnel receive technical training on cybersecurity tools.</DfltCorrect>
								<DfltIncorrect>Incorrect. Sustainment Personnel service ensures personnel receive technical training on cybersecurity tools.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Which of the following Sustainment services ensures data provided from CSPs is protected?</Txt>
							<Response>
								<Txt>A.	MOAs/SLAs/Contracts</Txt>
							</Response>
							<Response>
								<Txt>B.	Cyberspace Defense Functional Level Policies/Procedures</Txt>
							</Response>
							<Response>
								<Txt>C.	Cyberspace Defense Technology Development, Evaluation, and Implementation</Txt>
							</Response>
							<Response>
								<Txt>D.	Sustainment Personnel</Txt>
							</Response>
							<Response valid="true">
								<Txt>E.	Security Administration</Txt>
							</Response>
							<Response>
								<Txt>F.	Cyberspace Defense Information Systems</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Security Administration service ensures data from CSPs is protected. </DfltCorrect>
								<DfltIncorrect>Incorrect. Security Administration service ensures data from CSPs is protected. </DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Which of the following Sustainment services ensures cybersecurity services are staying current with existing threats and emerging technologies?</Txt>
							<Response>
								<Txt>A.	MOAs/SLAs/Contracts</Txt>
							</Response>
							<Response>
								<Txt>B.	Cyberspace Defense Functional Level Policies/Procedures</Txt>
							</Response>
							<Response valid="true">
								<Txt>C.	Cyberspace Defense Technology Development, Evaluation, and Implementation</Txt>
							</Response>
							<Response>
								<Txt>D.	Sustainment Personnel</Txt>
							</Response>
							<Response>
								<Txt>E.	Security Administration</Txt>
							</Response>
							<Response>
								<Txt>F.	Cyberspace Defense Information Systems</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Cyberspace Defense Technology Development, Evaluation, and Implementation ensure cybersecurity services are staying current with existing threats and emerging technologies within both the government and private sector.</DfltCorrect>
								<DfltIncorrect>Incorrect. Cyberspace Defense Technology Development, Evaluation, and Implementation ensure cybersecurity services are staying current with existing threats and emerging technologies within both the government and private sector.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Which of the following Sustainment services ensures how cybersecurity services are being provided to customers?</Txt>
							<Response valid="true">
								<Txt>A.	MOAs/SLAs/Contracts</Txt>
							</Response>
							<Response>
								<Txt>B.	Cyberspace Defense Functional Level Policies/Procedures</Txt>
							</Response>
							<Response>
								<Txt>C.	Cyberspace Defense Technology Development, Evaluation, and Implementation</Txt>
							</Response>
							<Response>
								<Txt>D.	Sustainment Personnel</Txt>
							</Response>
							<Response>
								<Txt>E.	Security Administration</Txt>
							</Response>
							<Response>
								<Txt>F.	Cyberspace Defense Information Systems</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Sustainment services include reviewing MOAs, SLAs, and contracts to ensure cybersecurity services are being provided as outlined in the MOAs and contracts.</DfltCorrect>
								<DfltIncorrect>Incorrect. Sustainment services include reviewing MOAs, SLAs, and contracts to ensure cybersecurity services are being provided as outlined in the MOAs and contracts.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Which of the following Sustainment services ensures information is properly sanitized before being shared with customers?</Txt>
							<Response>
								<Txt>A.	MOAs/SLAs/Contracts</Txt>
							</Response>
							<Response valid="true">
								<Txt>B.	Cyberspace Defense Functional Level Policies/Procedures</Txt>
							</Response>
							<Response>
								<Txt>C.	Cyberspace Defense Technology Development, Evaluation, and Implementation</Txt>
							</Response>
							<Response>
								<Txt>D.	Sustainment Personnel</Txt>
							</Response>
							<Response>
								<Txt>E.	Security Administration</Txt>
							</Response>
							<Response>
								<Txt>F.	Cyberspace Defense Information Systems</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Cyberspace Defense Functional Level Policies/ Procedures includes procedures for sanitizing information shared with customers to prevent unauthorized disclosure of classified information.</DfltCorrect>
								<DfltIncorrect>Incorrect. Cyberspace Defense Functional Level Policies/ Procedures includes procedures for sanitizing information shared with customers to prevent unauthorized disclosure of classified information.</DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<ShowText Page="disacndv204_35">
						<Txt frameNbr="9">Now try this.</Txt>
					</ShowText>
					<Sec508Data Page="disacndv204_35"></Sec508Data>
				</Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>Conclusion</Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title>Summary and Conclusion</Title>
					<Subtitle></Subtitle>
					<Filename>disacndv204_36</Filename>
					<PageNbr>36</PageNbr>
					<ShowText Page="disacndv204_36">
						<Txt frameNbr="5">Congratulations! You have completed the Principal Cybersecurity Services lesson.</Txt>
						<Txt frameNbr="127">You should now be able to identify the individual services that comprise cybersecurity services and the role that</Txt>
						<Txt frameNbr="302">cybersecurity service providers play in delivering cybersecurity services.</Txt>
					</ShowText>
					<Sec508Data Page="disacndv204_36"></Sec508Data>
				</Page>
			</Pages>
		</Topic>
	</Topics>
</Module>