Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Cyber Survivability Attributes: A Guide to Developing Secure Systems, Summaries of Cybercrime, Cybersecurity and Data Privacy

This document delves into the concept of cyber survivability attributes (csas) and their role in developing secure systems. It outlines the cyber survivability risk category (csrc) framework, a 5-step process for defining and achieving an acceptable level of cyber survivability. The document also explores various csas, including control access, reducing cyber detectability, securing transmission and communications, and managing system performance in the event of cyber events. It provides a comprehensive overview of the importance of csas in ensuring system resilience and mitigating cyber threats.

Typology: Summaries

2021/2022

Uploaded on 01/10/2025

michael-lopez-37
michael-lopez-37 šŸ‡ŗšŸ‡ø

1 document

1 / 404

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33
pf34
pf35
pf36
pf37
pf38
pf39
pf3a
pf3b
pf3c
pf3d
pf3e
pf3f
pf40
pf41
pf42
pf43
pf44
pf45
pf46
pf47
pf48
pf49
pf4a
pf4b
pf4c
pf4d
pf4e
pf4f
pf50
pf51
pf52
pf53
pf54
pf55
pf56
pf57
pf58
pf59
pf5a
pf5b
pf5c
pf5d
pf5e
pf5f
pf60
pf61
pf62
pf63
pf64

Partial preview of the text

Download Cyber Survivability Attributes: A Guide to Developing Secure Systems and more Summaries Cybercrime, Cybersecurity and Data Privacy in PDF only on Docsity!

CCYB002 Cybersecurity for Program Managers = Table of Contents

Lesson 1.0 Course Information

Welcome to Cybersecurity for Program Managers

We lco me to CCYB 002 Cybersec uri ty fo r Program Ma nagers

Table of Contents

CCYB002 Cybersecurity for Program Managers = T able of Contents

Lesson 1.0 Course Information

Navigation Instructions

These are im ages o f the bu tto ns y u se to navi ate t hrou h Long Description

The buttons requiring user action are re d circles with a pointer finger in the center. For images, the text beside the button reads "Click here to open image." For videos, the text bes i de the button reads "Select play button to start video." The "play button" is a white arrow insides a black square.

The Glossary button is present at the bottom of each page. It is a white rectangle with blue letters reading "G lossary."

Table of Contents

CCYB002 Cybersecurity for Program Managers = Table of Contents

Lesson 1.1 Cybersecurity for PMs

Intro Video

Long Description A sh ort in trod uction video welcoming the students to the cour se wi th no audio text ju st music in the background. Slide consist of the following: Cybersecurity for Program Ma na ge rs Credential Course, The Way Forward (Recognize and elimina te t hreats), Cybersecurity ( RMF Planned and Exe cuted) and Credential Training is now

Table of Contents

Table of Contents

While the state ment above is o bvi ously an exaggeration, t his ofte n feels like the case for the program manage r (PM). When it co mes to program cybersecurity, a PM d oes n't have to have all the answers but it is t ru e that he or she is res ponsible for the cybersecurity of their programs, system s, and informat ion.

This responsibility starts at the ea rli est phases of the program and continues through all aspects of design and development, including test and evaluatio n, contract ing, and eve ry aspect of purchasin g, and continues through de pl o ym ent and in to di sposa l.

CCYB002 Cybersecurity for Program Managers = Table of Contents

Lesson 1.1 Cybersecurity for PMs

Managing Risks

k : .. ~ .. ~ ~as to balance cost, schedule, and performance and execute a successful program. ~ he Risk Management image for more information

A PM has to balance cost, schedule, and performance and execu te a successful program.

Execution of a success ful program has a great deal to do wi th managing risks. Cybersecurity risks are some of the greatest you will face. In addition to financial loss, cybersecurity risks may include data brea ches/loss of data, cyber es pi onage, and denial of service attacks, among others. From the threat lesso n, to the risk management framewo rk lessons, to test lessons, to the contracting lessons, t his course will aid the PM in bette r managing and mi tigat in g risks.

CCYB002 Cybersecurity for Program Managers = Table of Contents

Lesson 1.1 Cybersecurity for PMs

Developing Survivable Systems

As a PM your pro gram mu st opera te in a cyber co ntested environment.

Cybersecurity t hreats co ntinue to grow and acquisition programs are ofte n ill pre pared to combat them. This lesson will give you a b ette r understanding of t he t hreats and help you develo p cybersec urity re quirements.

We will ident ify how the re quired JCIDS System Survivability Key Pe r fo rmance Parameter (KPP) co ntributes to achievin 6 a Survivable System. The Cyber Survivabili ty Endorsement (CSE) wa s added to the Joint Capabilities In tegration and Develo pm ent System (JCIDS), System Survivability Key Pe r fo rmance Pa ram ete r (SS KPP) and kept wi thin PM's operat ional risk t rade space decisions. In this module you'll co mpl ete a CSE and w o rk t hrou gh a scenario using the principl es of Prevent, Mitigate and Recover.

Table of Contents

Table of Contents