




























































































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
This document delves into the concept of cyber survivability attributes (csas) and their role in developing secure systems. It outlines the cyber survivability risk category (csrc) framework, a 5-step process for defining and achieving an acceptable level of cyber survivability. The document also explores various csas, including control access, reducing cyber detectability, securing transmission and communications, and managing system performance in the event of cyber events. It provides a comprehensive overview of the importance of csas in ensuring system resilience and mitigating cyber threats.
Typology: Summaries
1 / 404
This page cannot be seen from the preview
Don't miss anything!
Lesson 1.0 Course Information
Welcome to Cybersecurity for Program Managers
We lco me to CCYB 002 Cybersec uri ty fo r Program Ma nagers
Table of Contents
Lesson 1.0 Course Information
Navigation Instructions
These are im ages o f the bu tto ns y u se to navi ate t hrou h Long Description
The buttons requiring user action are re d circles with a pointer finger in the center. For images, the text beside the button reads "Click here to open image." For videos, the text bes i de the button reads "Select play button to start video." The "play button" is a white arrow insides a black square.
The Glossary button is present at the bottom of each page. It is a white rectangle with blue letters reading "G lossary."
Table of Contents
Lesson 1.1 Cybersecurity for PMs
Intro Video
Long Description A sh ort in trod uction video welcoming the students to the cour se wi th no audio text ju st music in the background. Slide consist of the following: Cybersecurity for Program Ma na ge rs Credential Course, The Way Forward (Recognize and elimina te t hreats), Cybersecurity ( RMF Planned and Exe cuted) and Credential Training is now
Table of Contents
Table of Contents
While the state ment above is o bvi ously an exaggeration, t his ofte n feels like the case for the program manage r (PM). When it co mes to program cybersecurity, a PM d oes n't have to have all the answers but it is t ru e that he or she is res ponsible for the cybersecurity of their programs, system s, and informat ion.
This responsibility starts at the ea rli est phases of the program and continues through all aspects of design and development, including test and evaluatio n, contract ing, and eve ry aspect of purchasin g, and continues through de pl o ym ent and in to di sposa l.
Lesson 1.1 Cybersecurity for PMs
Managing Risks
k : .. ~ .. ~ ~as to balance cost, schedule, and performance and execute a successful program. ~ he Risk Management image for more information
A PM has to balance cost, schedule, and performance and execu te a successful program.
Execution of a success ful program has a great deal to do wi th managing risks. Cybersecurity risks are some of the greatest you will face. In addition to financial loss, cybersecurity risks may include data brea ches/loss of data, cyber es pi onage, and denial of service attacks, among others. From the threat lesso n, to the risk management framewo rk lessons, to test lessons, to the contracting lessons, t his course will aid the PM in bette r managing and mi tigat in g risks.
Lesson 1.1 Cybersecurity for PMs
Developing Survivable Systems
As a PM your pro gram mu st opera te in a cyber co ntested environment.
Cybersecurity t hreats co ntinue to grow and acquisition programs are ofte n ill pre pared to combat them. This lesson will give you a b ette r understanding of t he t hreats and help you develo p cybersec urity re quirements.
We will ident ify how the re quired JCIDS System Survivability Key Pe r fo rmance Parameter (KPP) co ntributes to achievin 6 a Survivable System. The Cyber Survivabili ty Endorsement (CSE) wa s added to the Joint Capabilities In tegration and Develo pm ent System (JCIDS), System Survivability Key Pe r fo rmance Pa ram ete r (SS KPP) and kept wi thin PM's operat ional risk t rade space decisions. In this module you'll co mpl ete a CSE and w o rk t hrou gh a scenario using the principl es of Prevent, Mitigate and Recover.
Table of Contents
Table of Contents