Cyber Operations Capabilities, Networking and Infrastructure
Policy, Security, Authority
Authority, Security, Law
Law, Authority, Policy
Security, Policy, Law
Title 10
Title 30
Title 50
Title 52
Integrated Network Operations Security Center (I-NOSC)
Base Defense Operations Center
624th Operations Center
Air Operations Center
Information Management
Network-centric warfare
Information Superiority
Information Operations
Careful planning
Reactive operations
Immediate response
Information Operations
Electronic attack
Electronic protection
Network Exploitation
Electronic warfare support
EW concerns radiated energy
CNO concerns radiated energy
EW is only used for offensive purposes
CNO is only used for defensive purposes
Computer Forensics
Incident Prevention
Incident Detection
Incident Response
Defense-in-Depth
Proactive Defense
Situational Awareness
Network Standardization
Supervisory System
Remote Terminal Unit
Human Machine Interface
Programmable Logic Controller
Supervisory System
Remote Terminal Unit
Human Machine Interface
Programmable Logic Controller
Virus
Spam
Spyware
Phishing
Patches
Antivirus
Software removal
Vulnerability scanner
Token
Biometrics
Multifactor
Knowledge-based
Token
Biometrics
Multifactor
Knowledge-based
Intrusion Detection and Prevention Systems
End-to-End Performance Monitoring
Vulnerability scanners
Capacity Planning
Wing Commander
Authorizing Official
Wing information security office (WIAO)
Communications and Information systems officer (CSO)
Only full costs
Recommended course of action only
Full cost and recommended course of action
Full cost, recommended course of action, and security requirements
Wait!
Here's an interesting quiz for you.