DoD Cybersecurity

GPTKB entity

Statements (54)
Predicate Object
gptkbp:instanceOf cybersecurity program
gptkbp:administeredBy gptkb:U.S._Department_of_Defense
gptkbp:appliesTo DoD contractors
DoD information systems
DoD personnel
gptkbp:collaboratesWith gptkb:Federal_Bureau_of_Investigation_(FBI)
gptkb:National_Security_Agency_(NSA)
gptkb:Department_of_Homeland_Security_(DHS)
private sector partners
international allies
gptkbp:focusesOn protection of Department of Defense information systems
gptkbp:goal ensure confidentiality, integrity, and availability of DoD information systems
https://www.w3.org/2000/01/rdf-schema#label DoD Cybersecurity
gptkbp:includes training
risk management
controls
continuous monitoring
incident response
policies
procedures
gptkbp:monitors gptkb:Defense_Information_Systems_Agency_(DISA)
gptkb:U.S._Cyber_Command
gptkbp:protectedBy gptkb:controlled_unclassified_information_(CUI)
classified information
unclassified information
gptkbp:regulates gptkb:DoD_Instruction_8510.01
gptkb:Federal_Information_Security_Modernization_Act_(FISMA)
gptkb:NIST_SP_800-53
gptkb:DoD_Instruction_8500.01
gptkbp:relatedTo gptkb:Risk_Management_Framework_(RMF)
gptkb:Cybersecurity_Maturity_Model_Certification_(CMMC)
gptkbp:requires security clearances
continuous monitoring
incident reporting
cybersecurity training
gptkbp:threats gptkb:advanced_persistent_threats_(APTs)
malware
phishing
insider threats
cyber attacks
gptkbp:uses encryption
firewalls
intrusion detection systems
multi-factor authentication
patch management
security audits
network segmentation
access controls
vulnerability scanning
incident response plans
gptkbp:bfsParent gptkb:JRSS
gptkb:Joint_Regional_Security_Stack_-_Cyber
gptkb:DoD_Identity_and_Access_Management
gptkbp:bfsLayer 7