gptkbp:instanceOf
|
cybersecurity program
|
gptkbp:administeredBy
|
gptkb:U.S._Department_of_Defense
|
gptkbp:appliesTo
|
DoD contractors
DoD information systems
DoD personnel
|
gptkbp:collaboratesWith
|
gptkb:Federal_Bureau_of_Investigation_(FBI)
gptkb:National_Security_Agency_(NSA)
gptkb:Department_of_Homeland_Security_(DHS)
private sector partners
international allies
|
gptkbp:focusesOn
|
protection of Department of Defense information systems
|
gptkbp:goal
|
ensure confidentiality, integrity, and availability of DoD information systems
|
https://www.w3.org/2000/01/rdf-schema#label
|
DoD Cybersecurity
|
gptkbp:includes
|
training
risk management
controls
continuous monitoring
incident response
policies
procedures
|
gptkbp:monitors
|
gptkb:Defense_Information_Systems_Agency_(DISA)
gptkb:U.S._Cyber_Command
|
gptkbp:protectedBy
|
gptkb:controlled_unclassified_information_(CUI)
classified information
unclassified information
|
gptkbp:regulates
|
gptkb:DoD_Instruction_8510.01
gptkb:Federal_Information_Security_Modernization_Act_(FISMA)
gptkb:NIST_SP_800-53
gptkb:DoD_Instruction_8500.01
|
gptkbp:relatedTo
|
gptkb:Risk_Management_Framework_(RMF)
gptkb:Cybersecurity_Maturity_Model_Certification_(CMMC)
|
gptkbp:requires
|
security clearances
continuous monitoring
incident reporting
cybersecurity training
|
gptkbp:threats
|
gptkb:advanced_persistent_threats_(APTs)
malware
phishing
insider threats
cyber attacks
|
gptkbp:uses
|
encryption
firewalls
intrusion detection systems
multi-factor authentication
patch management
security audits
network segmentation
access controls
vulnerability scanning
incident response plans
|
gptkbp:bfsParent
|
gptkb:JRSS
gptkb:Joint_Regional_Security_Stack_-_Cyber
gptkb:DoD_Identity_and_Access_Management
|
gptkbp:bfsLayer
|
7
|