Cybersecurity Awareness CI130.16

[Access this course*]

*Note - You are accessing this web-based training course outside of STEPP. Your course completion will not be reflected in your training transcript within the STEPP Learning Management System.

Description: The course introduces the automated information systems (AIS) environment and the threats and vulnerabilities faced when working within the government or defense industrial systems. It provides a working knowledge of cyber intrusion methods and cybersecurity countermeasures to assist employees in preventing cyber attacks and protecting their systems and information.

The user experience centers on a single large-scale disastrous event. Several contributing scenarios are presented to show different vantage points related to the large event. Through the large event and associated contributing scenarios, students learn about different cyber threats and methods of operation, targeted information, countermeasures, and reporting requirements. This approach demonstrates for users that seemingly small events can contribute and lead to immeasurable consequences.

References:

  1. a. DoD Directive 5240.06, "Counterintelligence Awareness and Reporting," Enclosure 4, Table 3: Reportable Foreign Intelligence Entity (FIE)-Associated Cyberspace Contacts, Activities, Indicators, and Behaviors
  2. b. DSS Cybersecurity tri-fold brochures (10-06-10_Cyber_Security.pdf and cyber_security_Tri-fold.pdf)
  3. c. Industrial Security Letter 2010-02
  4. d. National Industrial Security Program Operating Manual, Section 301: Reporting Requirements for Cyber Intrusions

Course Objectives:

  1. a. Identify the key indicators of the cyber threat:
    • - Spear phishing and spoofed emails
    • - Emails with malicious links or attachments
    • - Stolen logon credentials
    • - Use of weak or default passwords
    • - Unpatched or outdated software vulnerabilities
    • - Removable media
    • - Website vulnerabilities
  2. b. Identify countermeasures to safeguard against cyber threats
  3. c. Recognize the types of suspicious cyber events and behaviors that should be reported and identify how to report them

Length: 30 minutes

Target Audience: DoD and Industrial Security employees

Clearance Requirements: None

Prerequisites: None

Requirements: None – Awareness Only

System Requirements: Internet Explorer 6.0, Flash Player 8, Internet bandwidth connection (DSL or better), Display 1024 x 768, Audio (16-bit sound card), Adobe Acrobat Reader 7.0.

Notes: Contact Counterintelligence.training@dss.mil for more information.

CDSE courses are intended for use by Department of Defense and other U.S. Government personnel and contractors within the National Industrial Security Program.