Definitions | CDI or Not? | Compliance | Fun Facts About CDI... | Random Trivia |
---|---|---|---|---|
Within 72 hours
What does rapidly report mean?
|
NO
Email communications with the government
|
December 31, 2017
When should we implement NIST SP 800-171 by?
|
National Archives
What Agency was tasked with developing a plan for CDI?
|
Who is the Chief of Naval Operations?
While serving in the Navy, Bob worked to support this Naval Officer.
|
Physical devices or writing surfaces including, but is not limited to, magnetic tapes, optical disks, magnetic disks, large-scale integration memory chips, and printouts onto which covered defense information is recorded, stored, or printed within a covered contractor information system
What does Media mean?
|
Yes
Technical Specifications
|
YES
Are we allowed to have an alternative, but equally effective, security measure implemented in its place?
|
Executive Order 13556
What executive order initiated CDI requirements?
|
What is Russian?
Kevin studied this language in college.
|
Disclosure of information to unauthorized persons, or a violation of the security policy of a system, in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object, or the copying of information to unauthorized media may have occurred.
What does Compromised mean?
|
Yes
Budgets
|
90 Days
How many days do you have to report a cyber incident
|
FOUO or Distribution Statement
What markings does DoD require for CDI?
|
What is the same high school?
Bob, David Martin, Luke Lighthizer and Todd Drake share this in common.
|
Computer software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. This definition includes a virus, worm, Trojan horse, or other code-based entity that infects a host, as well as spyware and some forms of adware.
What does Malicious Software mean?
|
YES
CPARS
|
DoD Chief Information Officer (CIO), via email at [email protected].
Who do we need to inform within 30 days of contract award, of any security requirements specified by NIST not implemented at the time award?
|
Controlled Unclassified Information
What does DoD call CDI?
|
What is Virginia Tech?
Adrian Allen, John Tyreman, and Tracy all graduated from this prestigious Virginia school.
|
Protective measures that are commensurate with the consequences and probability of loss, misuse, or unauthorized access to, or modification of information
What does Adequate Security mean?
|
NO
Contract.
|
Ensure that the cloud service provider meets security requirements equivalent to those established by the Government for the Federal Risk and Authorization Management Program (FedRAMP) Moderate baseline.
What do you need if you intend to use an external cloud service provider to store, process, or transmit any covered defense information –
|
2016
What year was DFAR Safeguarding Covered Defense Information and Cyber Incident Reporting last updated?
|
What is The Family Channel?
Corren worked with Tracy before coming to G2 Ops at both Regent University and at this company.
|