-
Q: What is a 'Tier V-VI' attacker?A: A state actor able to invest billions of dollars and years of time to create vulnerabilities in systems.
-
Q: What is the 'Red Queen' hypothesis?A: The concept that the defender must expend all effort just to stay in the same relative place against an evolving adversary.
-
Q: What is an 'Existential Cyber Attack'?A: An attack capable of causing sufficient wide-scale damage for the government to potentially lose control of the country.
-
Q: What is 'Resilience' defined as in this report?A: The ability to provide acceptable operations despite disruption: natural or man-made, inadvertent or deliberate.
-
Q: What is the 'Gold Standard' for restoration?A: Restoring a system to a known, trusted state.
-
Q: Why is 'Defense-only' considered a failed strategy?A: Because it is impossible to fully defend against Tier V-VI threats; deterrence and resilience are also required.
-
Q: What is the 'Cyber Threat Taxonomy'?A: A hierarchy dividing threats into Tiers I-VI based on skill level and resources.
-
Q: What is 'Cyber Critical Survivable Mission'?A: A specific force or capability segmented and hardened to ensure mission execution in a cyber-stressed environment.
-
Q: What is the recommendation regarding Nuclear Strike?A: Protect the nuclear strike capability to ensure it remains a credible deterrent against existential cyber attacks.
-
Q: What are the three parameters of Cyber Risk defined in the report?A: Threat (Intent/Capability), Vulnerabilities (Inherent/Introduced), and Consequences (Fixable/Fatal).
Ask a question
Have a doubt or need clarification?
I’m here to help. Share your question, and I’ll get back to you with the guidance you need regarding the course.
Thank you!
I have received your message and I shall get back to you shortly.