UNCLASSIFIED/FOUO Defensive Cyberspace Workforce Study IPT #1 March 4, 2010 Phil Ventura OPNAV N81F Information Dominance FY-10 Studies Overall Classification of this brief is UNCLASSIFIED//FOUO UNCLASSIFIED/FOUO Pre-decisional – Not for release without N81 approval Draft UNCLASSIFIED/FOUO Agenda • Study Plan • Task Framework • Way-ahead UNCLASSIFIED/FOUO Pre-decisional – Not for release without N81 approval Draft UNCLASSIFIED/FOUO Objectives • • Issue – The Joint Staff has a working framework to establish how many people are required for Computer Network Exploitation and Computer Network Attack. However, a corresponding defensive cyberspace framework doesn’t exist. How may personnel does the Navy need for defensive cyberspace? Objectives – Document the Navy requirements for defending cyberspace in the functional areas of Network Operations (NETOPS), Computer Network Defense (CND), and Information Assurance (IA) – Document where the requirements should be done – Decompose the steps and skills needed to meet the requirements including where they should be done – Determine how much one person can do as a functional skill and longevity at each location for each requirement – Show how new approaches or planned technologies can reduce personnel required – Make recommendations for the number and type of cyberspace defenders the Navy needs Resource issues that this study is designed to illuminate: 1. Navy Total Force Manpower Mix required for IA, NETOPS, and CND 2. MPT&E changes necessary to mitigate threats 3. Material changes necessary to mitigate threats UNCLASSIFIED/FOUO Pre-decisional – Not for release without N81 approval Draft UNCLASSIFIED/FOUO Background [This slide intentionally blank.] UNCLASSIFIED/FOUO Pre-decisional – Not for release without N81 approval Draft UNCLASSIFIED/FOUO Scope Scope • Focus on Navy CND, IA, and NETOPS manpower requirements – Network Operations: Configuring and operating our networks. – Information Assurance: Ensuring information availability, integrity, authentication, confidentiality and non-repudiation. – Computer Network Defense: Protect, detect and respond functions in securing DoD information systems and networks. Cyberspace Operations Computer Network Exploitation (CNE) Computer Network Defense (CND) Network Operations (NetOps) Computer Network Operations (CNO) Computer Network Attack (CNA) Information Assurance (IA) Source: Computer Network Exploitation and Attack UNCLASSIFIED/FOUO Manpower Requirements, JROC Briefing, 15 July 2009 Pre-decisional – Not for release without N81 approval Source: Cyber Warfare Manpower Strategy, OPNAV N1, January 2010 Draft UNCLASSIFIED/FOUO Study Approach Data Collection Requirements Game Changing* Approaches Instructions # of Networks Active Defense CTOs Type of Networks Future Technologies Regular Duties Ownership of Networks Standup of CYBERCOM Red Teams Etc. and 10th Fleet Blue Teams Etc. Hunt Teams Personnel skill sets required CNE Officers in IW, Intel, IP CND/RA CT, IT, IS enlisted rates required Acquisition Chain protection Civilians Etc. Contractors Other applicable military Final Analysis Recommend the number and type of cyberspace defenders the Navy needs Defended Networks Modeling/Analysis • Evaluate how the game changing approaches or technologies would affect personnel required • Model personnel requirement to realworld scenarios developed for this study Understand the Current Problem • Decompose the steps and skills needed to meet requirements • Document where the requirements should be done (Tier 1, 2, 3, etc.) • Determine how much one person can do as a function of skill and longevity on station • Document what type of person (Navy designator, rate, NEC, Civilian, Contractor) fits the skill set required • Ensure the revisit rate to each network to be effective for each requirement is included (e.g. Blue Team, Red Team, Hunt Teams) • Factor in training pipeline requirements * Game Changing = Substantial reduction or addition of personnel required or shift in mission focus or approach UNCLASSIFIED/FOUO Pre-decisional – Not for release without N81 approval Draft UNCLASSIFIED/FOUO Approach FFC Ashore Afloat C2F SIPR NIPR C3F SIPR NIPR SIPR NIPR C4F SIPR NIPR C5F SIPR NIPR C6F C7F SIPR NIPR FCC / C10F IA IA IA IA IA IA IA NETOPS NETOPS NETOPS NETOPS NETOPS NETOPS NETOPS CND CND CND CND CND CND CND MIL/CIV/CTR MIL/CIV/CTR MIL/CIV/CTR MIL/CIV/CTR MIL/CIV/CTR MIL/CIV/CTR CBCA-MOC Data Elements being added to TWMS Naval War College CBCA Booz Allen Hamilton 9 Final Analysis & Reporting UNCLASSIFIED/FOUO Stakeholder Workshops Capability Analysis Understanding the Problem Pre-decisional – Not for release without N81 approval Data Collection MIL/CIV/CTR Navy NETWARCOM Navy CYBERFOR IO, Space, Comms Norfolk, VA Navy Information Operations Commands (NIOCs) (10) IO, SIGINT Various CONUS/OCONUS Navy Cyber Defense Operations Command (NCDOC) CND Norfolk, VA Navy Computer & Telecom Area Master Station (NCTAMS) NETOPS Various CONUS/OCONUS Draft Approach (cont.) 1 Mar 4 Data Collection Key Activities Inputs ✔• NSPD 54/HSPD 23 ✔• USCYBERCOM Implementation Plan ✔• CNO NMETLS ✔• NWP-3-63 driving ✔• Review strategy and directives and Develop ✔• Identify Navy Cyber Capability Statements Output ✔ • Establish Stakeholders and participant list • Navy Cyber Capability Requirements and Tasks ✔• Comprehensive Terms of Reference and Study Plan UNCLASSIFIED 2 Understanding The Problem Apr 1 3 Capability Analysis 4 May 1 Stakeholder Wargame • Navy Cyber Capability Statements • Selected Navy Cyber Scenarios • Scenarios • Study Plan • Mission Analysis • Workforce Requirements WS#1 • Establish Stakeholder teams to include Red and Blue teams • Design Scenarios at different Cyber Threat Levels • Map Capabilities and Tasks to Scenarios • Identify supporting and supported task relationships • Establish performance standards (MOP/MOE) • Identify competency requirements for each task • Tasks aligned to operational and tactical units •Competencies Required •Roles Defined •Longevity of Personnel Required May 27 Final Analysis & Reporting • Wargame AAR • Capabilities and Task List WS#2 • Validate workforce requirements • Select future tasks and mission requirements by timeframe • Prioritize workforce gaps and shortfalls • Scale workforce requirements • ID “Game Changing” Technologies • Operational View Workforce Architecture descriptions of Requirement by each scenario Scenario/Role: 5 • Wargame after action report (AAR) WS#3 • Manpower Gap Analysis • Develop total workforce requirement recommendation • Identify cross training and performance efficiencies from across the Information Dominance Corps • Describe impact of “Game Changing” technologies • Comprehensive Navy Cyber Workforce Recommendation • Roles & Billet information in TWMS •Skill Proficiency required •Bold items are deliverables •Recommended personnel composition •Facilitated Workshop 8 Approach (cont.) 9 UNCLASSIFIED/FOUO IPT / Study Team OPNAV N1/NPC/PERS • Mr. Dave Smith, N112 • CAPT Boticario, N122 • CDR Maurice Fischer, N122 – Requirements Officer • CDR Don Wilkinson, N131D – Head, Officer Force Shaping • Mr. Ralph DeFalco – IDC MPT&E Strategies • CDR Sean Heritage – IW OCM OPNAV N2/N6 • CAPT John Post – Head, Cyber Branch • CAPT Michael Ortwein • CAPT(s) Mickey Batson • CDR Theresa Everette • CDR Joe Brennan • LCDR Ken Gregoire – IA & CND SPAWAR / PEO(C4I) • Mr. Ken Bible • Mr. Ted Follas • Mr. Chris Newborn OPNAV N814 • CDR Karan Schriver UNCLASSIFIED/FOUO • CDR Sue Himes – N2/N6 IDC Manpower • CDR Carri Robbins – Intelligence OCM • CDR Julie Schroeder – IP OCM • LCDR Stacy Bowman – ECM (IT, CT, IS) • LCDR Ken Matthias – Intelligence ECM • LCDR Joey Harrison • LCDR Zimmerman – N2N6 Manpower • Sue Prose – NNWC NNWC • CAPT Len Abbatiello • CAPT Eric Exner • CAPT Craig Eaton • CDR Stone Davis • CDR Vanessa Hamm CID • Mr. Sam Kelly, N31 USFF • CAPT Teresa Fairbanks, N1 • CAPT Rich Saunders, N2/N3 • Ms. Jane Barclift, N1D • LCDR Ashley Rose, N2 • Mr. James Cooney, N9 PACFLT • CAPT Jean Benfer, N2 • Ms. Linda Newton, N6 C10F • CAPT Jim Brokaw, N3 • CAPT Daryl Hancock, N2 • CDR Stone Davis Navy CYBERFOR • Mr. Mike Knight, IA Wkforce • CWO4 Greg Stone NIOC Hawaii • CAPT James Hagy, CO • Mr. Noah Smith, N9 NCDOC • CAPT Stephanie Keck, CO OPNAV N095/CNRFC • CAPT Bill Carney • CAPT Carlisle Wilson NCIS • CAPT Gus Otero Naval War College • Prof. Rich Suttie Pre-decisional – Not for release without N81 approval DOD DIAP • Mr. Steve Bush DON CIO • Mr. Chris Kelsall • Ms. Mary Purdy • Ms. Jennifer Harper ASN(M&RA) • Mr. Rich Delaquis ASD(NII) • Ms. Sandy Smith SECNAV OPA • LCDR Vic Spears NSA • Ms. Michele Iverson – IA Campaign Mgr. • Mr. Keith Denton NTOC • Mrs. Patricia Ihnat, Deputy CYBERCOM • Mr. Rob Schrier, Dep. J33 Booz Allen Study Team • Mr. Scott Gooch (PM) • Mr. Bob Breitbeil (Lead) • Mr. Gerald Williams (Cyber) • Mr. Gene Marc (Cyber) • Mr. Mark Monti (CBCA) • Ms. Erin Kordis (CBCA) • Mr. Jim Monahan (HCS) • Ms. Liz Fairweather (M&S) Draft UNCLASSIFIED/FOUO Study Plan and Terms of Reference • Study Plan (4 Phases) – – – – Data Collection and Framework Development (3 weeks) Scenario Process, Roles & Competencies, and Surveys (4 weeks) Workforce Analysis and Game Changing Technologies (4 weeks) Final Analysis (3 weeks) • Terms of Reference – Strategy-to-Task Mapping Terminology – Capabilities-Based Competency Assessment Terminology – NETOPS, CND, IA Definitions UNCLASSIFIED/FOUO Pre-decisional – Not for release without N81 approval Draft UNCLASSIFIED/FOUO Plan of Action and Milestones FEB MAR APR MAY Week 1 Week 2 Week 3 Week 4 Week 1 Week 2 Week 3 Week 4 Week 1 Week 2 Week 3 Week 4 Week 1 Week 2 Week 3 Week 4 POM 12 Timeline IPT IPT Kick-off N81F Timeline Kick -off Deliverables Study Plan WS AAR Reqmt & Tasks DUE 2/15 Develop OV-4 for key organizations Virtual Review of Role Framework 2/15 Competency Workshop Rehearsal Develop draft OV-6C diagrams for 3 2/19 scenarios: Task mapping to scenarios 2/25 IPT/Workshop #1: Roles/Competencies/Skills (3 Days) 2/26 on- Map Training to Competencies going Review/Finalize Core Competency 2/26 Data Survey Development IPT/Workshop #2: OV-6C Review 3/2 (Full-Day) 3/2 ✔ ✔ ✔ ✔ Identify SMEs (criteria, geographic regions, event coordinator) Write scenarios (x3) Develop role framework for NETOPS/CND/IA IPT Review of Study Plan & STT ✔ Legend: POM Events Study Events UNCLASSIFIED/FOUO PLANNED Mid-course Review OV-6c Scenario Process, Roles & Competencies, and Surveys Data Collection / Framework Development Methodology Development Meeting Conduct Literature Review (National/DOD/Navy directives) Study Plan/TOR Development Conduct Strategy-to-Task Analysis: Task Binning Collect baseline manpower data for key nodes (AMDs, TWMS) IPT Sponsor Program Proposals IPT IPT Initial Results W/F Reqmt Workforce Analysis and Game Changing Technologies DUE 3/10 3/11 3/16 3/23 3/23 to 3/25 3/29 3/30 4/1 4/1 Administer survey to all key organizations (Includes short VTC instruction period) Revise OV-6Cs IPT: Identify Game-Changing Technologies (2-3 Hours: future systems/vulnerabilities and role impacts) Review/Process Survey results (clean data/initial database creation) Generate initial manpower requirements based on roles Map Game-Changing Impacts to Roles IPT/Workshop #3 (Full-day): Validate workforce requirements based on role/scenarios; gap analysis; gamechanging impact analysis Sponsor Program Proposals Integrated Program Assessment IPT Final Brief and Report Final Analysis DUE 4/7 Revise workforce requirements based on workshop feedback 4/14 Develop manpower 4/15 deliverables for Final Report (Database, Key Survey Findings, Workforce 4/21 gaps/excesses) Integrate results from all 4/28 phases into Final Report Request TWMS submission 4/29 IPT Final Brief-out: 5/5 Comprehensive Navy Cyber Workforce Requirements DUE 5/12 5/14 5/21 5/24 5/27 3/4 IN PROGRESS COMPLETED LATE Pre-decisional – Not for release without N81 approval Draft UNCLASSIFIED/FOUO Strategy-to-Task Framework Strategic Objectives CONDUCT NETOPS: CONDUCT INFORMATION CONDUCT IA PROCEDURES: ASSURANCE PROCEDURES: PROTECT PROTECT Establish a secure network CONDUCT NETOPS: DEFEND NETWORK: MONITOR/ANALYZE/DETECT MONITOR/ANALYZE/DEFEND Ensure Operation Capabilities RESPOND Ensure Operation Capabilities Identify and Mitigate Intrusions Establish a secure network Net Centric, Force Application/ Engagement, Protection, Command and Control (Capabilities required to Operate, Secure, and Defend the GIG) JCA UJTL NMETL OP 5.6.5.3 Conduct CND NTA 5.5.5 Perform Information Assurance SN 5.5.5 Defend the GIG NTA 2.4.4.1 Identify Issues and Threats ST 5.1.6 Establish IA Procedures SN 2.4.1 Evaluate, Integrate, Analyze and Interpret Information ST 5.5.7.3 Direct CND NTA 5.2 Analyze and Assess Information ST 5.1.2.3 Manage Information Assurance Policies OP 5.4.7 Integrate Computer Investigations & Operations in CND NTA 3.1.6.X Develop Cyber CounterTargeting Plans NTA 2.4.5.3 Provide Indications & Warning of Threat OP 5.3 Prepare Plans and orders NTA 5.5.5.1 Provide Computer Network Defense NTA 5.5.X Conduct Incident Response Management Operational Activities & Processes Verify Security controls Identify database Security concerns Analyze Packet Headers Identify Access Control List Maintain/ Troubleshoot System Re-image affected systems Develop Intrusion Detection Signatures Implement INFOSEC Detect Malicious Activity on Network Implement Network Firewall Analyze/ Audit System logs Analyze File System Timelines Analyze Incident for Intelligence value Perform virus scans Validate Network Intrusion incident Perform Forensic Analysis UNCLASSIFIED/FOUO Pre-decisional – Not for release without N81 approval Draft UNCLASSIFIED/FOUO References • NSPD-54/HSPD-23, Cybersecurity Policy, Jan 8, 2008 (TS) USCYBERCOM Implementation Plan CNO NMETLS NWP 3-63, CNO, Jan 2008 JROCM 023-09 Cyberspace Operations Way Ahead Navy Strategic Plan in support of POM-12, 09 Oct 2009 FY2011-2015 Guidance for the Development of the Force, Jul 28, 2009 DoDD O-8530.1, CND, Jan 8, 2001 DoDI O-8530.2, Support to CND, Mar 9, 2001 DoDI 8500.1, IA, Oct 24, 2002 DoDI 8500.2, IA Implementation, Feb 6, 2003 DoDM 8570.01-M, IA Workforce Improvement Program, May 15, 2008 CJCSI 6510.01E, IA and CND, Aug 15, 2007 SECNAVINST 5239.3a, DON IA Policy, Dec 20, 2004 Naval Studies Board, IA for Network Centric Naval Forces Cyber Warfare Manpower Strategy, OPNAV N1, Jan 20, 2010 Cyberspace Defense Study, OPNAV N81, Oct 29, 2009 CNO Tasker, Health of Navy Networks – Operational & Tactical Networks, OPNAV N6, Oct 21, 2009 CND Increment 2 CPD, Nov 23, 2009 CNE/CNA Manpower Requirements, FS FCB, JROC Briefing, Jul 15, 2009 USSTRATCOM & USJFCOM Final Report for the Cyberspace Operations (Manning) Objective Experiment, Feb 12, 2009 USSTRATCOM and NSA/CSS Cyber DCR, Oct 8, 2008 USSTRATCOM Operational Concept for Cyberspace, Apr 10, 2008 DI-1577-37-07, Information Operations Capstone Threat Assessment, Apr 2007 ONI-CTA-005-06, Naval Electronics, Navigation, and Network Systems Capstone System Threat Assessment, Sep 2006 USSTRATCOM, CND ICD, Jul 14, 2004 N2/N6 Cyber Roadmap UNCLASSIFIED/FOUO Pre-decisional – Not for release without N81 approval Draft UNCLASSIFIED/FOUO Way Ahead Study Plan & Task Framework • Comments by 10 March Workshop #1, 23-25 March • Scenario Development • Role Framework Development UNCLASSIFIED/FOUO Pre-decisional – Not for release without N81 approval Draft UNCLASSIFIED/FOUO BACKUP UNCLASSIFIED/FOUO Pre-decisional – Not for release without N81 approval Draft UNCLASSIFIED/FOUO Assessing Strategic Guidance DoD, Joint, and Navy Guidance National Guidance National Military Strategy for Cyber Operations • Strategic approach to use Cyberspace to ensure Military Strategic superiority in Cyber domain DOD DoD Information Management and Information Technology Strategic Plan (20082009) • Provide timely access to authoritative, relevant, trusted, and actionable information for all authorized users • Support national security missions by sharing information with DoD and external partners • Enable assured information sharing across domains and Communities of Interest • Ensure that capabilities support the information assurance needs of the netcentric vision • Streamline and unify foundational information assurance processes across the DoD and Intelligence Community enterprises Operation ** ( Apr 2009) • Establishes USSTRATCOM as responsible entity to direct GIG Operations and Defense • Shifts operational focus from individual to enterprise framework across enclaves centralizing planning and decentralizing execution • Establishes operations and capabilities within the Six Phase Campaign process via established “Pillars” and Lines of Operations (LOOs) DoD 8570.01M IA Workforce Improvement Program • Identifies Workforce & Capability level requirements JOINT USSTRATCOM and NSA/CSS Cyber DCR ( Oct 2008) • Continue development of Cyberspace as a mission area through enhanced capability, intelligence, acquisition, and interagency coordination • Identify shortfalls to address a clear solutions matrix Final Report for Cyber OPS Manning Limited Objective Experiment (Feb 2009) • Study assigned objective to determine manning requirements for the conduct of CNA/CNE in support of COCOM operations Operational Concept for Cyberspace ( Apr 2008) • Addresses vision for achieving Cyberspace dominance through development of new capabilities, C2 relationships, organizational constructs, training, and policy NAVY Navy Strategic Plan (NSP-12) • Provides CNO strategic guidance for effective resource acquisition and allocation for projection of Century Seapower (CS-21) initiatives addressing shortfalls and projected future conflicts NWP 3-63 Computer Network Operations Vol I • • Overview of Computer Network Operations and its respective disciplines and their Supporting roles within the Information Operations domain Naval Network Warfare Command Instruction 5450.4A • Describes Missions, Functions, and Tasks (MF&T) for Computer Network Defense operations at Navy Cyber Defense Operations Command (NCDOC) FLT Cyber Command/ 10th FLT Implementation Plan • • Way Ahead to conduct operations in Cyberspace leveraging NSA and DISA efforts and capabilities to achieve FOC DOTMLPF paradigm inclusion across all Agencies, Services, Multi-National stakeholders CNO Tasker- Health of Navy Networks (Operational & Tactical) • • • ID near and long term Security & Reliability Identify network life cycle requirements POA&M to mitigate network shortfalls 17 UNCLASSIFIED/FOUO Identifying Cyber Workforce Strategic Objectives CONDUCT INFORMATION ASSURANCE PROCEDURES: CONDUCT NETOPS: DEFEND NETWORK: MONITOR/ANALYZE/DETECT RESPOND PROTECT Ensure Operation capabilities Identify and Mitigate Intrusions Establish a secure network Apply and monitor system hardware and software configurations and applications IAW directed policy and procedures Ensure network(s) effectiveness to support Commanders intent and the decision making process Apply Intrusion Detection, Intrusion Protection and mitigative TTPs to protect the enterprise services 18 UNCLASSIFIED/FOUO Task Definitions (UJTL) Label OP 5.6.5.3 Task Name Task Description Conduct CND To conduct actions taken through the use of computer networks to protect, monitor, analyze, detect, and respond to unauthorized activity within DOD information systems and computer networks Defend the GIG Direct and lead Information Assurance and Computer Network Defense (IA/CND) actions to protect, monitor, analyze, detect and respond to unauthorized activity within DOD GIG assets, information systems and computer networks. Employ IA protection activity and deliberate actions to modify an assurance configuration or condition in response to a CND alert or threat information. CND response actions include defensive and restoration actions. Provide assured system and network availability, assured information protection, and assured information delivery. ST 5.1.6 Establish IA Procedures To establish information assurance procedures for deployed operations. This task includes developing IO appendices including defensive information operations (IO) and IA for all deliberate plans and operations orders as required. IA may be used to ensure information and information systems availability, integrity, authentication, confidentiality, and nonrepudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. ST 5.5.7.3 Direct CND To direct actions taken through the use of computer networks to protect, monitor, analyze, detect, and respond to unauthorized activity within DOD information systems and computer networks. ST 5.1.2.3 Manage Information Assurance Policies Establish and enforce policies and procedures to design, operate, maintain, and protect theater command, control, communications, and computers (C4) systems. OP 5.4.7 Integrate Computer Investigations & Operations in CND To coordinate, facilitate and deconflict computer investigations and operations between investigative and member agencies. Prepare Plans and Orders To make detailed plans, staff estimates, and decisions for implementing the geographic combatant commander's theater strategy, associated sequels, and anticipated campaigns or major operations. Plans and orders address, among other things, centers of gravity, branches, sequels, culminating points, and phasing. Planning includes organizing an effective staff, structuring and organizing the force, considering multinational capabilities/ limitations, and cross-leveling or balancing Service component, joint, and national command, control, communications, and computers (C4) means. Plans should address specific missions and tasks for subordinate joint or multinational task forces, Service 19 and functional components and supporting commands and agencies. SN 5.5.5 OP 5.3 UNCLASSIFIED/FOUO Task Definitions (NMETL) Label NTA X.X.X NTA 5.5.5 NTA.2.4.4.1 Task Name Task Description Plans and Policy Perform Information Assurance Protect and defend information and Information Systems ensuring their Confidentiality, Integrity, Availability, Authentication, and non-repudiation. Provide Restoration procedures by implementing protection, detection, and reaction capabilities Identify Issues and Threats Assess and identify threats which may impact national security interests and operations Evaluate, Integrate, Analyze and Interpret Information Appraise the credibility, reliability, accuracy of information through a process of identifying patterns, conducting analysis, and interpreting its significance NTA 5.2 Analyze and Assess Information Continuously evaluate information to determine and refine COA NTA 2.4.5.3 Provide Indications & Warning of Threat Provide early warning of attacks to prevent surprise and reduce risk on planning assumptions Develop Cyber Counter- Targeting Plans Prevent enemy from attaining own force Cyber Targeting Plans SN 2.4.1 NTA 3.1.6.X 20 UNCLASSIFIED/FOUO Task Definitions (NMETL) Label NTA 5.5.5.1 NTA 5.5.X NTA X.X Task Name Task Description Provide Computer Network Defense Protect and defend Information and Information Systems from disruption, denial, degradation, and destruction Conduct Incident Response Management Employment of Cyber Incident response management techniques to restore cyber combat capabilities damaged by attack or natural occurences Provide Trained Personnel Provide personnel trained to effectively and efficiently apply Commanders concept, intent, and objectives 21 UNCLASSIFIED/FOUO STT Primary References • • • • • • • • • • • • • • Net-Centric Data Strategy DoD 8570.01-M Information Assurance Workforce Improvement Program NSTISSI No. 4011 National Training Standard For Information Systems Security (INFOSEC) Professionals Navy Enlisted Manpower Occupations and Standards Vol I & II OPNAVINST 3500.34F Navy PQS Program Joint Pub 3-13 Information OPS DoDINST 8410.02 NetOPS for the GIG NIST SP 800-53 Information Security NTTP 3-32.1 Maritime Operations Center TTP CONOPS for NETOPS, Information Operations and Space Center (NIOSC) National Military Strategy for Cyberspace Operations NNWC NMETL for IO and SIGINT Capability Area Development CJCSI 6510.01/ 01A/01E IO and CND Series NWP3-63 Vol1 Computer Network Operations 22