• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/242

Click to flip

242 Cards in this Set

  • Front
  • Back
Responsible for establishing, operating, defending, attacking, exploiting in the cyberspace domain
17DXX
Net Attack/Network Warfare Support “operations ON the net” (Exploiting/Attacking)
A shred
NetOps/Net Defense “operations OF the net” (Establishing/Operating/Defending)
B shred
Identifies additional qualifications and experience
Prefix
Match uniquely qualified individuals to special requirement jobs
Special Experience Identifiers (SEI)
What enlisted skill level has these requirements? complete INITIAL SKILLS training
Apprentice (3-level)
What enlisted skill level has these requirements? complete CDCs, core tasks in CFETP and other tasks identified by supervisor
Journeyman (5-level)
What enlisted skill level has these requirements? must be a SSgt; complete CDCs, core tasks in CFETP, other tasks identified by supervisor, 7-level craftsman course, minimum of 12 months training and recommended by supervisor and approved by commander.
Craftsman (7-level)
What enlisted skill level has these requirements? must be at least a SMSgt; meet requirements listed in AFMAN 36-2108 and recommended by supervisor and approved by commander
Superintendent (9-level)
provide expertise and CONTINUITY to operate garrison bases without mission stoppage while their military counterparts deploy.
Civilians
It is the DoD baseline. It provides the basis for an enterprise-wide solution to train, certify, and manage the DoD Information Assurance (IA) workforce.
DoD Directive 8570.1
A comprehensive core training document that identifies life-cycle education and training requirements, training support resources, and minimum core task requirements for a specialty.
CFETP
CFETPs are developed, implemented, and maintained by this individual
AF Career Field Manager
USAF capstone professional development seminar for the cyberspace career field intended for Lt Cols and Colonels, civilian equivalents and CMSgts.
Scope EAGLE
The annual senior leader conference downward directed by SAF/A6 where they strategize the future of USAF Cyberspace Operations and professional community.
Scope WARRIOR
Includes the 624 Operations Center, 26 NWS, and 26 NOS
AFNOC – Air Force Network Operations Center
The “tip of the spear” for all USAF network management, IA, and computer network defense
624 Operations Center
Also known as AFCERT, USSTRATCOMs execution arm for all aspects of computer network defense, provide 24/7 intrusion detection monitoring (ASIMS for AF networks and CSIDS for USCENTCOM networks)
33 NWS – Network Warfare Squadron
Operates the AF networks, infrastructure, and enterprise application operations (AMMS & GAL). Uses the service delivery point (SDP) routers to defend the AF-GIG from external threats
26 NOS – Network Operations Center
Control core services such as email, shared files, print services, and data archive.
ESU – Enterprise Service Unit
The first level troubleshooting, user support, and trouble ticket initiation.
ESD – Enterprise Service Desk
Responsible for MAJCOM-unique applications and systems
MCCC – MAJCOM Communications Coordination Center
A centralized customer-facing service for client-support
INOSC – Integrated Network Operations and Security Centers
MAJCOM networks under I-NOSC West
AFSPC, PACAF, AETC, AMC
MAJCOM networks under I-NOSC East
ACC, AFRC, AFMC, USAFE
Responsible for the base-level “touch” maintenance, change management, and TCNO implementation.
CFP/CSA – Communications Focal Point/Client Support Administrator
Direct reporting unit to Air Force Space Command. Leads the AF in information infrastructure optimization and deployment of rapid response command, control, communications, and computer (C4) strike teams worldwide for assured AF network combat power.
AFNIC – Air Force Network Integration Center
COCOM responsible for all operations on the DoD GiG
USSTRATCOM
DoD’s primary “long-haul” communicator
DISA – Defense Information Systems Agency
Comprises the Defense Computer Forensics Lab, the Defense Computer Investigations Training Academy, and the Defense Cyber Crime Institute
DC3 – Defense Cyber Crime Center
Army's enterprise network is called the _______
LandWarNet
Prevent or minimize disruptions to critical information infrastructure to protect overall security of the US
DHS CS&C – Office of Cybersecurity and Communications
Charged with providing response support and defense against cyber attacks for the Federal Government and information sharing and collaboration with state and local government, industry and international partner
USCERT – US Computer Emergency Response Team
A federally funded research and development center and Carnegie Mellon University in Pittsburgh Pennsylvania
CERT/CC – CERT Coordination Center
Gathers intelligence on the darker side of the Internet. It is an all-volunteer watchdog group of security professionals that gather, track and report on malware, botnet activity and electronic fraud.
Shadow server foundation
Provides free warning and threat analysis to thousands of Internet users and organizations that they actively work with Internet service providers to fight back against malicious attacker
Sans Internet Storm Center
Overall objective is to ensure personnel are qualified to perform assigned duties within the Air Force network operations mission.
Stan/Eval—Standardization and Evaluation
Stan/Eval Program: 4 types of evaluations
QUAL, MSN, INSTR, SPOT
Play a pivotal role as a base representative and tracking center for network operations, telephone helpdesk, and client service center. In this role, they manage customer service requests, work orders, and equipment status reporting. They are a 24-hour contact point for customers/users database command post.
CFP—Communications Focal Point
Purpose is to identify any area, program, or equipment that is not compliant with standards
QA—Quality Assurance
Equipment specific maintenance procedures and inspection tasks are documented in applicable...
TO—Technical Operations
Used to modify existing equipment.
TCTO—Time Compliant Technical Order
TCTO: 3 categories
Immediate (safety conditions if left uncorrected could result in fatality or serious injury), Urgent (combat efficiency may be compromised), Routine (any other condition)
TCTO: 3 types
Inspection, Record, Interim
Directive C2 documents that dictate certain actions take place at all lvls of the AFNetOPs hierarchy in response to predetermined events
AFNetSOPs – Standard Operating Procedures
Downward directed operations, security, or configuration management orders issued by AFNOC
TCNO – Time Compliant Network Order
TCNO: 4 triggers
DoD, AF, Vender, Academia
TCNO: 4 phases
Assess, notification, distribution, apply, verification, reporting
TCNO: 5 categories
Critical (15 day suspense), Serious (30 day), High (45 day), Medium & Low (60 day)
Tracks TCNOs and C4NOTAMS
TCNO Tracker
Used when TCNOs cannot be accomplished by the deadline
POA&M—Plan of Action and Mitigation
Like TCNO but informative in nature. It does not direct action.
C4NOTAM—Command, Control, Communications and Computers Notice to Airmen
C4NOTMAN: 4 types
Informative, Unscheduled Event, Scheduled Event, Summary
C4NOTMAN: 5 categories
Critical (ongoing threat to AF-GIG), Serious (expected threat), High (likely threat), Medium (threat not expected to impact AF-GIG), Low (purely informative)
Used to immediately notify COMMANDERS of any significant event or incident.
OPREP-3—Operational Incident Report
Used to inform personnel of events and current status of ONGOING events to aid in the decision making process.
SITREP—Situation Report
A distributed e-mail notification used to inform “key” NetOps personnel of significant events occurring on the AF GIG.
INFOSPOT—Information Special Operations Report
Dedicated hardware/software network-based intrusion detection sensor platform.
ASIM—Automated Security Incident Measurement
A flexible, commercial-off-the-shelf-based solution which can detect and counter, in real time, known cyber threats to AF Enterprise assets.
HBSS—Home Based Security System
Used when direct actions are needed to operate and defend the GIG, must be completed in 24 hours
NTO—NetOps Tasking Order
The mechanism to perform maintenance actions on the AFGIG that are either one-time or recurring.
MTO—Maintenance Tasking Order
Addresses SEVERE network vulnerabilities resulting in immediate and potentially SEVERE threats to DoD systems and information.
IAVA
Addresses NEW vulnerabilities that DO NOT pose an IMMEDIATE RISK to DoD systems but are significant enough that noncompliance with the corrective action could escalate the risk. Requires no action, however, acknowledgment of receipt is required within 24 hours via VMS.
IAVB
Addresses NEW vulnerabilities that are generally categorized as LOW RISK to DoD systems. Requires no action or acknowledgement.
TA
IAVA, IAVB, and TA are issued by ______.
USCYBERCOM
Issued by USCYBERCOM and is used to coordinate and direct defensive measures to mitigate or eliminate threats to DoD networks.
CTO—Communications Tasking Order
A crisis action planning directive issued by the Chairman of the Joint Chiefs of Staff that initiates the development and evaluation of courses of action by a supported commander and requests that a commander’s estimate be submitted.
WARNORD—Warning Order
Directs network operations from USCYBERCOM and describes the relationship, responsibilities and actions taken by JTFs/COCOMs/Geographic Commands and field activities during normal and contingency operations.
OPORD—Operations Order
Is the way changes are made to the OPORD
FRAGO—Fragmented Order
Air Force level tracking is done via the ________. DoD/Joint level tracking is done via _______.
TCNO Tracker. VMS.
Notifies GIG agencies of approved and revoked circuit authorizations
CAM – Coordination Alert Message
Alerts agencies, services, and COCOMs of critical time sensitive info impacting GIG
NBNA – NetOps Breaking News Alert
Direct incident handling and reporting for the GIG that are high profile 30 min acknowledgment required
NDTM – Network Defense Tasking Message
Main mission is to achieve and maintain INFORMATION SUPERIORITY.
Information Operations
Allows friendly forces the ability to collect, control, exploit, defend information without opposition
Information Superiority
AF IO: 3 components
Influence Ops, Network Warfare Ops, Electronic Warfare Ops
Affect perceptions and behaviors of leaders, groups, populations to achieve effects across the cognitive domain
Influence Operations
Influence Ops: 6 components
PSYCOPs, MILDEC, OPSEC, CI, PA, Counter propaganda
Targets the mind of the adversary and focused on the cognitive domain of the battlespace
PSYCOPs
Misleads or manages the perception of adversaries causing them to act in accordance with friendly objectives
MILDEC
Information gathered and activities conducted to protect against espionage, sabotage, assassinations
CI – Counter Intelligence
Are integrated planning, employment and assessment of military capabilities to achieve desired effects across the analog and digital network of the battlespace. Conducted through a combination of hardware, software, data and human interactions.
Network Warfare Operations
Are integrated planning, employment and assessment of military capabilities to achieve desired effects across the electromagnetic domain in support of operational objectives.
Electronic Warfare Operations
Purpose is to provide joint forces commanders guidance to help prepare, plan, execute, and assess IO in support of joint operations. The principal goal is to achieve and maintain INFORMATION SUPERIORITY for the US and its allies.
JP 3-13—Joint Publication for Joint IO
The only difference between AF and Joint levels for IO is that:
Air Force = NetOps and Joint = COMPUTER NetOps (CNO)
Legal Considerations
Military Necessity, Distinction, Proportionality, Unnecessary Suffering
Mission Assurance: 6 core components
INFOSEC, Physical Security, OPSEC, COMSEC, COMPUSEC, EMSEC
The purpose of _____ is PROTECTING INFORMATION that is critical to mission accomplishment. The goal is to efficiently and effectively protect AF information by delegating authority to the LOWEST levels possible.
INFOSEC—Information Security
INFOSEC: 4 types
Top secret, secret, confidential, unclassified (FOUO, FOUO-LES, SBU, LIMDIS, ORCON)
Physical security equipment, procedures, or devices used to protect security interests from possible threats.
Physical Security (PS)
Used to protect AF information and personnel from enemy information-gathering methods.
OPSEC—Operations Security
OPSEC reporting: disclosure of critical information that could jeopardize ongoing or planned operations).
OPSEC Vulnerability Reports
OPSEC reporting: provides advance notification of a potential threat to operations
OPSEC Advisory Reports
The measures taken to deny unauthorized persons access to information derived from information systems of the US government
COMSEC—Communications Security
Measures and controls that ensure the confidentiality, integrity, or availability of information systems assets including hardware, software, firmware and information being processed, stored, and communicated.
COMPUSEC—Computer Security
Protection resulting from all measures taken to deny unauthorized personnel information of value that might be derived from the interception and analysis of compromising emanations
EMSEC—Emissions Security
Dynamic IA certification and accreditation process that supports and complement the net-centric GIG-based environment
DICAP – DoD IA Certification and Accreditation Process
The official with the authority to formally assume responsibility for operating a system at an acceptable level of risk
DAA—Designated Accrediting Authorities
Responsible for the DoD wide DIACAP training program
DISA – Defense Information Systems Agency
Pass information between two networks that are of different security sensitivities
CDS – Cross Domain Solutions
It is fully engaged to standardize the AFNet enterprise. Its core mission includes network compliance assessments, network optimization evaluations, and Air Force Network enterprise health feedbac
Scope EDGE
Maintenance must have an effective Stan/Eval and Quality Assurance function in order to ensure mission needs are met.
CSEP—Communications Standardization and Evaluation Program
Plans, organizes, staffs, directs and controls the mx effort and is responsible to the commander for accomplishing the mx mission
Chief of Maintenance (COM)
The AF information vision is to enable mission capabilities through seamlessly integrated access to the right information, anytime, anywhere. _____ provides the foundation for obtaining this vision and directly supports the concept of Knowledge-based Operations (KBO).
EIM—Enterprise Information Management
EIM: 4 capabilities
Records Management, Workflow Management, Forms, Document Management
An internal effort within each branch of gov assuring the capability exists to continue uninterrupted essential component functions across a wide range of potential emergencies
COOP—Continuity of Operations
COOP – 4 Phases
Normal Operations Phase (maintain accountability of personnel!), Activation and Relocation Phase, Alternate Operating Facility Operation, Report to Ops Normal
COOP – 3 Conditions
1. Be able to sustain operations at alternate facility for 30 days. 2. Be fully operational NLT 12 hrs after activation. 3. Include current contact info for alt loc
COOP – 4 Plans
No warning, During duty hour, Warning (30 sec to months, During non-duty hours
A system that the loss of which would cause the STOPPAGE of warfighter ops or direct mission support of warfighter operations.
Mission critical
A system that the acquiring component head or designee determines is basic and necessary for the accomplishment of the organizational mission.
Mission essential
Organization devoted full time to how the crisis affects mission execution but not management of incident
CAT – Crisis Action Team
IC's C2 function on scene. Directs info btwn IC, EOC, first responders
ICP – Incident Command Post
The focal point of support operations for the Incident Commander (IC) and those responders at the incident site
EOC – Emergency Operations Center
Serves as a commander’s communications conduit to each individual assigned to an organization and provides a single point of contact for resources request from the IC via the ECC or EOC.
UCC—Unit Control Center
The individual responsible for all operations performed by an installation.
Installation CC
Generally the first ranking person on-scene.
IC – Incident CC
Dispatch/control center for fire, security, medical forces
ECC – Emergency Communications Center
7 Steps of the MDMP—Military Decision Making Process
Receipt of Mission, Mission Analysis, COA development, COA analysis, COA comparison, COA approval, Orders Production
Interconnected computer networks utilizing TCP/IP to facilitate operations at the UNCLASSIFIED level
NIPRNet
Interconnected computer networks utilizing TCP/IP to facilitate operations at the SECRET level
SIPRNet
Interconnected computer networks utilizing TCP/IP to facilitate operations at the TOP SECRET level
JWICS
Directory service within Microsoft Exchange email system
Global Address List (GAL)
Arrangement that binds public keys with respective user identities by means of a certificate authority (CA) allowing users to send encrypted email
Public Key Infrastructure (PKI)
Goal is to provide a single service-oriented interface for accessing and consolidating support systems (vMPF, ADLS, etc.) into one login, known as AF Portal
Global Combat Support System (GCSS)
DISAs service aimed at info sharing, providing the right info to the right people at the right time
NetCentric Enterprise Service (NCES)
Worldwide classified system provides C4I to AF commands in joint execution
Global Command and Control System (GCCS)
Defined as an inter-base, non-secure, or secure C2 telecommunications system that’s provides end to end command use and dedicated voice service, voice-band data, facsimile, and VTC
Defense Switch Network (DSN)
Similar to a high end office phone, but provides the ability to place both secure and non-secure phone calls and features cryptographic keys for secure voice transmission up to TS/SCI
Secure Terminal Equipment (STE)
Sub-network of DSN used to provide none-secure and secure voice up to TS/SCI, also provides users with access to strategic and tactical units
Defense RED Switch Network (DRSN)
Non-secure voice technology that uses existing IP networks (NIPRNet)
Voice over Internet Protocol (VoIP)
The transmission of signals over a distance for the purpose of communication
Telecommunication
A time varying electrical quantity such as voltage or current by which messages/info/data can be transmitted.
Signal
The process of manipulating some characteristics of a sine wave (carrier wave) with values from and info/message signal
Modulation
Device that modulates an analog carrier signal to encode digital information
Modem
Process where multiple analog messages signals or data streams are combined into one signal over a shared medium
Multiplexing
Allows several users to transmit data by allocating a SEPARATE FREQUENCY band to each user.
Frequency-Division Multiple Access
Access Allows several users to share the same frequency by dividing the signal into different time slots.
Time-Division Multiple
Allows multiple users to be multiplexed over the same physical channel and timeframe by uniquely encoding each user’s signal.
Code-Division Multiple Access
Unwanted signal not present in the original information.
Noise
Any electromagnetic disturbance that interrupts, obstructs, or otherwise degrades or limits the effective performance of electronics/electric equipment.
EM Interference
Any disturbance caused by the electric or magnetic fields of one telecommunication signal affecting a signal in the adjacent circuit.
Crosstalk
Is the weakening of a signal as it is transmitted
Attenuation
Occurs when a wave encounters discontinuities in the transmission medium
Scattering
Seen in digital transmissions and light pulses.
Dispersion
NetCentric Enterprise Service (NCES)
Distortion
Are brief voltage or current spikes. A very brief outage and quick return
Transients
Reflections of a portion of the signal wave caused by discontinuities or inconsistencies along the transmission path
Echoes
The difference between the highest-frequency signal component and the lowest-frequency signal component that will accurately passinformation
Bandwidth
The rate at which a computer, network, or communication system sends or receives data.
Throughput
“The Act” was responsible for establishing the Federal Communications Commission (FCC).
Communication Act of 1934
Independent federal regulatory agency responsible directly to Congress and regulates non-federal users.
FCC
President’s principal advisor on telecommunications and information policy issues. It manages the federal government’s use of the spectrum.
NTIA – National Telecommunications and Information Administration
International organization established to standardize and regulate international radio and telecommunications.
ITU - International Telecommunications Union
Responsible for developing comprehensive & integrated spectrum planning and long term strategies for DoD spectrum
DSO – Defense Spectrum Office
Ensures frequency coordination in geographical areas w/ radio line of sight
DoD AFC – Area Frequency Coordinator
Defends and articulates Air Force spectrum access to regulatory agencies at the joint, national, and international levels. It is responsible for all AF spectrum management-related matters, policy and procedures.
AFFMA - Air Force Frequency Management Agency
Carries out Air Force policy, practices and procedures for managing use of the RF spectrum.
MAJCOM Frequency management
Obtain frequency support for the base mission through command channels. The ISM maintains appropriate frequency management records for the installation and submits reports of frequency interference.
Installation Spectrum manager
They ensure electromagnetic radiating equipment operations comply with authorized parameters identified in the frequency assignment notification.
Unit Frequency manager
What is the propagation method for UHF/VHF
Line of Sight
Receives weak signal, retransmits it at a high power to cover longer distance while correcting for noise
Repeater
Receives weak signal, retransmits it at a high power to cover longer distance without correcting for noise
Amplifier
International standard for home networking on existing wire
G.hn
Relay radio signals between Earth's terminals
Satellites
Reflects radio signals back to Earth
Passive Satellite
Repeats radio signals back to Earth
Active Satellite
Based on reflective properties for radio RF energy and provides 3D target detection w/ azimuth, range, elevation
Radar
E3 Air Defense System that gathers and presents battlefield information
AWACS
AF/Army project that provides ground situation information
JSTAR
Long range, all weather, air defense system to counter missiles
Patriot Missile Defense System
Lightweight, man-portable, ground to ground surveillance radar for infantry units
AN/PPS-5B Ground Surveillance Radar Set
Control airspace around an airfield to ensure collision avoidance
ATC Radar
Responsible for control of aircraft in given airspace during contingency
AC&W
Used by RAPCON to detect range, bearing, elevation of aircraft
ASR
Used w/ ASR to interrogate aircraft transponders
IFF/SIF
Provides aircraft precision approach control during landing in low visibility
PAR
Weather radar used to detect wind shear
NEXRAD
Integrates different data links from different sources which is then fed to TBMCS and COP
ADSI – Air Defense System Integrator
Interface two or more C2 or weapons systems via network architectures and multiple communications media
TADIL – Tactical Digital Info LinksD(ata Links)
The senior TACS element
AOC – Air Operations Center
Provides reliable, secure, survivable C4 systems for joint strategy
ASOC – Air Support Operations Center
Plans, coordinates, directs aerospace for land forces (CAR, AI, ISR, SEAD, CSAR)
TACS – AF Theatre Air Control System
Single identical display of information shared by more than one command
COP – Common Operational Picture
Freed the JSTAR from performing radio relay missions
RIPRNet
Family of radios that share underlying architecture, IP, software
JTRS – Joint Tactical Radio System
Centrally funded and managed to address overarching mission needs
Programs
Defined sets of activities requiring resources for predefined objectives
Projects
Process of managing multiple ongoing interdependent projects withing defined scope, quality, time, cost
PM – Program management
PM: 4 functions
Planning, organizing, leading, controlling
PM: 3 skills
Communication, administration, negotiation
PM: 3 phases
Conception, execution, completion
First significant action taken after a cyber system requirement is approved
Site Survey
Responsibility of the CSO and Comm Sq to use CIPS to process the request and provide a ______________.
Technical Solution
Congress passed this act to standardize and consolidate acquisition, planning, and management of IT
Clinger-Cohen Act
Manages all planning and implementation activities related to base level C4 systems
P&I – Planning and Implementation flight
Base level support requirements listed in the PSA. Includes only those actions required to install, remove, relocate equipment.
Allied support
Responsible to develop and enforce policy to ensure USAF executes the most effective and efficient acquisition, integration, application, management of IT resources
SAF/A6 – Office of Warfighting Integration & Chief Info Office
Prepare and process requirements documents for AF-wide systems in their functional areas
HQ USAF Functional Managers
Develops MAJCOM policy, plans, architecture for AF-wide IT
MAJCOM CSO - Cyber Systems Officer
Maintains engineering documentation within CIPS
Wing CSO – Cyber Systems Officer
Meets with customers to learn their needs and is the client representative
P&I Program Manager
38 CEG manages all _______ who provide integrated communications and computer systems, designed to increase combat readiness of the AF and DoD
STEM – Systems Telecommunications Engineering Manager
STEM: 7 types
STEM-A (Air Staff & SAF/A6), STEM-B (Base), STEM-C (MAJCOM), STEM-D (Deployed Ops/COCOM & NAF), STEM-E (backup for STEM-B), STEM-J (Joint, deploy to COCOM AORs), STEM-TM (Functional Areas)
Ensures standardization of all USAF core networks and enables USAF to manage thousands of projects simultaneously
CITS – Combat Information Transport System
Portion of CITS that is the fiber optic backbone of a base network
ITS – Information Transport System
Centralized database which contains the base level cyber blueprints, maintained by the STEM-B
CIPS – Cyberspace Infrastructure Planning System
Formal document of cyber system requirements and approval for base support. Maintained by SCX.
PSA – Project Support Agreement
Cyber officer's role in assisting the contract officer.
Technical advisor and QA Representitive
Contract that supports iniatives and programs within the GIG architecture and permits procurment of all AFNet related IT COTS products
NETCENTS
Web-based system for purchasing IT equipment
AFWAY
Main purpose is to decide which programs have the highest priority and is made up of the Wing/CC, Group/CC, Comptroller, and Chief of the Financial Management Analysis Branch
FMB - Financial Management Board
Main purpose is to monitor the funds of the units by assisting in the development program and making recommendations to the commanders. Made up of the Chief of the FMA branch and Unit Resource Advisors
FWG - Financial Working Group
Primary base level document used for obtaining the financial resources required for mission accomplishment for the next fiscal year
FINPLAN
Lists the top 10 prioritized unfunded requirements that have been identified by the FMB and FWG
BER - Budget Exectution Report
Used to identify and describe the function and purpose of each disbursement
Appropriation codes
Appropriate code: 1 year, Operations & Maintenance, Day to day ops
3400
Appropriate code: 3 year, Procurement, Purchase of major end items & systems
3080
Appropriate code: 1 year, Military personnel - AF, miltary salaries and pcs moves
3500
Appropriate code: 2 year, Reasearch and Development, Development of equipment and software
3600
Appropriate code: 5 year, Military Construction-AF, Major military construction projects
3300
An automated coordination tracking systyem of the AF Form 9 and is controlled by a module manager
ABSS - Automated Business Services System
Automates the three DoD travel processes: authorization, reservation, voucher filing
DTS - Defense Travel System
Provides enterprise-wide asset visibility and order management of AF owned supply items through the AF portal
ES-S Enterprise Solution Supply
The component of CITS that provides upgrades and/or replaces existing outdated base telephone switches
VSS - Voice Swithcing System
The component of CITS that provides an integrates, automated personal computer based management system that automates base level voice communication administrative functions
TMS - Telecommunication Management System
The DoD enterprise network containing the elements of network services, enterprise computing and the network backbone
DISN - Defense Information Systems Network
Cyberspace characteristics
Non-Continuous Domain, Heterogeneous, Volitile and Fast, Contains Legal and Physical Maneuver Space
Type of mission which integrates offensive and defensive operations to attain and maintain a desried degree of cyber superiority
Counter-cyber
If perpentrators use U.S. infrastructure to commit acts that are illegal according to U.S. code, the can be prosecuted under ______.
Title 18
Which Title of the U.S. Code governs wartime actions/behavior?
Title 10
U.S. Code used to investigate the activities of an adversary and take defensive actions against the threat's netowrk infrastructure
Title 50
Cyber capabilities which are leveraged to achieve effects in other domains
Cross Domain Operations
Employed to control, manage, and monitor large complex systems such as industrial systems, infrastructure functions, and various facilities functions
SCADA - Supervisory Control and Data Acquisition
Three key strategic objectives for cyberspace operations
Establishing the domain, controlling the domain, using the domain
Document prepared by the President and submitted to Congress by the Executive Branch, outlines the Presidents goals and objectives to ensure the security of the U.S.
NSS - National Security Strategy
Document published by the CJCS and provides focus for military activites by defining a set of interrelated military objectives (Protect, Prevent, Prevail)
NMS - National Military Strategy
Document developed by the DoD and derived from the NSS
NDS - National Defense Strategy
NMS: 4 functions
Applying force, deploying and sustaining military capabilities, securing the battlespace, achieving decision superiority
Transferrable command authority inherent in COCOM
OPCON
Transferable command authority limited to the detailed direction and control of movements or maneuvers within the operational area necessary to accomplish assigned missions
TACON
Authority necessary to fulfil Service responsibilities: organize, train, equipped
ADCON