Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
242 Cards in this Set
- Front
- Back
Responsible for establishing, operating, defending, attacking, exploiting in the cyberspace domain
|
17DXX
|
|
Net Attack/Network Warfare Support “operations ON the net” (Exploiting/Attacking)
|
A shred
|
|
NetOps/Net Defense “operations OF the net” (Establishing/Operating/Defending)
|
B shred
|
|
Identifies additional qualifications and experience
|
Prefix
|
|
Match uniquely qualified individuals to special requirement jobs
|
Special Experience Identifiers (SEI)
|
|
What enlisted skill level has these requirements? complete INITIAL SKILLS training
|
Apprentice (3-level)
|
|
What enlisted skill level has these requirements? complete CDCs, core tasks in CFETP and other tasks identified by supervisor
|
Journeyman (5-level)
|
|
What enlisted skill level has these requirements? must be a SSgt; complete CDCs, core tasks in CFETP, other tasks identified by supervisor, 7-level craftsman course, minimum of 12 months training and recommended by supervisor and approved by commander.
|
Craftsman (7-level)
|
|
What enlisted skill level has these requirements? must be at least a SMSgt; meet requirements listed in AFMAN 36-2108 and recommended by supervisor and approved by commander
|
Superintendent (9-level)
|
|
provide expertise and CONTINUITY to operate garrison bases without mission stoppage while their military counterparts deploy.
|
Civilians
|
|
It is the DoD baseline. It provides the basis for an enterprise-wide solution to train, certify, and manage the DoD Information Assurance (IA) workforce.
|
DoD Directive 8570.1
|
|
A comprehensive core training document that identifies life-cycle education and training requirements, training support resources, and minimum core task requirements for a specialty.
|
CFETP
|
|
CFETPs are developed, implemented, and maintained by this individual
|
AF Career Field Manager
|
|
USAF capstone professional development seminar for the cyberspace career field intended for Lt Cols and Colonels, civilian equivalents and CMSgts.
|
Scope EAGLE
|
|
The annual senior leader conference downward directed by SAF/A6 where they strategize the future of USAF Cyberspace Operations and professional community.
|
Scope WARRIOR
|
|
Includes the 624 Operations Center, 26 NWS, and 26 NOS
|
AFNOC – Air Force Network Operations Center
|
|
The “tip of the spear” for all USAF network management, IA, and computer network defense
|
624 Operations Center
|
|
Also known as AFCERT, USSTRATCOMs execution arm for all aspects of computer network defense, provide 24/7 intrusion detection monitoring (ASIMS for AF networks and CSIDS for USCENTCOM networks)
|
33 NWS – Network Warfare Squadron
|
|
Operates the AF networks, infrastructure, and enterprise application operations (AMMS & GAL). Uses the service delivery point (SDP) routers to defend the AF-GIG from external threats
|
26 NOS – Network Operations Center
|
|
Control core services such as email, shared files, print services, and data archive.
|
ESU – Enterprise Service Unit
|
|
The first level troubleshooting, user support, and trouble ticket initiation.
|
ESD – Enterprise Service Desk
|
|
Responsible for MAJCOM-unique applications and systems
|
MCCC – MAJCOM Communications Coordination Center
|
|
A centralized customer-facing service for client-support
|
INOSC – Integrated Network Operations and Security Centers
|
|
MAJCOM networks under I-NOSC West
|
AFSPC, PACAF, AETC, AMC
|
|
MAJCOM networks under I-NOSC East
|
ACC, AFRC, AFMC, USAFE
|
|
Responsible for the base-level “touch” maintenance, change management, and TCNO implementation.
|
CFP/CSA – Communications Focal Point/Client Support Administrator
|
|
Direct reporting unit to Air Force Space Command. Leads the AF in information infrastructure optimization and deployment of rapid response command, control, communications, and computer (C4) strike teams worldwide for assured AF network combat power.
|
AFNIC – Air Force Network Integration Center
|
|
COCOM responsible for all operations on the DoD GiG
|
USSTRATCOM
|
|
DoD’s primary “long-haul” communicator
|
DISA – Defense Information Systems Agency
|
|
Comprises the Defense Computer Forensics Lab, the Defense Computer Investigations Training Academy, and the Defense Cyber Crime Institute
|
DC3 – Defense Cyber Crime Center
|
|
Army's enterprise network is called the _______
|
LandWarNet
|
|
Prevent or minimize disruptions to critical information infrastructure to protect overall security of the US
|
DHS CS&C – Office of Cybersecurity and Communications
|
|
Charged with providing response support and defense against cyber attacks for the Federal Government and information sharing and collaboration with state and local government, industry and international partner
|
USCERT – US Computer Emergency Response Team
|
|
A federally funded research and development center and Carnegie Mellon University in Pittsburgh Pennsylvania
|
CERT/CC – CERT Coordination Center
|
|
Gathers intelligence on the darker side of the Internet. It is an all-volunteer watchdog group of security professionals that gather, track and report on malware, botnet activity and electronic fraud.
|
Shadow server foundation
|
|
Provides free warning and threat analysis to thousands of Internet users and organizations that they actively work with Internet service providers to fight back against malicious attacker
|
Sans Internet Storm Center
|
|
Overall objective is to ensure personnel are qualified to perform assigned duties within the Air Force network operations mission.
|
Stan/Eval—Standardization and Evaluation
|
|
Stan/Eval Program: 4 types of evaluations
|
QUAL, MSN, INSTR, SPOT
|
|
Play a pivotal role as a base representative and tracking center for network operations, telephone helpdesk, and client service center. In this role, they manage customer service requests, work orders, and equipment status reporting. They are a 24-hour contact point for customers/users database command post.
|
CFP—Communications Focal Point
|
|
Purpose is to identify any area, program, or equipment that is not compliant with standards
|
QA—Quality Assurance
|
|
Equipment specific maintenance procedures and inspection tasks are documented in applicable...
|
TO—Technical Operations
|
|
Used to modify existing equipment.
|
TCTO—Time Compliant Technical Order
|
|
TCTO: 3 categories
|
Immediate (safety conditions if left uncorrected could result in fatality or serious injury), Urgent (combat efficiency may be compromised), Routine (any other condition)
|
|
TCTO: 3 types
|
Inspection, Record, Interim
|
|
Directive C2 documents that dictate certain actions take place at all lvls of the AFNetOPs hierarchy in response to predetermined events
|
AFNetSOPs – Standard Operating Procedures
|
|
Downward directed operations, security, or configuration management orders issued by AFNOC
|
TCNO – Time Compliant Network Order
|
|
TCNO: 4 triggers
|
DoD, AF, Vender, Academia
|
|
TCNO: 4 phases
|
Assess, notification, distribution, apply, verification, reporting
|
|
TCNO: 5 categories
|
Critical (15 day suspense), Serious (30 day), High (45 day), Medium & Low (60 day)
|
|
Tracks TCNOs and C4NOTAMS
|
TCNO Tracker
|
|
Used when TCNOs cannot be accomplished by the deadline
|
POA&M—Plan of Action and Mitigation
|
|
Like TCNO but informative in nature. It does not direct action.
|
C4NOTAM—Command, Control, Communications and Computers Notice to Airmen
|
|
C4NOTMAN: 4 types
|
Informative, Unscheduled Event, Scheduled Event, Summary
|
|
C4NOTMAN: 5 categories
|
Critical (ongoing threat to AF-GIG), Serious (expected threat), High (likely threat), Medium (threat not expected to impact AF-GIG), Low (purely informative)
|
|
Used to immediately notify COMMANDERS of any significant event or incident.
|
OPREP-3—Operational Incident Report
|
|
Used to inform personnel of events and current status of ONGOING events to aid in the decision making process.
|
SITREP—Situation Report
|
|
A distributed e-mail notification used to inform “key” NetOps personnel of significant events occurring on the AF GIG.
|
INFOSPOT—Information Special Operations Report
|
|
Dedicated hardware/software network-based intrusion detection sensor platform.
|
ASIM—Automated Security Incident Measurement
|
|
A flexible, commercial-off-the-shelf-based solution which can detect and counter, in real time, known cyber threats to AF Enterprise assets.
|
HBSS—Home Based Security System
|
|
Used when direct actions are needed to operate and defend the GIG, must be completed in 24 hours
|
NTO—NetOps Tasking Order
|
|
The mechanism to perform maintenance actions on the AFGIG that are either one-time or recurring.
|
MTO—Maintenance Tasking Order
|
|
Addresses SEVERE network vulnerabilities resulting in immediate and potentially SEVERE threats to DoD systems and information.
|
IAVA
|
|
Addresses NEW vulnerabilities that DO NOT pose an IMMEDIATE RISK to DoD systems but are significant enough that noncompliance with the corrective action could escalate the risk. Requires no action, however, acknowledgment of receipt is required within 24 hours via VMS.
|
IAVB
|
|
Addresses NEW vulnerabilities that are generally categorized as LOW RISK to DoD systems. Requires no action or acknowledgement.
|
TA
|
|
IAVA, IAVB, and TA are issued by ______.
|
USCYBERCOM
|
|
Issued by USCYBERCOM and is used to coordinate and direct defensive measures to mitigate or eliminate threats to DoD networks.
|
CTO—Communications Tasking Order
|
|
A crisis action planning directive issued by the Chairman of the Joint Chiefs of Staff that initiates the development and evaluation of courses of action by a supported commander and requests that a commander’s estimate be submitted.
|
WARNORD—Warning Order
|
|
Directs network operations from USCYBERCOM and describes the relationship, responsibilities and actions taken by JTFs/COCOMs/Geographic Commands and field activities during normal and contingency operations.
|
OPORD—Operations Order
|
|
Is the way changes are made to the OPORD
|
FRAGO—Fragmented Order
|
|
Air Force level tracking is done via the ________. DoD/Joint level tracking is done via _______.
|
TCNO Tracker. VMS.
|
|
Notifies GIG agencies of approved and revoked circuit authorizations
|
CAM – Coordination Alert Message
|
|
Alerts agencies, services, and COCOMs of critical time sensitive info impacting GIG
|
NBNA – NetOps Breaking News Alert
|
|
Direct incident handling and reporting for the GIG that are high profile 30 min acknowledgment required
|
NDTM – Network Defense Tasking Message
|
|
Main mission is to achieve and maintain INFORMATION SUPERIORITY.
|
Information Operations
|
|
Allows friendly forces the ability to collect, control, exploit, defend information without opposition
|
Information Superiority
|
|
AF IO: 3 components
|
Influence Ops, Network Warfare Ops, Electronic Warfare Ops
|
|
Affect perceptions and behaviors of leaders, groups, populations to achieve effects across the cognitive domain
|
Influence Operations
|
|
Influence Ops: 6 components
|
PSYCOPs, MILDEC, OPSEC, CI, PA, Counter propaganda
|
|
Targets the mind of the adversary and focused on the cognitive domain of the battlespace
|
PSYCOPs
|
|
Misleads or manages the perception of adversaries causing them to act in accordance with friendly objectives
|
MILDEC
|
|
Information gathered and activities conducted to protect against espionage, sabotage, assassinations
|
CI – Counter Intelligence
|
|
Are integrated planning, employment and assessment of military capabilities to achieve desired effects across the analog and digital network of the battlespace. Conducted through a combination of hardware, software, data and human interactions.
|
Network Warfare Operations
|
|
Are integrated planning, employment and assessment of military capabilities to achieve desired effects across the electromagnetic domain in support of operational objectives.
|
Electronic Warfare Operations
|
|
Purpose is to provide joint forces commanders guidance to help prepare, plan, execute, and assess IO in support of joint operations. The principal goal is to achieve and maintain INFORMATION SUPERIORITY for the US and its allies.
|
JP 3-13—Joint Publication for Joint IO
|
|
The only difference between AF and Joint levels for IO is that:
|
Air Force = NetOps and Joint = COMPUTER NetOps (CNO)
|
|
Legal Considerations
|
Military Necessity, Distinction, Proportionality, Unnecessary Suffering
|
|
Mission Assurance: 6 core components
|
INFOSEC, Physical Security, OPSEC, COMSEC, COMPUSEC, EMSEC
|
|
The purpose of _____ is PROTECTING INFORMATION that is critical to mission accomplishment. The goal is to efficiently and effectively protect AF information by delegating authority to the LOWEST levels possible.
|
INFOSEC—Information Security
|
|
INFOSEC: 4 types
|
Top secret, secret, confidential, unclassified (FOUO, FOUO-LES, SBU, LIMDIS, ORCON)
|
|
Physical security equipment, procedures, or devices used to protect security interests from possible threats.
|
Physical Security (PS)
|
|
Used to protect AF information and personnel from enemy information-gathering methods.
|
OPSEC—Operations Security
|
|
OPSEC reporting: disclosure of critical information that could jeopardize ongoing or planned operations).
|
OPSEC Vulnerability Reports
|
|
OPSEC reporting: provides advance notification of a potential threat to operations
|
OPSEC Advisory Reports
|
|
The measures taken to deny unauthorized persons access to information derived from information systems of the US government
|
COMSEC—Communications Security
|
|
Measures and controls that ensure the confidentiality, integrity, or availability of information systems assets including hardware, software, firmware and information being processed, stored, and communicated.
|
COMPUSEC—Computer Security
|
|
Protection resulting from all measures taken to deny unauthorized personnel information of value that might be derived from the interception and analysis of compromising emanations
|
EMSEC—Emissions Security
|
|
Dynamic IA certification and accreditation process that supports and complement the net-centric GIG-based environment
|
DICAP – DoD IA Certification and Accreditation Process
|
|
The official with the authority to formally assume responsibility for operating a system at an acceptable level of risk
|
DAA—Designated Accrediting Authorities
|
|
Responsible for the DoD wide DIACAP training program
|
DISA – Defense Information Systems Agency
|
|
Pass information between two networks that are of different security sensitivities
|
CDS – Cross Domain Solutions
|
|
It is fully engaged to standardize the AFNet enterprise. Its core mission includes network compliance assessments, network optimization evaluations, and Air Force Network enterprise health feedbac
|
Scope EDGE
|
|
Maintenance must have an effective Stan/Eval and Quality Assurance function in order to ensure mission needs are met.
|
CSEP—Communications Standardization and Evaluation Program
|
|
Plans, organizes, staffs, directs and controls the mx effort and is responsible to the commander for accomplishing the mx mission
|
Chief of Maintenance (COM)
|
|
The AF information vision is to enable mission capabilities through seamlessly integrated access to the right information, anytime, anywhere. _____ provides the foundation for obtaining this vision and directly supports the concept of Knowledge-based Operations (KBO).
|
EIM—Enterprise Information Management
|
|
EIM: 4 capabilities
|
Records Management, Workflow Management, Forms, Document Management
|
|
An internal effort within each branch of gov assuring the capability exists to continue uninterrupted essential component functions across a wide range of potential emergencies
|
COOP—Continuity of Operations
|
|
COOP – 4 Phases
|
Normal Operations Phase (maintain accountability of personnel!), Activation and Relocation Phase, Alternate Operating Facility Operation, Report to Ops Normal
|
|
COOP – 3 Conditions
|
1. Be able to sustain operations at alternate facility for 30 days. 2. Be fully operational NLT 12 hrs after activation. 3. Include current contact info for alt loc
|
|
COOP – 4 Plans
|
No warning, During duty hour, Warning (30 sec to months, During non-duty hours
|
|
A system that the loss of which would cause the STOPPAGE of warfighter ops or direct mission support of warfighter operations.
|
Mission critical
|
|
A system that the acquiring component head or designee determines is basic and necessary for the accomplishment of the organizational mission.
|
Mission essential
|
|
Organization devoted full time to how the crisis affects mission execution but not management of incident
|
CAT – Crisis Action Team
|
|
IC's C2 function on scene. Directs info btwn IC, EOC, first responders
|
ICP – Incident Command Post
|
|
The focal point of support operations for the Incident Commander (IC) and those responders at the incident site
|
EOC – Emergency Operations Center
|
|
Serves as a commander’s communications conduit to each individual assigned to an organization and provides a single point of contact for resources request from the IC via the ECC or EOC.
|
UCC—Unit Control Center
|
|
The individual responsible for all operations performed by an installation.
|
Installation CC
|
|
Generally the first ranking person on-scene.
|
IC – Incident CC
|
|
Dispatch/control center for fire, security, medical forces
|
ECC – Emergency Communications Center
|
|
7 Steps of the MDMP—Military Decision Making Process
|
Receipt of Mission, Mission Analysis, COA development, COA analysis, COA comparison, COA approval, Orders Production
|
|
Interconnected computer networks utilizing TCP/IP to facilitate operations at the UNCLASSIFIED level
|
NIPRNet
|
|
Interconnected computer networks utilizing TCP/IP to facilitate operations at the SECRET level
|
SIPRNet
|
|
Interconnected computer networks utilizing TCP/IP to facilitate operations at the TOP SECRET level
|
JWICS
|
|
Directory service within Microsoft Exchange email system
|
Global Address List (GAL)
|
|
Arrangement that binds public keys with respective user identities by means of a certificate authority (CA) allowing users to send encrypted email
|
Public Key Infrastructure (PKI)
|
|
Goal is to provide a single service-oriented interface for accessing and consolidating support systems (vMPF, ADLS, etc.) into one login, known as AF Portal
|
Global Combat Support System (GCSS)
|
|
DISAs service aimed at info sharing, providing the right info to the right people at the right time
|
NetCentric Enterprise Service (NCES)
|
|
Worldwide classified system provides C4I to AF commands in joint execution
|
Global Command and Control System (GCCS)
|
|
Defined as an inter-base, non-secure, or secure C2 telecommunications system that’s provides end to end command use and dedicated voice service, voice-band data, facsimile, and VTC
|
Defense Switch Network (DSN)
|
|
Similar to a high end office phone, but provides the ability to place both secure and non-secure phone calls and features cryptographic keys for secure voice transmission up to TS/SCI
|
Secure Terminal Equipment (STE)
|
|
Sub-network of DSN used to provide none-secure and secure voice up to TS/SCI, also provides users with access to strategic and tactical units
|
Defense RED Switch Network (DRSN)
|
|
Non-secure voice technology that uses existing IP networks (NIPRNet)
|
Voice over Internet Protocol (VoIP)
|
|
The transmission of signals over a distance for the purpose of communication
|
Telecommunication
|
|
A time varying electrical quantity such as voltage or current by which messages/info/data can be transmitted.
|
Signal
|
|
The process of manipulating some characteristics of a sine wave (carrier wave) with values from and info/message signal
|
Modulation
|
|
Device that modulates an analog carrier signal to encode digital information
|
Modem
|
|
Process where multiple analog messages signals or data streams are combined into one signal over a shared medium
|
Multiplexing
|
|
Allows several users to transmit data by allocating a SEPARATE FREQUENCY band to each user.
|
Frequency-Division Multiple Access
|
|
Access Allows several users to share the same frequency by dividing the signal into different time slots.
|
Time-Division Multiple
|
|
Allows multiple users to be multiplexed over the same physical channel and timeframe by uniquely encoding each user’s signal.
|
Code-Division Multiple Access
|
|
Unwanted signal not present in the original information.
|
Noise
|
|
Any electromagnetic disturbance that interrupts, obstructs, or otherwise degrades or limits the effective performance of electronics/electric equipment.
|
EM Interference
|
|
Any disturbance caused by the electric or magnetic fields of one telecommunication signal affecting a signal in the adjacent circuit.
|
Crosstalk
|
|
Is the weakening of a signal as it is transmitted
|
Attenuation
|
|
Occurs when a wave encounters discontinuities in the transmission medium
|
Scattering
|
|
Seen in digital transmissions and light pulses.
|
Dispersion
|
|
NetCentric Enterprise Service (NCES)
|
Distortion
|
|
Are brief voltage or current spikes. A very brief outage and quick return
|
Transients
|
|
Reflections of a portion of the signal wave caused by discontinuities or inconsistencies along the transmission path
|
Echoes
|
|
The difference between the highest-frequency signal component and the lowest-frequency signal component that will accurately passinformation
|
Bandwidth
|
|
The rate at which a computer, network, or communication system sends or receives data.
|
Throughput
|
|
“The Act” was responsible for establishing the Federal Communications Commission (FCC).
|
Communication Act of 1934
|
|
Independent federal regulatory agency responsible directly to Congress and regulates non-federal users.
|
FCC
|
|
President’s principal advisor on telecommunications and information policy issues. It manages the federal government’s use of the spectrum.
|
NTIA – National Telecommunications and Information Administration
|
|
International organization established to standardize and regulate international radio and telecommunications.
|
ITU - International Telecommunications Union
|
|
Responsible for developing comprehensive & integrated spectrum planning and long term strategies for DoD spectrum
|
DSO – Defense Spectrum Office
|
|
Ensures frequency coordination in geographical areas w/ radio line of sight
|
DoD AFC – Area Frequency Coordinator
|
|
Defends and articulates Air Force spectrum access to regulatory agencies at the joint, national, and international levels. It is responsible for all AF spectrum management-related matters, policy and procedures.
|
AFFMA - Air Force Frequency Management Agency
|
|
Carries out Air Force policy, practices and procedures for managing use of the RF spectrum.
|
MAJCOM Frequency management
|
|
Obtain frequency support for the base mission through command channels. The ISM maintains appropriate frequency management records for the installation and submits reports of frequency interference.
|
Installation Spectrum manager
|
|
They ensure electromagnetic radiating equipment operations comply with authorized parameters identified in the frequency assignment notification.
|
Unit Frequency manager
|
|
What is the propagation method for UHF/VHF
|
Line of Sight
|
|
Receives weak signal, retransmits it at a high power to cover longer distance while correcting for noise
|
Repeater
|
|
Receives weak signal, retransmits it at a high power to cover longer distance without correcting for noise
|
Amplifier
|
|
International standard for home networking on existing wire
|
G.hn
|
|
Relay radio signals between Earth's terminals
|
Satellites
|
|
Reflects radio signals back to Earth
|
Passive Satellite
|
|
Repeats radio signals back to Earth
|
Active Satellite
|
|
Based on reflective properties for radio RF energy and provides 3D target detection w/ azimuth, range, elevation
|
Radar
|
|
E3 Air Defense System that gathers and presents battlefield information
|
AWACS
|
|
AF/Army project that provides ground situation information
|
JSTAR
|
|
Long range, all weather, air defense system to counter missiles
|
Patriot Missile Defense System
|
|
Lightweight, man-portable, ground to ground surveillance radar for infantry units
|
AN/PPS-5B Ground Surveillance Radar Set
|
|
Control airspace around an airfield to ensure collision avoidance
|
ATC Radar
|
|
Responsible for control of aircraft in given airspace during contingency
|
AC&W
|
|
Used by RAPCON to detect range, bearing, elevation of aircraft
|
ASR
|
|
Used w/ ASR to interrogate aircraft transponders
|
IFF/SIF
|
|
Provides aircraft precision approach control during landing in low visibility
|
PAR
|
|
Weather radar used to detect wind shear
|
NEXRAD
|
|
Integrates different data links from different sources which is then fed to TBMCS and COP
|
ADSI – Air Defense System Integrator
|
|
Interface two or more C2 or weapons systems via network architectures and multiple communications media
|
TADIL – Tactical Digital Info LinksD(ata Links)
|
|
The senior TACS element
|
AOC – Air Operations Center
|
|
Provides reliable, secure, survivable C4 systems for joint strategy
|
ASOC – Air Support Operations Center
|
|
Plans, coordinates, directs aerospace for land forces (CAR, AI, ISR, SEAD, CSAR)
|
TACS – AF Theatre Air Control System
|
|
Single identical display of information shared by more than one command
|
COP – Common Operational Picture
|
|
Freed the JSTAR from performing radio relay missions
|
RIPRNet
|
|
Family of radios that share underlying architecture, IP, software
|
JTRS – Joint Tactical Radio System
|
|
Centrally funded and managed to address overarching mission needs
|
Programs
|
|
Defined sets of activities requiring resources for predefined objectives
|
Projects
|
|
Process of managing multiple ongoing interdependent projects withing defined scope, quality, time, cost
|
PM – Program management
|
|
PM: 4 functions
|
Planning, organizing, leading, controlling
|
|
PM: 3 skills
|
Communication, administration, negotiation
|
|
PM: 3 phases
|
Conception, execution, completion
|
|
First significant action taken after a cyber system requirement is approved
|
Site Survey
|
|
Responsibility of the CSO and Comm Sq to use CIPS to process the request and provide a ______________.
|
Technical Solution
|
|
Congress passed this act to standardize and consolidate acquisition, planning, and management of IT
|
Clinger-Cohen Act
|
|
Manages all planning and implementation activities related to base level C4 systems
|
P&I – Planning and Implementation flight
|
|
Base level support requirements listed in the PSA. Includes only those actions required to install, remove, relocate equipment.
|
Allied support
|
|
Responsible to develop and enforce policy to ensure USAF executes the most effective and efficient acquisition, integration, application, management of IT resources
|
SAF/A6 – Office of Warfighting Integration & Chief Info Office
|
|
Prepare and process requirements documents for AF-wide systems in their functional areas
|
HQ USAF Functional Managers
|
|
Develops MAJCOM policy, plans, architecture for AF-wide IT
|
MAJCOM CSO - Cyber Systems Officer
|
|
Maintains engineering documentation within CIPS
|
Wing CSO – Cyber Systems Officer
|
|
Meets with customers to learn their needs and is the client representative
|
P&I Program Manager
|
|
38 CEG manages all _______ who provide integrated communications and computer systems, designed to increase combat readiness of the AF and DoD
|
STEM – Systems Telecommunications Engineering Manager
|
|
STEM: 7 types
|
STEM-A (Air Staff & SAF/A6), STEM-B (Base), STEM-C (MAJCOM), STEM-D (Deployed Ops/COCOM & NAF), STEM-E (backup for STEM-B), STEM-J (Joint, deploy to COCOM AORs), STEM-TM (Functional Areas)
|
|
Ensures standardization of all USAF core networks and enables USAF to manage thousands of projects simultaneously
|
CITS – Combat Information Transport System
|
|
Portion of CITS that is the fiber optic backbone of a base network
|
ITS – Information Transport System
|
|
Centralized database which contains the base level cyber blueprints, maintained by the STEM-B
|
CIPS – Cyberspace Infrastructure Planning System
|
|
Formal document of cyber system requirements and approval for base support. Maintained by SCX.
|
PSA – Project Support Agreement
|
|
Cyber officer's role in assisting the contract officer.
|
Technical advisor and QA Representitive
|
|
Contract that supports iniatives and programs within the GIG architecture and permits procurment of all AFNet related IT COTS products
|
NETCENTS
|
|
Web-based system for purchasing IT equipment
|
AFWAY
|
|
Main purpose is to decide which programs have the highest priority and is made up of the Wing/CC, Group/CC, Comptroller, and Chief of the Financial Management Analysis Branch
|
FMB - Financial Management Board
|
|
Main purpose is to monitor the funds of the units by assisting in the development program and making recommendations to the commanders. Made up of the Chief of the FMA branch and Unit Resource Advisors
|
FWG - Financial Working Group
|
|
Primary base level document used for obtaining the financial resources required for mission accomplishment for the next fiscal year
|
FINPLAN
|
|
Lists the top 10 prioritized unfunded requirements that have been identified by the FMB and FWG
|
BER - Budget Exectution Report
|
|
Used to identify and describe the function and purpose of each disbursement
|
Appropriation codes
|
|
Appropriate code: 1 year, Operations & Maintenance, Day to day ops
|
3400
|
|
Appropriate code: 3 year, Procurement, Purchase of major end items & systems
|
3080
|
|
Appropriate code: 1 year, Military personnel - AF, miltary salaries and pcs moves
|
3500
|
|
Appropriate code: 2 year, Reasearch and Development, Development of equipment and software
|
3600
|
|
Appropriate code: 5 year, Military Construction-AF, Major military construction projects
|
3300
|
|
An automated coordination tracking systyem of the AF Form 9 and is controlled by a module manager
|
ABSS - Automated Business Services System
|
|
Automates the three DoD travel processes: authorization, reservation, voucher filing
|
DTS - Defense Travel System
|
|
Provides enterprise-wide asset visibility and order management of AF owned supply items through the AF portal
|
ES-S Enterprise Solution Supply
|
|
The component of CITS that provides upgrades and/or replaces existing outdated base telephone switches
|
VSS - Voice Swithcing System
|
|
The component of CITS that provides an integrates, automated personal computer based management system that automates base level voice communication administrative functions
|
TMS - Telecommunication Management System
|
|
The DoD enterprise network containing the elements of network services, enterprise computing and the network backbone
|
DISN - Defense Information Systems Network
|
|
Cyberspace characteristics
|
Non-Continuous Domain, Heterogeneous, Volitile and Fast, Contains Legal and Physical Maneuver Space
|
|
Type of mission which integrates offensive and defensive operations to attain and maintain a desried degree of cyber superiority
|
Counter-cyber
|
|
If perpentrators use U.S. infrastructure to commit acts that are illegal according to U.S. code, the can be prosecuted under ______.
|
Title 18
|
|
Which Title of the U.S. Code governs wartime actions/behavior?
|
Title 10
|
|
U.S. Code used to investigate the activities of an adversary and take defensive actions against the threat's netowrk infrastructure
|
Title 50
|
|
Cyber capabilities which are leveraged to achieve effects in other domains
|
Cross Domain Operations
|
|
Employed to control, manage, and monitor large complex systems such as industrial systems, infrastructure functions, and various facilities functions
|
SCADA - Supervisory Control and Data Acquisition
|
|
Three key strategic objectives for cyberspace operations
|
Establishing the domain, controlling the domain, using the domain
|
|
Document prepared by the President and submitted to Congress by the Executive Branch, outlines the Presidents goals and objectives to ensure the security of the U.S.
|
NSS - National Security Strategy
|
|
Document published by the CJCS and provides focus for military activites by defining a set of interrelated military objectives (Protect, Prevent, Prevail)
|
NMS - National Military Strategy
|
|
Document developed by the DoD and derived from the NSS
|
NDS - National Defense Strategy
|
|
NMS: 4 functions
|
Applying force, deploying and sustaining military capabilities, securing the battlespace, achieving decision superiority
|
|
Transferrable command authority inherent in COCOM
|
OPCON
|
|
Transferable command authority limited to the detailed direction and control of movements or maneuvers within the operational area necessary to accomplish assigned missions
|
TACON
|
|
Authority necessary to fulfil Service responsibilities: organize, train, equipped
|
ADCON
|