• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/63

Click to flip

63 Cards in this Set

  • Front
  • Back
Center for Information Dominance’s (CID) mission
Develop Naval and Joint Service Warriors and Ambassadors of Information using the very best of technology and innovation
What information should be included in an emergency destruction bill
The exact location of the classified material and equipment.

The priority of emergency destruction.

The place and method of destruction.
How often are Emergency Action Plans (EAP) required to be rehearsed?
ANNUALLY
What reference requires every command maintaining classified material to develop an Emergency Action Plan (EAP)?
Sensitive Compartmented Information Administrative Security Manual, DOD 5105.21-M-1
Who has the authority to designate a Joint Task Force?
Secretary of Defense (SecDef)

Combatant Commander (CCDR)

Subordinate unified command commander

Existing commander
Naval amphibious operations can be established for what type of operations?
Achieve campaign objectives in one swift stroke

Comprise the initial phase of a campaign or major operation

Serve as a supporting operation

Support military operations other than war (MOOTW)
Describe the role and responsibilities of the Cryptologic Resource Coordinator (CRC)
Manages direct support (DIRSUP) elements within the task force

Coordinates coverage plans

Directs reporting responsibilities for all cryptologic resources assigned to the operational commander.
What is a Cryptologic Direct Support Element (CDSE)
CDSE is the people and equipment subordinate to an operational commander to provide cryptologic tactical support and SIGINT direct support.
What is the purpose of Own Force Monitoring (OFM)
Improve signal security (SIGSEC) within your own.

Deny useful information to potential aggressors.
Composite Warfare Commander (CWC)
Acts as the central command authority for the entire Strike Group
List and describe Departments at the Command
N00 – Executive
N00A/N01A – Administrative Department
N00X – Special Project
N1 – Total Force Manpower and Human Resources Directorate
N2 – Special Security Officer/Command Security Manager
N3 - Model Management/Organizational Structure
N4 – Technical Support/Logistics
N5 – Functional Integration Directorate
N6 – Knowledge Management
N7 – Training Directorate
N8 - Comptroller Organization
Command logo
Vis Per Scientiam: “Strength through Knowledge”

The CID Command logo represents how CID provides the Fleet with optimally trained Sea and Joint Force Warriors who create a tactical advantage for mission success in the information domain.
Identify who holds the following collateral duties and describe their purpose.
CMEO – ITC Twitty
SAPR – Chief Castro
Safety Officer – OCEANA SAFETY OFFICE (IT1 STRUHS IS OUR LOCAL REP)
DAPA – ETC Smith
Security/OPSEC Officer – Mr. Sims
ISSM –ITC Jones, Richard
CFS – ITC Hungerman
CCC – ITC Mudrak
EKMS Manager – N/A (ET1 Smith is the Local Element)UPC – ITC Brown, Chris / ITC Mudrak
ESO – ITC Zakimi
CACO –ITC Brown, Jeremiah
CIAC –ITC Brown, Chris
CFL – ITC Woodson
CPR –IT1 Reiker
Navy Cool – ITC Jones
What DoD Directive governs “Information Assurance Training, Certification, and Workforce Management,” for the Navy?
DoD 8570.01-M
Computer Network Defense (CND)
Actions taken to protect, monitor, analyze, detect, and respond to unauthorized activity within the Department of Defense information systems and computer networks.
Computer Network Attack (CNA)
Actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers
Computer Network Exploitation (CNE)
Enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or networks.
Information security
The protection of information and information systems against unauthorized access
Defense-in-depth
The DON-preferred security strategy whereby layers of protection establish an adequate security posture for a system
Incident
an assessed event of attempted entry, unauthorized entry, or an information attack on an automated information system
The three tiers the DOD is organized into to conduct CND
Tier One (Global)

Tier Two (Regional/Theater)

Tier Three (Local)
What are the three services provided by CND?
Protect.

Monitor, Analyze, and Detect.

Respond.
The Navy’s Computer Network Defense Service Provider (CNDSP)?
Navy Cyber Defense Operations Command (NCDOC)
The Information Assurance reporting process.
When a user or system administrator suspects a computer security incident, he/she must contact the command Information Assurance Manager (IAM).
Who is the Command Information Assurance Manager (IAM)?
Bob West
List the 3 firewall types used to protect Navy networks.
Packet Filtering

Stateful Packet Filtering

Application Proxies
Intrusion Detection System (IDS)
An Intrusion Detection System (IDS) is a device that attempts to detect intrusion into a computer or network by observation or audit.
Intrusion Prevention System (IPS)
An Intrusion Prevention System (IPS) goes one step further and not only detects attacks but attempts to prevent them as well.
Vulnerability
A flaw or weakness in system security procedures, design, implementation, or internal controls that
Exploit
A piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability
Overall responsibility of Information Assurance Vulnerability Management (IAVM).
The Assistant Secretary of Defense
DES
Data Encryption Standard
RC-4
Rivest Cipher 4
RSA
Rivest, Shamir, Adleman
Overall responsible for the Command’s Electronic Key Management System (EKMS)?
Commanding Officer
Responsible to the Commanding Officer for EKMS?
EKMS manager
Account Clerk
An individual who is designated by the CO to assist the EKMS Manager
Functions and responsibility of the National Security Agency (NSA) in regards to COMSEC.
The National Security Agency serves as TIER 0 and is the executive agent for developing and implementing national level policy affecting the control of COMSEC material.
Function of the EKMS Central Facility (CF)
Functions primarily as a high volume key generation and distribution center
What are the three types of COMSEC incidents? Give examples of each.
Cryptographic – Use of keying material that is compromised, superseded, defective, previously used and not meant for reuse.

Personnel – Known and suspected defection, known and suspected espionage

Physical – The physical loss of COMSEC material
What is a Practice Dangerous to Security (PDS)?
Practices Dangerous to Security (PDS’s), while not reportable to NSA, are practices which have the potential to jeopardize the security of COMSEC if allowed to perpetuate.
What are the two types of Practices Dangerous to Security (PDS’s)?
Non Reportable PDS – Issuing without authorization more than 30 days before its effective period, late destruction, improperly completed accounting reports, etc.

Reportable PDS – use of keymat before its effective date, early destruction, etc.
Define Two-Person Integrity and the requirements associated with it.
Two Person Integrity (TPI) is a system of handling and storing COMSEC, designed to prevent single person access.

All Top Secret keying material or keying material designated CRYPTO, Fill Devices or physical media used to store Top Secret, and equipment with Top Secret keys that allow for extraction must have TPI applied to their handling and storage
What is electronic spillage and where can you find the procedures for reporting electronic spillage?
Electronic spillage is defined as data placed on an IT system possessing insufficient information security controls to protect the data at the required classification

Navy Telecommunications Directive (NTD) 03-06 outlines the procedures and reporting of an electronic spillage.
Loopback
The 127.0.0.0 range is reserved for loopback (primary means of testing the circuit or network interface card (NIC).
Default gateway
The 0.0.0.0 address range reserved for the default route (gateway of last resort)
What is a private IP address?
10.0.0.0 – 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
APIPA
Automatic Private IP Addressing is a feature of later Windows Operating Systems that allows clients to self configure an IP address and Subnet Mask when a DHCP server is unavailable.
Define the three types of connection media.
Copper cabling – Uses electrical signals to transmit data between devices

Fiber-optic cabling – Uses glass or plastic wire, also called fiber, to carry information as light pulses

Wireless connection – Uses radio signals, infrared technology (laser) or satellite transmissions
Dynamic Host Configuration Protocol(DHCP).
a software utility that automatically assigns IP addresses to client devices in a network.
Domain Name Service (DNS).
a system that provides a way to map friendly hostnames or uniform resource locater (URL) to IP address.
Active Directory.
A more flexible, directory service-based approach to network design allows for large distributed network environments that have a common centralized authority for network security.
Outlook Web Access (OWA)
Used to access email, calendars, contacts, tasks and other mailbox content when access to Microsoft Outlook desktop is unavailable.
(PORTS)
FTP
Telnet
SMTP
DNS
HTTP
POP3
HTTPS
FTP - 20
Telnet - 23
SMTP - 25
DNS - 53
HTTP - 80
POP3 - 110
HTTPS - 443
TELNET
Provides a bidirectional interactive text-oriented communications facility using a virtual terminal connection.
RAID
RAID 0 – Striped Set or Striped Volume; splits data evenly across sets of two disks or more with no parity

RAID 1 – Mirroring; mirrors data on two or more disks

RAID 5 – Uses block level striping with parity data distributed across all member disks (three of more).
Directed Net
Directed nets are necessary when complicated traffic patterns or security factors exist and warrant direct control of each transmission.
Free Net
- When operating conditions permit, the NECOS may direct that the net be operated as a free net. Member stations are thereby authorized to transmit traffic to other net stations without obtaining prior permission from the NECOS
State the responsibilities of a Net Control Station (NECOS)
Expedite traffic flow on the net.

Maintain circuit discipline.

Limit transmissions to the essential minimum.

Resolving disputes incident to message handling.
What information can be found on the Technical Control Facility (TCF) status board?
Functional title of circuit.

Frequency(s), both send/receive if full duplex operation is employed.

Circuit designator, from communication plan.

Transmitter/receiver designations.
Fleet Telecommunication Procedures (FTP)
Issued by NCTAMS to promulgate standard telecommunications procedures for use by communications personnel
Naval Telecommunications Procedures (NTP)
Official documents that define procedures and protocols for telecommunication.
Communications Equipment Population Summary (CEPS)
A complete list of communications equipment on board ship