Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
112 Cards in this Set
- Front
- Back
Host/Client
|
Host is the main computer connected to other computers (clients) to which it provides data or computing services via a network
|
|
Application Server
|
A specialized server in a client server network that has the sole responsibility of running specific applications within that network i.e. a Netscape or Oracle application server
|
|
Hub
|
A common connection point for devices in a network. Usually used to connect segments of a LAN
|
|
Switch
|
Same as a HUB only smarter. It will only forward the packet to the intended recipient port
|
|
Router
|
A physical device that joins multiple wired or wireless networks together. For example your home network uses a router to connect the home LAN to the WAN of the internet.
|
|
WAP – Wireless access protocol
|
An open international standard for application-layer network communications in a wireless communication environment. Most common use involves accessing the mobile web from a mobile phone or PDA.
|
|
Proxy server
|
An internet server that controls client access to the internet. It can stop employees from accessing undesirable websites and it can hide the internal network’s identity so monitoring is difficult for external users.
|
|
Firewall
|
A device configured to permit or deny computer applications upon a set of rules or other criteria. Used to block unauthorized access while permitting authorized communications.
|
|
VPN Concentrator – Virtual Private Network
|
A network created within the internet only accessible to permitted users
|
|
Back-up
|
The process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event.
|
|
Repeater
|
Regenerate incoming electrical, wireless or optical signals. With physical media like Ethernet or Wi-Fi, data transmissions can only span a limited distance before the quality of the signal degrades. Repeaters attempt to preserve signal integrity and extend the distance over which data can safely travel
|
|
Access Layer of Routing
|
Small Office Home Office (SOHO) routers. are located at customer sites such as branch offices that do not need hierarchical routing of their own. Typically, they are optimized for low cost.
|
|
Distribution Layer of Routing
|
aggregate traffic from multiple access routers to a major enterprise location often are responsible for enforcing quality of service across a WAN, so they may have considerable memory, multiple WAN interfaces, and substantial processing intelligence
|
|
Core Layer of Routing
|
provide a "collapsed backbone" interconnecting the distribution tier routers from multiple buildings of a campus, or large enterprise locations. They tend to be optimized for high bandwidth
|
|
Bus
|
Network architecture in which a set of clients are connected via a shared communications line, called a bus
|
|
Star
|
All devices are connected to a central hub
|
|
Ring
|
Network topology in which each node connects to exactly two other nodes, forming a ring
|
|
Mesh
|
The topology of a network whose components are all connected directly to every other component
|
|
LAN or Local Area Network
|
A computer network covering a small physical area, like a home, office, or small group of
buildings. |
|
WAN or Wide Area Network
|
A computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries
|
|
MAN or Metropolitan Area Network
|
A large computer network that usually spans a city or a large campus
|
|
GAN or Global Area Network
|
A network that is composed of different interconnected computer networks and covers an unlimited geographical area
|
|
NIPRNET
|
Non-classified Internet Protocol Router Network, unclassified to sensitive information on an internal basis also provides internet access, DOD owned
|
|
SIPRNET
|
Secret Internet Protocol Router Network, deployed to Embassies and Military Commands
|
|
JWICS
|
Joint Worldwide Intelligence Communications System, network to connect all DOD Intelligence Information Systems together
|
|
DoDN (GIG) – DOD Network the Global Information Grid
|
A Globally interconnected end-to-end set of information capabilities for collecting processing, storing, disseminating, and managing info on demand to the war fighter, policy makers, and support personnel.
|
|
DISN – Defense Information Systems Network
|
The DOD enterprise network for providing data, video, and voice services
|
|
NMCI – Navy/Marine Corps Intranet
|
A DON program where information Technology services have been outsourced to an outside contractor. Deployed throughout the Navy and Marine Corps
|
|
ONE-NET – OCONUS Navy Network
|
A Navy-wide initiative to install a common and secure IT infrastructure to OCONUS Navy locations. It is based on the Navy-Marine Corps Intranet (NMCI) architecture and is designed to be interoperable with IT-21, NMCI, and the Global Information Grid
|
|
IT21
|
Information technology for the 21st century
|
|
Machine Language
|
Also called machine code, this is the low-level binary code executed by the processor
|
|
Assembly Language
|
Is a low level programming language using the human readable instructions of the CPU. One level removed from machine language
|
|
High Level Language
|
That enables a programmer to write programs that are more or less independent of a particular type of computer. Such languages are considered high-level because they are closer to human languages and further from machine languages i.e. C, Python, C++
|
|
Operating System
|
Is an interface between hardware and user, which is responsible for the management and coordination of activities and the sharing of the resources of a computer, that acts as a host for computing applications run on the machine
|
|
Application
|
Any program designed to perform a specific function directly for the user or, in some cases, for another application program
|
|
Virus
|
Software program, script, or macro designed to infect, destroy, modify, or cause other problems with your computer or software programs. Some only cause a minor modification i.e. Happy Birthday others however are very harmful i.e. cause hard drives to be erased
|
|
Worm
|
A self-replicating virus that does not alter files but resides in active memory and duplicates itself this causes the system to slow or halt completely
|
|
Trojan
|
A program that appears legitimate, but performs some illicit activity when it is run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy data or programs on the hard drive.
|
|
Backdoor
|
A remote administration utility that, once installed on a computer, allows a user access and control it over a network or the Internet. A backdoor is usually able to gain control of a system because it exploits undocumented processes in the system's code.
|
|
Phishing
|
A criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Usually associated with ID theft or bank fraud
|
|
Network Enumeration
|
A computing activity in which user names, and info on groups, shares and services of networked computers are retrieved. This can expose vulnerabilities that lead to unauthorized access and havoc
|
|
Buffer Overflow
|
An anomaly where a process stores data in a buffer outside the memory the programmer set aside for it. This can cause catastrophic errors.
|
|
(SQL) Structured Query Language Injection
|
An attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and execution
|
|
Dictionary Attack
|
A method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a password
|
|
Privilege Escalation
|
The act of exploiting a bug or design flaw in a software application to gain access to resources which normally would have been protected from an application or user
|
|
Brute Force Attack
|
A technique used to break an encryption or authentication system by trying all possibilities. This usually only takes about half as many tries as there are possibilities
|
|
Social Engineering
|
The practice of tricking a user into giving, or giving access to, sensitive information, thereby bypassing most or all protection
|
|
Describe the functionality of PKI
|
A set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates that are unique to each user
|
|
State the purpose of DNS
|
Domain Name System – Translates domain names meaningful to humans into the numerical identifiers associated with networking equipment. Example: It translates www.example.com into 192.0.32.10
|
|
Red Cross Message
|
Red Cross messages are delivered 24x7x365 to military personnel at any duty station
|
|
ADNS – (Automated Digital Networking System)
|
The primary function of the ADNS is to connect Navy shipboard networks to other ship and shore networks for transferring Internet Protocol (IP) data of various classification levels
|
|
CUDIXS – (Common User Digital Information Exchange System)
|
Provides a 2400 baud full duplex interface, over a satellite link with mobile platforms, for the receipt and transmission of GENSER (GENeral SERvice) message traffic between FMX (Fleet Message Exchange System) and mobile platforms equipped with afloat automated systems
|
|
VERDIN – (VLF Digital Information Network)
|
Is a broadcast system that provides a highly reliable and secure system for worldwide delivery of operational, tactical, and administrative messages from the Fleet Submarine Broadcast System (FSBS) and Minimum Essential Emergency Communications Network (MEECN / a network of systems providing uninterrupted communications throughout a nuclear warfare environment.
|
|
NOVA
|
Is an Automated Message Store and Forward system. NOVA is a UNIX based. Defense Message System Transitional Hub)
|
|
IBS – (Integrated Broadcast System)
|
Has integrated several existing intelligence and information dissemination systems into a single system of broadcasts that will allow for the receipt of data via a single receiver (the joint tactical terminal).
|
|
INMARSAT – (International Maritime Satellite)
|
Non-profit organization that connects satellites for maritime communication.
|
|
Defense Message System
|
A profiling system that forewords messages based on criteria to parties that are required to take action on a message.
|
|
NREMS – Navy Regional Enterprise Message System
|
Provides web-based messaging capability that allows users (with accounts) to send and receive DMS messages using a web browser or via email
|
|
AMHS – Automatic Message Handling System
|
Provides simplified message drafting, coordination, and release of outgoing messages and a message internal distribution and delivery function for incoming messages
|
|
VTC – (Video Teleconferencing)
|
An extension of traditional telephony technologies with the added feature of being able to see the person or persons with whom one is talking
|
|
DCO – (Defense Connect Online)
|
A Web-based virtual meeting room
|
|
GINGERBREAD
|
Warns that “voice imitative deception is suspected on the network"
|
|
BEADWINDOW
|
A real-time procedure which brings to the immediate attention of circuit operators the fact that an EEFI (Essential Elements of Friendly Information) disclosure has (or may have) occurred
|
|
RIVERCITY
|
Communications is cut, severing the ship, command, or tactical squad from the outside world
|
|
Meaconing
|
The intentional transmission of signals designed to deceive users of navigational aids (tactical air navigation, GPS, nondirectional beacon, instrument landing system, etc.).
|
|
Intrusion
|
The intentional insertion of EM (electromagnetic) energy into transmission paths in any manner, with the objective of deceiving operators or causing confusion
|
|
Jamming
|
The deliberate radiation, re-radiation, or reflection of EM energy for the purpose of preventing or reducing an enemy’s effective use of the EM spectrum and with the intent of degrading or neutralizing the enemy’s combat capability
|
|
Spectrum Management
|
Used to ensure that various combatant units and AORs practice good RF hygiene. Each DoD Branch has it's own spectrum management guidance, with the ones for the Army (FM 24-2) and USMC (MCO 2400.2) being available for study
|
|
PLA – (Plain Language Address)
|
Is the component used to denote the command short title and sometimes geographic location used in message addressing
|
|
DTG – (Date Time Group)
|
An indicator is assigned to uniquely describe a message for identification and file purposes only. A DTG has two parts
|
|
UTC – (ZULU)
|
Coordinated Universal Time (more commonly known as Greenwich Mean Time / GMT).
|
|
R – Routine
|
For messages of all types that justify transmission by rapid means unless they are of sufficient urgency to require higher precedence. Speed of service - 6 hours
|
|
P – Priority for messages
|
Reserved for messages containing essential information for the conduct of operations in progress. This is normally the highest precedence for administrative messages. Speed of service - 3 hours
|
|
O – Immediate
|
Reserved for messages relating to situations that gravely affect the national forces or populace, and require immediate delivery to the addressees. Speed of service - 30 minutes
|
|
Z – Flash
|
This precedence is reserved for initial enemy contact messages or operational combat messages of extreme urgency. Brevity is mandatory. Speed of service - As fast as possible!
|
|
W – Flash Override
|
Overrides all other codes, including Flash.
|
|
OPTASK COMMS
|
Which nets and approved frequencies are authorized for use within a given area
|
|
COMMPLAN
|
What communication circuits are required and indicate where/when they are needed throughout a given underway period
|
|
(TSO) Telecommunication Service Order
|
Authorization from DISA to start, change, or discontinue circuits or trunks.
|
|
(TSR) Telecommunication Service Request
|
An approved and funded telecom requirement for communication service
|
|
COMSPOT/Communications service advisory
|
A message of a disruption or known loss of service in communications
|
|
Electronic Key Management System (EKMS)
|
Administrative controls to track, issue, filing, use or order electronic key material
|
|
(OTAT/OTAR) Over The Air Transfer/Over the Air Rekey
|
Electronic keymat sent over the air to required units
|
|
Describe TEMPEST
|
The practice of preventing emissions from leaving and potentially being intercepted by using means such as shielding
|
|
Emissions Control (EMCON)
|
Control of all electromagnetic and acoustic radiations
|
|
Mobile Detachment
|
to deploy in support of a tasked requirement
|
|
Direct Support Assets
|
DIRSUP Assets are used for short-duration requirements which require specialists not normally included in a ship’s PCS complement
|
|
Mine Warfare UUV Platoon
|
Consist of Remote Environmental Monitoring Units (REMUS) conducting oceanographic
surveys designed to integrate new sensors into current programs |
|
Naval Oceanography ASW Team (NOAT)
|
Provide environmental support to ASW forces worldwide at various Fleet and COCOM echelons.
|
|
Strike Group Oceanography Team (SGOT)
|
Provide timely, comprehensive, and tactically relevant meteorological and oceanographic (METOC) products
|
|
Mobile Environmental Teams (MET)
|
These teams carry with them all of the equipment needed to accomplish their forecast mission to ships at sea or shore commands forward
|
|
Fleet Survey Team (FST)
|
A rapid-response team capable of performing quick-turnaround hydrographic surveys anywhere in the world.
|
|
(PSYOPs)
|
DOD defines PSYOP as planned operations to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals.
|
|
(MILDEC)
|
Deception guides an enemy into making mistakes by presenting false information, images, or statements.
|
|
OPSEC
|
Defined as a process of identifying information that is critical to friendly operations and which could enable adversaries to attack operational vulnerabilities
|
|
Electronic Warfare (EW)
|
EW is defined by DOD as any military action involving the direction or control of electromagnetic spectrum energy to deceive or attack the enemy
|
|
Red Team
|
Uses publicly available data to test Information Assurance Vulnerability Alert and system configuration compliance of U.S. Navy networks and attempt to detect any vulnerabilities
|
|
Blue Team
|
Ensures U.S. Navy networks meet Information Assurance Vulnerability Alert and system configuration compliance; provides assistance prior to and during inspections to remedy discrepancies
|
|
Fleet Electronic Support
|
Installs and maintains specialized equipment for permanent and ad-hoc missions
|
|
USC Title 10
|
Outlines the role of armed forces in the United States Code. It provides the legal basis for the roles, missions and organization of each of the services as well as the United States Department of Defense
|
|
Subtitle A
|
General Military Law, including UCMJ
|
|
Subtitle B
|
Army
|
|
Subtitle C
|
Navy and Marine Corps
|
|
Subtitle D
|
Air Force
|
|
Subtitle E
|
Reserve Components
|
|
USC Title 50
|
Outlines the role of War and National Defense in the United States Code. (Chapter 36, Foreign Intelligence Surveillance, germane.)
|
|
Define CRITIC
|
A report used to notify the President and the National Security Council of critical information
|
|
CCOP – Cryptologic Carry-On Program
|
Provides specialized equipment for Fleet cryptologic requirements
|
|
NITES – Navy Integrated Tactical Environmental Subsystem
|
The Navy is currently the nation's only military service that operates a distributed model in support of tactical weather prediction
|
|
JDISS – Joint Deployable Intelligence Support System
|
Provides a family of hardware and software capabilities that allow connectivity and interoperability with intelligence systems supporting forces, in garrison, and deployed during peace, crisis, and war.
|
|
Maritime Domain Awareness
|
Defined as the effective understanding of anything associated with the maritime domain that could impact the security, safety, economy, or environment
|
|
(MOC) Maritime Operations Center
|
Provides critical support in the execution of the nation's Maritime Strategy, giving commanders the processes, enabled by interoperable, networked systems, to enhance maritime capabilities
|