• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/32

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

32 Cards in this Set

  • Front
  • Back
what is information operations (IO)?
IO is the integrated employment of the core capabilities of Electronic warfare (EW), Computer network operations (CNO), psychologicial operations (PSYOP), military deception (MILDEC), and operational security (OPSEC), in concert with specified supporting and related capabilites, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting their own
when was us cyber command (USCYBERCOM) established? by who?
sec def
october 2009
what does USCYBERCOM fall directly under?
USSTRATCOM
us strategic command
what is the naval component of USCYBERCOM?
FLTCYBERCOM (10th fleet)
FLTCYYBERCOM mission?
to serve as central operational authority for networks, intelligence, cryptology/sigint, information operations, cyber, electronic warfare, and space in support of forces aloat and ashore; operate a secure, interoperable naval network; coordinate navy's operational requirements for intelligence, information operations, networks, cryptology/sigint, and space capabilites
GIG?
global information grid
CNO operations?
cyberspace
cyberspace operations
global information grid (GIG)
computer network attack (CNA)
computer network defense (CND)
computer network exploitation (CNE)
cyberspace?
global domain within information environment consisting of the interdependent network of information technology infrastures

including: internet, telecom networks, computer systems, processors, controllers
cyberspace operations?
employment of cyber capabilites where the primary purpose is to achieve objectives in or through cyberspace
global information grid (GIG)?
global information cpabilites associated with prcoesses/personnel for collecting, processing, storing, disseminating, and managing information for military personnel
computer network attack (CNA)?
actions tken through computer networks to disrupt, deny, degrade, or destroy information resident in computers or networks
computer network defense (CND)?
actions taken to defence, detect, moitor, and respond to attacks against our networks
computer network exploitation(CNE)?
operations to gather data from enemy's automated informations systems/networks
information assurance (IA)?
meausures that protect and defend information and information systems
network defenders strive for?
Availability-timely/relable acces to data

integrity-protetion of information against unauthorized changes

authentication-verifying the identity of person trying to connect

confidentiality- protection of sensitive/classified information

non-repudiation-assurance to sender/reciever so neither can deny having processed the data
3 main lvl's of classification?
confidential
secret
top secret
confidential?
requires protections to unauthorized disclosure

can cause damage to national security
secret?
requires substantial degree of protection

could cause serious damage to national security
top secret?
requires highest degree of protection

could cause exceptionally grave damage to national security
information may be given to people who.....?
have appropriate clearance

valid need to know the information
NIPRNET?
non secure internet protocol router netwrok

computers with complete access to WWW
SIPRNET?
secured internet protcol router network

not connected to internet, used to send classified info
defense in depth?
stationaing of mutually suppporting dfense positions designed to absorb and progressively weken attack, prvent initial observations of the whole position by enemy, and to allow the commander to maneuver the reserve
defense in depth layers?
Data
Application
Host
Internal Network
Perimeter
Physical
Policies/Procedures/Awareness
social engineering?
description: attacks finds info from sources that when pieced together can break into a system

defense: recognizing available personal public information and controlling it
phishing?
description:high-tech scam tha uses emails/websites to decieve you into disclosing your credit card numbers, bank account info/social secruity,

defense:pay close attention to emails/web sites asking for personal or system information
spoofing and misdirection?
description:unauthorized used of legitimated identification and authentication data

defense: check links to make sure they match expected links
software vulnerability/malware?
description: hackers use vulnerabilites in existing programs or creat their own to break into systems

Defense: keep security patches and antivirus up to date
password cracking?
description: hackers crack encryption and find out a password

defense: make password crackign more complex by using longer passwords
intercepting traffic?
description: network traffic that isn't encrypted can be read by attacker including passwords

defense: encrypt your messages
security hopping?
description:attacker has acces to one machine, use information to gain acces to other machines

defense: use deifferent passwords for different systems
improper use of CAC?
description: somebody uses your common access card to get into something

defense: if you lose your CAC, report it immediately