Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
21 Cards in this Set
- Front
- Back
Mission of NAVNETWARCOM
|
Commands and controls Navy networks and leverages joint space capabilities to deliver Information Dominance for Navy and Joint operations.
|
|
IA (Information Assurance)
|
Practices and Procedures of computer security.*
|
|
Rivercity
|
Measures designed to prohibit or restrict RF communications from a ship.
4 Levels. |
|
OTAT & OTAR
|
Over-the-Air Transfer
Over-the-Air Rekey Transfer of cryptographic keymat "over-the-air". OTAT - WITHOUT change of the Traffic Encryption Key. OTAR - WITH change of the Traffic Encryption Key (TEK). |
|
Purpose of Intelligence
|
1.) Supporting the Commander
2.) Identifying centers of gravity and critical vulnerabilities 3.) Supporting planning and the execution of operations. 4.) Protecting the force. 5.) Supporting combat assessment. |
|
SSA
(Space Situational Awareness) |
The ability to know not only raw information on what is going on in space but also how it affects our use of space.
|
|
EHF TIP
|
Provides an ethernet connection between a ship's ADNS Router and its EHF MDR Terminal.
|
|
Spillage
|
Data placed on an Information System posessing insufficient security controls to protect the data.
|
|
CAT Team
|
Communications Assist Team.
A group of listed technical experts who routinely perform on-site communications training to deploying commands. |
|
AESOP
|
Afloat Electromagnetic Spectrum Operations Program.
An integrated operational radar, combat systems and communication "Frequency Planning Tool". |
|
IT21
|
Serves as primary network for Afloat Commands.
|
|
SQL Injection
|
Code injection technique that exploits a security vulnerability occuring in the data base layer of an application.
|
|
Network Enumeration
|
Is a computing activity in which user names, and info on groups, shares and services of networked computers are retrieved for vulnerabilities in the security of that network. If there is a vulnerability with the security of the network, it will send a report back to a hacker.
|
|
Backdoor
|
Method of bypassing normal authentication.
|
|
Privilege Escalation
|
Act of exploiting a bug or design flaw in a software application to gain access to resources which normally would have been protected.
|
|
Functionality of PKI
|
Creating a secure method for exchanging information.
|
|
Ginger Bread
|
Radio-Telephone procedure used when any member of a net is suspected of compromise.
|
|
Bead Window
|
Radio-Telephone procedure used when an EEFI has been disclosed.
|
|
EEFI Codes
|
#1 Position
#2 Capabilities #3 Operations #4 Electronic Warefare #5 Personnel #6 COMSEC #7 Wrong Circuit |
|
Certificaiton
|
Comprehensive evaluation of technical and non-technical security safeguards of an Info Sys.
|
|
Accreditation
|
Formal declaration that an InfoSys. is approved to operate.
Issued by DAA/PAA |