• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/21

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

21 Cards in this Set

  • Front
  • Back
Mission of NAVNETWARCOM
Commands and controls Navy networks and leverages joint space capabilities to deliver Information Dominance for Navy and Joint operations.
IA (Information Assurance)
Practices and Procedures of computer security.*
Rivercity
Measures designed to prohibit or restrict RF communications from a ship.
4 Levels.
OTAT & OTAR
Over-the-Air Transfer
Over-the-Air Rekey
Transfer of cryptographic keymat "over-the-air".
OTAT - WITHOUT change of the Traffic Encryption Key.
OTAR - WITH change of the Traffic Encryption Key (TEK).
Purpose of Intelligence
1.) Supporting the Commander
2.) Identifying centers of gravity and critical vulnerabilities
3.) Supporting planning and the execution of operations.
4.) Protecting the force.
5.) Supporting combat assessment.
SSA
(Space Situational Awareness)
The ability to know not only raw information on what is going on in space but also how it affects our use of space.
EHF TIP
Provides an ethernet connection between a ship's ADNS Router and its EHF MDR Terminal.
Spillage
Data placed on an Information System posessing insufficient security controls to protect the data.
CAT Team
Communications Assist Team.
A group of listed technical experts who routinely perform on-site communications training to deploying commands.
AESOP
Afloat Electromagnetic Spectrum Operations Program.
An integrated operational radar, combat systems and communication "Frequency Planning Tool".
IT21
Serves as primary network for Afloat Commands.
SQL Injection
Code injection technique that exploits a security vulnerability occuring in the data base layer of an application.
Network Enumeration
Is a computing activity in which user names, and info on groups, shares and services of networked computers are retrieved for vulnerabilities in the security of that network. If there is a vulnerability with the security of the network, it will send a report back to a hacker.
Backdoor
Method of bypassing normal authentication.
Privilege Escalation
Act of exploiting a bug or design flaw in a software application to gain access to resources which normally would have been protected.
Functionality of PKI
Creating a secure method for exchanging information.
Ginger Bread
Radio-Telephone procedure used when any member of a net is suspected of compromise.
Bead Window
Radio-Telephone procedure used when an EEFI has been disclosed.
EEFI Codes
#1 Position
#2 Capabilities
#3 Operations
#4 Electronic Warefare
#5 Personnel
#6 COMSEC
#7 Wrong Circuit
Certificaiton
Comprehensive evaluation of technical and non-technical security safeguards of an Info Sys.
Accreditation
Formal declaration that an InfoSys. is approved to operate.
Issued by DAA/PAA