Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
John Walker
|
Led a spyring along with his brother, friend and son. Compromised US Navy cryptographic systems and classified information from 1967 - 1985.
|
|
Creation of ONI
|
March 23rd 1882
Under then SECNAV William H. Hunt. |
|
DD Form 1348-6
|
6-Part carbon-interleaved form for Non-NSN requisitions.
|
|
DD Form 200
|
Form for report of missing material.
|
|
Atmospheric Pressure
|
Pressure exerted by a column of air on any point of the Earth's surface. Measured in barometers or inches of Mercury.
|
|
Cold Front/
Warm Front |
Leading edge of an advancing mass of warmer (or cooler) air.
|
|
Attack on USS Stark
|
May 17th, 1987
Stark was hit by 2 antiship missiles from an Iraqi Mirage F-1 jet during the Iran-Iraq war. 37 Sailors died. |
|
EC-121 Shootdown
|
April 15th, 1969
Navy Lockheed EC-121M Warning Star was conducting recon and shot down by a N.Korean MiG-17 over the Sea of Japan. Nixon Admin. decided not to retaliate. All 31 Americans onboard killed. |
|
Apollo 17
|
7-19 December 1972
Eugene Cernan & Ronald Evans Navy's 7th and Final lunar landing mission. |
|
Defense in Depth
|
An IA strategy in which multiple levels of defense are placed throughout an IT system.
|
|
Navy/Marine Corps Qualities
|
A Ready, Flexible, Self-sustaining and Mobile Force.
|
|
3M Provides:
|
Standardization
Efficiency Documentation Analysis Configuration Status-accounting Scheduling (SEDACS) |
|
# of Ships supported by LNSC for Pier Services.
|
23 ships between Yokosuka, Sasebo and Guam.
|
|
AMD
|
Activity Manpower Document
Single official statement of funded and unfunded requirements for each UIC. |
|
DAA
|
Designated Approval Authority
Official with the authority to formally assume responsiblity for operating a system at an acceptable level of risk. |
|
PIR
|
Priority Intelligence Requirements.
Intel requirements critical to accomplishing the mission. Related to Command's COA. |
|
CCIR
|
Commander's Critical Intelligence Requirements.
Crucial Intel that requires the immediate attention of the commander. |
|
Fusion Cell
|
Intel from various sources is validated, correlated, analyzed and disseminated to support operatoins.
|
|
Buffer Overflow
|
Anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory. Results in erratic program behaviour.
|
|
Brute Force Attack
|
Strategy used to break the encryption of data; involves searching all possible keys until the correct key is found.
|
|
Network Enumeration
|
Computing activity in which usernames, and info on groups, shares and services of networked computers are retrieved for vulnerabilities in the security of that network.
|
|
NACLC
|
National Agency Check with Local Agency and Credit Checks.
|
|
TYCOM
|
Mission is to organize, train, and equip computer and telecommunications activities.
|
|
Officer Programs Available to Enlisted
|
Unrestricted Line Competitive Category
Restricted Line Competitive Category Limited Duty Officer Warrant Officer |
|
Security Violation
|
Failure to comply with the regulations for the protection and security of classified material.
|