• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/60

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

60 Cards in this Set

  • Front
  • Back

Operational Risk Management

Is a decision making tool used by personnel at all levels to increase effectiveness by identifying, assessing, and managing risks. By reducing the potential for loss, the probability of a successful mission is increased.

Explain the steps of ORM

a. Identify Hazards


b. Assessing Hazards


c. Making Risk Decisions


d. Implementing Controls


e. Supervising

Describe the mission of the Center for Information Dominance’s (CID)

To train and develop Full Spectrum Joint Cyber and SIGINT Warriors capable of conducting Information Dominance operations across the entire range of military operations.

Describe the Center for Information Dominance organizational structure and training

Center for Information Dominance (CID) Corry Station
Navy Marine Corps Intelligence Training Center (NMITC)
Fleet Intelligence Training Center (FITC)
CID UNIT Corry Station (CIDUC) – Enlisted A & C schools and IW Officer COI

Describe the role and responsibilities of the Cryptologic Resource Coordinator (CRC)

Manages direct support (DIRSUP) elements within the task force



Coordinates coverage plans



Directs reporting responsibilities for all cryptologic resources assigned to the operational commander.

Computer Network Defense (CND):

actions taken to protect, monitor, analyze, detect, and respond to unauthorized activity within the DoD information systems and computer networks.

Computer Network Attack (CNA):

actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves.

Computer Network Exploitation (CNE):

enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or networks.

Global Information Grid (GIG):

the globally interconnected, end-to-end set of information capabilities, and associated processes for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel; includes owned and leased communications and computing systems and services, software, data, security services, other associated services and National Security Systems.

Information Security (IS):

the protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit, and against denial of service to authorized users.

Defense in Depth:

is the DON-preferred security strategy whereby layers of protection establish an adequate security posture for a system. The strategy is based on the concept that attacks that must penetrate multiple protection layers of the system are less likely to be successful. In addition to this layered approach, protection mechanisms are distributed among multiple locations, and each component of defense within the system provides an appropriate level of robustness. Management of risk is the objective of IA in a defense-in-depth strategy.

Incident:

an assessed event of attempted entry, unauthorized entry, or an information attack on an automated information system. It includes unauthorized probing and browsing; disruption or denial of service; altered or destroyed input, processing, storage, or output of information; or changes to information system hardware, firmware, or software characteristics with or without the users’ knowledge, instruction, or intent.

List the three tiers and three operational roles the Department of Defense (DoD) is organized into for conducting CND.

Tier One (Global): provides DOD-wide CND operational direction or support to Combatant Command, Service, Agency and field activities.


Two (Regional/Theater): provides DOD component-wide operational direction or support and responds to direction from Tier One.


Tier Three (Local): provides local operational direction or support and responds to direction from a designated Tier Two entity.

List the three services provided by CND.

Protect



Monitor, Analyze, and Detect



Respond

Name the Navy’s Computer Network Defense Service Provider.

Navy Cyber Defense Operations Command (NCDOC)

Describe the Information Assurance (IA) reporting process.

a.

List the three firewall types used to protect Navy Networks.

Packet Filtering: only examines traffic based on the packet header.


Stateful Packet Filtering: works at the network and transport layers (on the OSI model) by examining the packet header.


Application Proxies: is the most sophisticated firewall type. Features both packet filters and stateful packet filters.

Explain what an Intrusion Detection System (IDS) is.

Is a device that attempts to detect intrusion into a computer or network by observation or audit.

Explain what an Intrusion Prevention System (IPS) is.

An IPS goes one step further than an IDS and not only detects attacks but attempts to prevent them as well.



An IPS is a type of IDS that can prevent or stop unwanted traffic.

RC-4

(Rivest Cipher 4)- a popular streaming symmetric-key algorithm

RSA

(Rivest Shamir Adleman)- an improved public-key cryptography algorithm that enables secure digital signatures

Blowfish

A derivative of DES to try to address susceptibility to brute-force attacks.

DES

(Data Encryption Standard)- a symmetric-key algorithm developed by the U.S. Government in the 1970s and was formerly in use in a variety of TCP/IP applications. DES used a 64-bit block and a 56-bit key. Over time, the 56-bit key made DES susceptible to brute-force attacks.

Define the responsibilities of the Electronic Key Management System (EKMS) Manager.

Is appointed in writing by the Commanding Officer and must have at least one alternate. The EKMS manager is responsible to the CO for the commands EKMS program.

Define the term Account Clerk.

is an individual who is designated by the CO to assist the EKMS Manager and Alternate (s) with routine administrative account matters. The appointment is not mandatory, but is at the discretion of the CO.

State the function of the EKMS Central Facility (CF).

Functions primarily as a high volume key generation and distribution center.



The CF will interoperate with commands through a variety of media, communication devices, and networks, allowing for the automated ordering of COMSEC key and other materials generated and distributed by NSA.

State the functions of the Department of the Navy (DON) in regards to Communications Security (COMSEC):

Administers its own CMCS, which includes Navy, Marine Corps, Coast Guard, and Military Sealift Command (MSC) EKMS Accounts. The DON system implements national policy, publishes procedures, establishes its own EKMS accounts and serves as a Service Authority (SERVAUTH) for COMSEC material.

State the functions of the Chief of Naval Operations (CNO) in regards to Communications Security (COMSEC):

has overall responsibility and authority for implementation of National COMSEC policy within the DON.

State the functions of the Director, Communications Security Material System (DCMS) in regards to Communications Security (COMSEC):

administers the DON COMSEC program and is the SERVAUTH for Department Of the Navy.

State the three types of COMSEC incidents.

Cryptographic – Use of keying material that is compromised, superseded, defective, previously used and not meant for reuse.



Personnel – Known and suspected defection, known and suspected espionage



Physical – The physical loss of COMSEC material

Define Two-Person Integrity and the requirements associated with it.

Two Person Integrity (TPI) is a system of handling and storing COMSEC, designed to prevent single person access.


TPI Handling requires two qualified personnel, who are able to recognize incorrect or unauthorized security procedures, to stay in constant view of each other.


TPI Storage requires the use of two approved combination locks and at no time will allow for a single individual to have access.

Define electronic spillage.

Data placed on an IT system possessing insufficient information security controls to protect the data at the required classification.

List the three most common Internet Protocol (IP) address ranges.

The three most common Internet Protocol (IP) address classes are A, B, and C.

Explain what a private IP address is. Give an example.

Internet Assigned Numbers Authority (IANA) has reserved certain IP addresses as private addresses for use with internal web sites or intranets. These addresses are not routable on the public Internet, but are meant for devices that reside behind a router or other network Address Translation (NAT) device or proxy server.


10.0.0.0 – 10.255.255.255 (Class A license)
172.16.0.0 - 172.31.255.255 (Class B license)
192.168.0.0 - 192.168.255.255 (Class C license)

Define the three types of connection media.

Copper cabling – Uses electrical signals to transmit data between devices


Fiber-optic cabling – Uses glass or plastic wire, also called fiber, to carry information as light pulses


Wireless connection – Uses radio signals, infrared technology (laser) or satellite transmissions

Dynamic Host Configuration Protocol (DHCP)

a software utility that automatically assigns IP addresses to client devices in a network.

Domain Name Service (DNS)

a system that provides a way to map friendly hostnames or uniform resource locater (URL) to IP address

Active Directory

A more flexible, directory service-based approach to network design allows for large distributed network environments that have a common centralized authority for network security

Exchange Server

Microsoft Exchange server is the server side of a client-server, collaborative application with major features to include: electronic mail, calendaring, contacts, and tasks. Exchange server is integrated with Active Directory and uses Active Directory as the storage mechanism for its data.

Outlook Web Access (OWA)

used to access email, calendars, contacts, tasks and other mailbox content when access to Microsoft Outlook desktop is unavailable.

List three user modes within the Commercial and Industrial Security Company (CISCO) Internetwork Operating System (IOS) and explain how they are indicated.

User mode—This is the first mode a user has access to after logging into the router.


Privileged mode—This mode allows users to view the system configuration, restart the system, and enter configuration mode.


Configuration mode—This mode allows users to modify the running system configuration.

Define the following servers that reside on a network and state their functionality.



Print Server, File Server, Web Server

Print Server - allow multiple computers in the network to access a single printer through a Network Interface Card (NIC).


File Server - is a server located on the network that provides a centralized storage area for shared disk access.


Web Server - is a computer program that delivers (serves) content, such as Web pages, using the Hypertext Transfer Protocol (HTTP), over the World Wide Web.

Identify the following ports and explain their uses:



53, 80, 110, 443

53 - Domain Name Service (DNS)– Address Translation


80 - Hypertext Transfer Protocol daemon (HTTP) – Web Browsing


110 - Post Office Protocol - used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection


443 – HTTP over Transport Layer Security/Secure Sockets Layer (HTTPS) Secure Web Browsing

Ping

is a computer network administration utility used to test the reach ability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer. The name comes from active sonar terminology.

Traceroute

is a computer network tool for measuring the route path and transit times of packets across an Internet Protocol (IP) network

TELNET

is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection

Directed Net

When operating requirements dictate that net stations obtain Net Control Station (NECOS) permission prior to transmitting, NECOS will control the net as a directed net.

Free Net

When operating conditions permit, the NECOS may direct that the net be operated as a free net.



Member stations are thereby authorized to transmit traffic to other net stations without obtaining prior permission form the NECOS.

State the responsibilities of a Net Control Station (NECOS):

Expedite traffic flow on the net.


Maintain circuit discipline.


Limit transmissions to the essential minimum.


Resolving disputes incident to message handling.


Determine procedural discrepancies and initiate corrective action.


Conduct a roll call of stations after each frequency shift, Emission Control (EMCON) permitting.

Communication Information Advisory (CIA)/Bulletin (CIB)

These bulletins are promulgated by the NCTAMS to provide accurate and readily accessible reference information on specific tactical communications subjects; provide operations personnel with procedural information applicable to a specific communications area and normally are promulgated by message.

Fleet Telecommunications Procedures (FTP)

These publications are issued by the NCTAMS to promulgate standard telecommunications procedures for use by communications personnel operating in a particular ocean area; they incorporate procedures unique to that area in amplification of information in NTPs. Changes to the FTP may initially be promulgated in CIA/CIB.

Naval Telecommunications Procedures (NTP)

a.

Discuss the principle duties of the Cryptologic Maintenance Technician

Perform preventive and corrective maintenance on electrical and electronic cryptologic and ancillary systems.



Manage mission organizational level maintenance; coordinate repair of command, control, communications, computer and intelligence systems; and prepare reports and inventories of equipment.

Define the primary mission areas of cryptologic maintenance.

Technicians provide technical and operational support to cryptologic systems in all operational theaters.



PCS Afloat
Fleet Electronic Support (FES)
Submarine Direct Support
Shore-based Mission Support

List the PCS Afloat platforms technicians are assigned to and the systems they are responsible for.

CVN
LHD/LPD
CG
DDG

Discuss cryptologic systems maintained by CTM personnel serving in submarine Fleet Electronic Support site.

-Submarine Direct Support (DIRSUP) personnel are located in the Atlantic and Pacific theaters to support submarine operations.



-Submarine Direct Support (DIRSUP) systems can be installed temporarily on any submarine to support tasking as required.

List the Tactical Cryptologic Systems (TCS) Systems taught within the CID domain.

AN/SSQ-137 Ships Signals Exploitation Equipment Maintenance (INC ‘E’)



AN/SSQ-124(V)X Tactical Exploitation System (TES) Maintenance



AN/SRS-1A (V) series Combat Direction Finding (CDF) System Maintenance



AN/USQ-149(V)2 CLUSTER SNOOP System Maintenance

Discuss cryptologic systems maintained by CTM personnel serving in surface Fleet Electronic Support sites.

- Surface Direct Support personnel are located in the Atlantic and Pacific theaters to support Cryptologic Carry-On Program (CCOP) Equipment.



- CCOP systems can be installed temporarily on any surface combatant to support tasking as required.

Discuss the systems associated with the following Navy Enlisted Classifications.

9224 (Tactical Exploitation System Maintenance)
9225 (AN/SSQ-137 Ship’s Signal Exploitation Equipment- SSEE Maint. Tech)
9229 (Submarine Carry-On Equipment Technician)
9289 (Combat Direction Finding System- SRS-1 Maint. Tech)

Define Preventive Maintenance (PM).

developed to provide the organizational level with the tools to plan, schedule, and control planned maintenance effectively through preventive maintenance, identifying and correcting potential problems before the equipment or system becomes inoperable.