• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

World's largest developer of standards. Non-governmental organization. Principal activity is development of technical standards. Defined the Open Systems Interconnection (OSI) reference model that all Internet systems are based on.

International Organization for Standardization (ISO)

A non-profit organization. World's leading professional association for advancement of technology. Leading developer of international standards that underpin today's telecommunications, information technology, and power generation products/services.

Institute of Electrical and Electronics Engineers (IEEE)

Has basic charter to develop and maintain networking standards and recommended practices. Provides specifications on type of NETWORK INTERFACE and the COMPONENTS used for internet connection. Governs layout of connector pins, type of connector used, and other components used to create the cables making up a network.

IEEE 802

National industry association best known for publishing electrical wiring and transmission standards.

Telecommunications Industry Association (TIA)

Two common EIA/TIA standards are the _______ cable and connector used between computers and external modems, and the _______ cabling used in most computer networks.

RS-232 cable and connector


EIA/TIA-568-B cabling

Cable and connector used between computers and external modems.

RS-232 cable and connector

Cabling used in most computer networks.

EIA/TIA-568-B

Responsible for IP address space allocation, protocol parameter assignment, domain name system management, and root server system management functions. Not-for-profit partnership. Does NOT control content on Internet. Manages assignment of domain names and IP addresses.

Internet Corporation for Assigned Names and Numbers (ICANN)

Does the technical work for ICANN. Responsible for coordinating some key elements that keep Internet running smoothly. Allocates and maintains unique codes and numbering systems used in protocols that drive Internet. Main role is to allocate IP addresses from pools of allocated addresses to the Regional Internet Registries (RIR)

Internet Assigned Numbers Authority (IANA)

Defined as a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.




Or put simply - a global domain within the information environement

Cyberspace

Overall goal of communications/cyberspace core competencies

Provide the right information, in the right format, to the right person, at the right time.

Primary purpose of cyberspace operations

achieve military objective in/through use of cyberspace domain.

Three core competencies of the Communications and Information career fields (3D1X1, etc)

Use the domain


Control domain


Establish domain

Cyberspace operation intended to project power by application of force in/through cyberspace.

Offensive Cyberspace Operation

Offensive Cyberspace Operation:



To degrade, disrupt, destroy access to, operation of, or availability of a target by a specified level for a specified time. Prevents adversary use of resources

DENY

Offensive Cyberspace Operation:




To deny access to, or operation of, a target to a level represented as a percentage of capacity.

DEGRADE

Offensive Cyberspace Operation:




To completely but temporarily deny access ti, or operation of a target for a period of time. A desired stop and start are normally specified. 100% disable system

DISRUPT

Offensive Cyberspace Operation:




To permanently, completely deny access to or operation of a target

DESTROY

There are _____ and ______ cyberspace DEFENSE operations to preserve ability to utilize friendly cyberspace capabilities and protect data, networks, net-centric capabilities.

passive


active

Three sub-components of Establishing the Domain

Global Expeditionary Cyberspace Operations




Command and Control (C2) of Network Security Operations




Cyberspace civil support operations