Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
26 Cards in this Set
- Front
- Back
Core Capabilities of Information Operations (5)
|
1. EW- Electronic Warfare
2. CNO- Computer Network Operations 3. PSYOP- Psychological Operations 4. MILDEC- Military Deception 5. OPSEC- Operational Security |
|
USCYBERCOM established on:
Command: |
by SecDef in October 2009
under USSTRATCOM) |
|
Naval Component of USCYBERCOM
|
FLTCYBERCOM (10th FLEET)
|
|
Diagram components, in order
|
CNO>USFF>SURFOR, AIRFOR, SUBFOR
STRATCOM>USCYBERCOM (NSA)>FLTCYBERCOM (10th)>Subordinate Cyber Commands |
|
List 6 Operational Components
|
Cyberspace
Cyberspace Operations Global Information Grid (GIG) Computer Network Attack (CNA) Computer Network Defense (CND) Computer Network Exploitation (CNE) |
|
Cyberspace
|
global domain within information environment, includes internet, telecommunications networks, computer systems, processors and controllers.
|
|
Cyberspace Operations
|
employ cyber capabilities, primary purpose to achieve objectives in cyberspace. Includes activities to operate and defend GIG
|
|
Global Information Grid (GIG)
|
globally interconnected, end-to-end set of info capabilities, associated processes and personnel. collect, process, store, disseminate, and manage info.
|
|
Computer Network Attack (CNA)
|
Actions taken throught the use of computer networks to disrupt, deny, degrade or destroy info on computers
|
|
Computer network Defense (CND)
|
Actions taken to protect, monitor, analyze, detect, and respond to unauthorized activity in dept defense systems
|
|
Computer Network Exploitation (CNE)
|
computer networks are used to enable operations and collect intelligence to get data from target or adversary networks.
|
|
Information Assurance (IA)
|
measures that protect or defend information by assuring availability, integrity, authentication, confidentiality, and non-repudiation. protection, detection, and reaction capabilities
|
|
Network defenders strive for:
|
Availability
Integrity Authentication Confidentiality Non-repudiation |
|
what lays out the system of classification, declassification, and handling of national security info?
|
The current executive order
|
|
how do you calculate sensitivity?
|
it is based on a calculation of the damage to national security that the release of the information would cause.
|
|
levels of classification:
|
unclassified
confidential secret top secret |
|
top secret clearance...
|
does not authorize you to all top secret information. Some information is given on a need to know status.
|
|
2 main dod networks
|
1. Non-secure internet protocol router network (NIPRNET)
2.Secret Internet protocol router network (SIPRNET) |
|
NIPRNET info
|
millions of computers connected to internet with complete access to WWW
|
|
SIPRNET info
|
not connected to internet, uses same technology as internet, store and transmit classified info up to secret level
|
|
Defense in Depth
|
the stationing of mutually supporting defense positions designed to absorb and progressively weaken attack, prevent initial observations of the whole position by the enemy, and to allow commander to maneuver the reserve
|
|
Defense layers in order
|
data
application host internal network perimeter physical policies, procedures, awareness |
|
List types of computer network attack
|
social engineering
phishing spoofing and redirection software vulnerability/malware password cracking intercepting traffic security hopping improper use of CAC |
|
describe social engineering
|
attacker pieces together information from public sources to break into a system
|
|
describe phishing
|
email or website scam to trick people into giving credit card information, bank account, SSN, passwords, etc. dangerous for self and DOD
|
|
describe spoofing and redirection
|
using legit authentication and identification data without authorization, to mimic a subject different from attacker. impersonating, piggybacking, etc
|