• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/26

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

26 Cards in this Set

  • Front
  • Back
Core Capabilities of Information Operations (5)
1. EW- Electronic Warfare
2. CNO- Computer Network Operations
3. PSYOP- Psychological Operations
4. MILDEC- Military Deception
5. OPSEC- Operational Security
USCYBERCOM established on:
Command:
by SecDef in October 2009
under USSTRATCOM)
Naval Component of USCYBERCOM
FLTCYBERCOM (10th FLEET)
Diagram components, in order
CNO>USFF>SURFOR, AIRFOR, SUBFOR

STRATCOM>USCYBERCOM (NSA)>FLTCYBERCOM (10th)>Subordinate Cyber Commands
List 6 Operational Components
Cyberspace
Cyberspace Operations
Global Information Grid (GIG)
Computer Network Attack (CNA)
Computer Network Defense (CND)
Computer Network Exploitation (CNE)
Cyberspace
global domain within information environment, includes internet, telecommunications networks, computer systems, processors and controllers.
Cyberspace Operations
employ cyber capabilities, primary purpose to achieve objectives in cyberspace. Includes activities to operate and defend GIG
Global Information Grid (GIG)
globally interconnected, end-to-end set of info capabilities, associated processes and personnel. collect, process, store, disseminate, and manage info.
Computer Network Attack (CNA)
Actions taken throught the use of computer networks to disrupt, deny, degrade or destroy info on computers
Computer network Defense (CND)
Actions taken to protect, monitor, analyze, detect, and respond to unauthorized activity in dept defense systems
Computer Network Exploitation (CNE)
computer networks are used to enable operations and collect intelligence to get data from target or adversary networks.
Information Assurance (IA)
measures that protect or defend information by assuring availability, integrity, authentication, confidentiality, and non-repudiation. protection, detection, and reaction capabilities
Network defenders strive for:
Availability
Integrity
Authentication
Confidentiality
Non-repudiation
what lays out the system of classification, declassification, and handling of national security info?
The current executive order
how do you calculate sensitivity?
it is based on a calculation of the damage to national security that the release of the information would cause.
levels of classification:
unclassified
confidential
secret
top secret
top secret clearance...
does not authorize you to all top secret information. Some information is given on a need to know status.
2 main dod networks
1. Non-secure internet protocol router network (NIPRNET)
2.Secret Internet protocol router network (SIPRNET)
NIPRNET info
millions of computers connected to internet with complete access to WWW
SIPRNET info
not connected to internet, uses same technology as internet, store and transmit classified info up to secret level
Defense in Depth
the stationing of mutually supporting defense positions designed to absorb and progressively weaken attack, prevent initial observations of the whole position by the enemy, and to allow commander to maneuver the reserve
Defense layers in order
data
application
host
internal network
perimeter
physical
policies, procedures, awareness
List types of computer network attack
social engineering
phishing
spoofing and redirection
software vulnerability/malware
password cracking
intercepting traffic
security hopping
improper use of CAC
describe social engineering
attacker pieces together information from public sources to break into a system
describe phishing
email or website scam to trick people into giving credit card information, bank account, SSN, passwords, etc. dangerous for self and DOD
describe spoofing and redirection
using legit authentication and identification data without authorization, to mimic a subject different from attacker. impersonating, piggybacking, etc