• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/35

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

35 Cards in this Set

  • Front
  • Back
What are the employment of cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace?
Cyberspace operations (CO)
What publication discusses military operations in and through cyberspace; explains the Joint Staff (JS), combatant command (CCMD), United States Strategic Command (USSTRATCOM), United States Cyber Command (USCYBERCOM), functional and Service component relationships and responsibilities; and establishes a framework for the employment of cyberspace forces and capabilities?
Joint Pub 3-12
What, while a global domain within the information environment, is one of five interdependent domains, the others being the physical domains of air, land, maritime, and space?
Cyberspace
What domain provides a key global connectivity option for Cyberspace Operations (CO)?
Space
Cyberspace can be described in terms of how many layers?
Three
What layer of cyberspace is comprised of the geographic component and the physical network components?
Phyical network
What component of the physical network layer is the location in land, air, sea, or space where elements of the network reside?
Geographic
What component of the physical network layer is comprised of the hardware, systems software, and infrastructure (wired, wireless, cabled links, EMS links, satellite, and optical) that supports the network and the physical connectors (wires, cables, radio frequency, routers, switches, servers, and computers)?
Physical network
What is a primary target for signals intelligence (SIGINT), including computer network exploitation (CNE), measurement and signature intelligence, open source intelligence, and human intelligence?
Physical network layer
What is the first point of reference for determining jurisdiction and application of authorities?
Physical network layer
What is also the primary layer for geospatial intelligence, which can also contribute useful targeting data in cyberspace?
Physical network layer
What is the layer of cyberspace that consists of those elements of the network that are related to one another in a way that is abstracted from the physical network, i.e., the form or relationships are not tied to an individual, specific path, or node?
Logical network
In what layer of cyberspace would you classify a network of servers that shares one URL?
Logical network
What layer represents yet a higher level of abstraction of the logical network in cyberspace; it uses the rules that apply in the logical network layer to develop a digital representation of an individual or entity identity in cyberspace; consists of the people actually on the network?
Cyber-persona
What is a globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel?
DoD Information Network (DODIN)
What replaced Global Information Grid (GIG) terminology?
Department of Defense Information Network (DODIN)
What is a composite of the conditions, circumstances, and influences that affect the employment of capabilities and bear on the decisions of the commander?
Operational environment (OE)
What is the aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on information?
Information environment
What environment is broken down into the physical, informational, and cognitive dimensions?
Information environment
What dimension of the information environment is composed of command and control (C2) systems, key decision makers, and supporting infrastructure that enable individuals and organizations to conduct operations?
Physical dimension
What dimension of the information environment do key decision makers fall under, it is the dimension where physical platforms and the communications networks that connect them reside?
Physical dimension
What dimension of the information environment is the place where information is collected, processed, stored, disseminated, and protected; it is the dimension where the C2 of modern military forces is exercised and where the commander’s intent is conveyed?
Informational dimension
What dimension of the information environment encompasses the minds of those who transmit, receive, and respond to or act on information; in this dimension people think, perceive, visualize, understand, and decide?
Cognitive dimension
What are concerned with using cyberspace capabilities to create effects which support operations across the physical domains and cyberspace?
Cyberspace operations
What is concerned with the integrated employment of information-related capabilities during military operations, in concert with other lines of operation (LOOs), to influence, disrupt, corrupt, or usurp the decision making of adversaries and potential adversaries while protecting our own?
Information operations
Cyberspace operations (CO) are enabled by what DoD network?
DODIN
What type of threat is potentially the most dangerous because of access to resources, personnel, and time that may not be available to other actors?
Nation State
What is a device, computer program, or technique, including any combination of software, firmware, or hardware, designed to create an effect in or through cyberspace?
Cyberspace capability
What type of threats are formal and informal organizations that are not bound by national borders; use cyberspace to raise funds, communicate with target audiences and each other, recruit, plan operations, destabilize confidence in governments, and conduct direct terrorist actions within cyberspace?
Transnational actor
What type of threats steal information for their own use or, in turn, to sell to raise capital, or may be used as surrogates by nation states or transnational actors to conduct attacks or espionage through CO
Criminal organization threat
What is the most challenging aspect of Cyberspace Operations (CO)
Attribution
What are created through the integration of cyberspace capabilities with air, land, maritime, and space capabilities?
Cyberspace effects
Who does DoD support in leading interagency efforts to identify and mitigate cyberspace vulnerabilities in the nation’s critical infrastructure?
DHS
To increase protection of Defense Industrial Base (DIB) networks, the DoD launched what?
DIB Cybersecurity and Information Assurance Program
What serves as DOD’s operational focal point for voluntary cyberspace information sharing and incident reporting program?
DoD Cyber Crime Center