Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
63 Cards in this Set
- Front
- Back
Center for Information Dominance’s (CID) mission
|
Develop Naval and Joint Service Warriors and Ambassadors of Information using the very best of technology and innovation
|
|
What information should be included in an emergency destruction bill
|
The exact location of the classified material and equipment.
The priority of emergency destruction. The place and method of destruction. |
|
How often are Emergency Action Plans (EAP) required to be rehearsed?
|
ANNUALLY
|
|
What reference requires every command maintaining classified material to develop an Emergency Action Plan (EAP)?
|
Sensitive Compartmented Information Administrative Security Manual, DOD 5105.21-M-1
|
|
Who has the authority to designate a Joint Task Force?
|
Secretary of Defense (SecDef)
Combatant Commander (CCDR) Subordinate unified command commander Existing commander |
|
Naval amphibious operations can be established for what type of operations?
|
Achieve campaign objectives in one swift stroke
Comprise the initial phase of a campaign or major operation Serve as a supporting operation Support military operations other than war (MOOTW) |
|
Describe the role and responsibilities of the Cryptologic Resource Coordinator (CRC)
|
Manages direct support (DIRSUP) elements within the task force
Coordinates coverage plans Directs reporting responsibilities for all cryptologic resources assigned to the operational commander. |
|
What is a Cryptologic Direct Support Element (CDSE)
|
CDSE is the people and equipment subordinate to an operational commander to provide cryptologic tactical support and SIGINT direct support.
|
|
What is the purpose of Own Force Monitoring (OFM)
|
Improve signal security (SIGSEC) within your own.
Deny useful information to potential aggressors. |
|
Composite Warfare Commander (CWC)
|
Acts as the central command authority for the entire Strike Group
|
|
List and describe Departments at the Command
|
N00 – Executive
N00A/N01A – Administrative Department N00X – Special Project N1 – Total Force Manpower and Human Resources Directorate N2 – Special Security Officer/Command Security Manager N3 - Model Management/Organizational Structure N4 – Technical Support/Logistics N5 – Functional Integration Directorate N6 – Knowledge Management N7 – Training Directorate N8 - Comptroller Organization |
|
Command logo
|
Vis Per Scientiam: “Strength through Knowledge”
The CID Command logo represents how CID provides the Fleet with optimally trained Sea and Joint Force Warriors who create a tactical advantage for mission success in the information domain. |
|
Identify who holds the following collateral duties and describe their purpose.
|
CMEO – ITC Twitty
SAPR – Chief Castro Safety Officer – OCEANA SAFETY OFFICE (IT1 STRUHS IS OUR LOCAL REP) DAPA – ETC Smith Security/OPSEC Officer – Mr. Sims ISSM –ITC Jones, Richard CFS – ITC Hungerman CCC – ITC Mudrak EKMS Manager – N/A (ET1 Smith is the Local Element)UPC – ITC Brown, Chris / ITC Mudrak ESO – ITC Zakimi CACO –ITC Brown, Jeremiah CIAC –ITC Brown, Chris CFL – ITC Woodson CPR –IT1 Reiker Navy Cool – ITC Jones |
|
What DoD Directive governs “Information Assurance Training, Certification, and Workforce Management,” for the Navy?
|
DoD 8570.01-M
|
|
Computer Network Defense (CND)
|
Actions taken to protect, monitor, analyze, detect, and respond to unauthorized activity within the Department of Defense information systems and computer networks.
|
|
Computer Network Attack (CNA)
|
Actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers
|
|
Computer Network Exploitation (CNE)
|
Enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or networks.
|
|
Information security
|
The protection of information and information systems against unauthorized access
|
|
Defense-in-depth
|
The DON-preferred security strategy whereby layers of protection establish an adequate security posture for a system
|
|
Incident
|
an assessed event of attempted entry, unauthorized entry, or an information attack on an automated information system
|
|
The three tiers the DOD is organized into to conduct CND
|
Tier One (Global)
Tier Two (Regional/Theater) Tier Three (Local) |
|
What are the three services provided by CND?
|
Protect.
Monitor, Analyze, and Detect. Respond. |
|
The Navy’s Computer Network Defense Service Provider (CNDSP)?
|
Navy Cyber Defense Operations Command (NCDOC)
|
|
The Information Assurance reporting process.
|
When a user or system administrator suspects a computer security incident, he/she must contact the command Information Assurance Manager (IAM).
|
|
Who is the Command Information Assurance Manager (IAM)?
|
Bob West
|
|
List the 3 firewall types used to protect Navy networks.
|
Packet Filtering
Stateful Packet Filtering Application Proxies |
|
Intrusion Detection System (IDS)
|
An Intrusion Detection System (IDS) is a device that attempts to detect intrusion into a computer or network by observation or audit.
|
|
Intrusion Prevention System (IPS)
|
An Intrusion Prevention System (IPS) goes one step further and not only detects attacks but attempts to prevent them as well.
|
|
Vulnerability
|
A flaw or weakness in system security procedures, design, implementation, or internal controls that
|
|
Exploit
|
A piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability
|
|
Overall responsibility of Information Assurance Vulnerability Management (IAVM).
|
The Assistant Secretary of Defense
|
|
DES
|
Data Encryption Standard
|
|
RC-4
|
Rivest Cipher 4
|
|
RSA
|
Rivest, Shamir, Adleman
|
|
Overall responsible for the Command’s Electronic Key Management System (EKMS)?
|
Commanding Officer
|
|
Responsible to the Commanding Officer for EKMS?
|
EKMS manager
|
|
Account Clerk
|
An individual who is designated by the CO to assist the EKMS Manager
|
|
Functions and responsibility of the National Security Agency (NSA) in regards to COMSEC.
|
The National Security Agency serves as TIER 0 and is the executive agent for developing and implementing national level policy affecting the control of COMSEC material.
|
|
Function of the EKMS Central Facility (CF)
|
Functions primarily as a high volume key generation and distribution center
|
|
What are the three types of COMSEC incidents? Give examples of each.
|
Cryptographic – Use of keying material that is compromised, superseded, defective, previously used and not meant for reuse.
Personnel – Known and suspected defection, known and suspected espionage Physical – The physical loss of COMSEC material |
|
What is a Practice Dangerous to Security (PDS)?
|
Practices Dangerous to Security (PDS’s), while not reportable to NSA, are practices which have the potential to jeopardize the security of COMSEC if allowed to perpetuate.
|
|
What are the two types of Practices Dangerous to Security (PDS’s)?
|
Non Reportable PDS – Issuing without authorization more than 30 days before its effective period, late destruction, improperly completed accounting reports, etc.
Reportable PDS – use of keymat before its effective date, early destruction, etc. |
|
Define Two-Person Integrity and the requirements associated with it.
|
Two Person Integrity (TPI) is a system of handling and storing COMSEC, designed to prevent single person access.
All Top Secret keying material or keying material designated CRYPTO, Fill Devices or physical media used to store Top Secret, and equipment with Top Secret keys that allow for extraction must have TPI applied to their handling and storage |
|
What is electronic spillage and where can you find the procedures for reporting electronic spillage?
|
Electronic spillage is defined as data placed on an IT system possessing insufficient information security controls to protect the data at the required classification
Navy Telecommunications Directive (NTD) 03-06 outlines the procedures and reporting of an electronic spillage. |
|
Loopback
|
The 127.0.0.0 range is reserved for loopback (primary means of testing the circuit or network interface card (NIC).
|
|
Default gateway
|
The 0.0.0.0 address range reserved for the default route (gateway of last resort)
|
|
What is a private IP address?
|
10.0.0.0 – 10.255.255.255
172.16.0.0 - 172.31.255.255 192.168.0.0 - 192.168.255.255 |
|
APIPA
|
Automatic Private IP Addressing is a feature of later Windows Operating Systems that allows clients to self configure an IP address and Subnet Mask when a DHCP server is unavailable.
|
|
Define the three types of connection media.
|
Copper cabling – Uses electrical signals to transmit data between devices
Fiber-optic cabling – Uses glass or plastic wire, also called fiber, to carry information as light pulses Wireless connection – Uses radio signals, infrared technology (laser) or satellite transmissions |
|
Dynamic Host Configuration Protocol(DHCP).
|
a software utility that automatically assigns IP addresses to client devices in a network.
|
|
Domain Name Service (DNS).
|
a system that provides a way to map friendly hostnames or uniform resource locater (URL) to IP address.
|
|
Active Directory.
|
A more flexible, directory service-based approach to network design allows for large distributed network environments that have a common centralized authority for network security.
|
|
Outlook Web Access (OWA)
|
Used to access email, calendars, contacts, tasks and other mailbox content when access to Microsoft Outlook desktop is unavailable.
|
|
(PORTS)
FTP Telnet SMTP DNS HTTP POP3 HTTPS |
FTP - 20
Telnet - 23 SMTP - 25 DNS - 53 HTTP - 80 POP3 - 110 HTTPS - 443 |
|
TELNET
|
Provides a bidirectional interactive text-oriented communications facility using a virtual terminal connection.
|
|
RAID
|
RAID 0 – Striped Set or Striped Volume; splits data evenly across sets of two disks or more with no parity
RAID 1 – Mirroring; mirrors data on two or more disks RAID 5 – Uses block level striping with parity data distributed across all member disks (three of more). |
|
Directed Net
|
Directed nets are necessary when complicated traffic patterns or security factors exist and warrant direct control of each transmission.
|
|
Free Net
|
- When operating conditions permit, the NECOS may direct that the net be operated as a free net. Member stations are thereby authorized to transmit traffic to other net stations without obtaining prior permission from the NECOS
|
|
State the responsibilities of a Net Control Station (NECOS)
|
Expedite traffic flow on the net.
Maintain circuit discipline. Limit transmissions to the essential minimum. Resolving disputes incident to message handling. |
|
What information can be found on the Technical Control Facility (TCF) status board?
|
Functional title of circuit.
Frequency(s), both send/receive if full duplex operation is employed. Circuit designator, from communication plan. Transmitter/receiver designations. |
|
Fleet Telecommunication Procedures (FTP)
|
Issued by NCTAMS to promulgate standard telecommunications procedures for use by communications personnel
|
|
Naval Telecommunications Procedures (NTP)
|
Official documents that define procedures and protocols for telecommunication.
|
|
Communications Equipment Population Summary (CEPS)
|
A complete list of communications equipment on board ship
|