IDW: Network/IA Flashcards Preview

Information Dominance Warfare > IDW: Network/IA > Flashcards

Flashcards in IDW: Network/IA Deck (71):
0

What is defense in depth in regards to IA?

A concept of multi-layered security; multi layers to prove that you are authorized.

1

How many networks do we have onboard?

6: NIPR, SIPR, CENTRIX, JWICS, PPLAN, MCMS

2

What is the biggest threat to the network and how do we mitigate it?

User awareness and training.

3

What is compliance in regards to patching?

If a computer on the network isn't fully patched then there's a loophole that can be exploited.

4

How does inventory effect compliance?

If you don't know where a non-compliant computer is, you can't fix it and have vulnerability.

5

What is the ISSM and their responsibilities?

Information Systems Security Manager; serves as the point of contact for all command IA matters and implements IA program. Designated in writing by CO.

6

What is the ISSO and their responsibilities?

Designated system administrator for a system (GCCS, AIS, TMIP). They oversee compliance inventories and other requirements assigned by ISSM.

7

TASO responsibilities

Share drive folder and file management

SAAR form management

Cyber Awareness training management

Evaluate and report security vulnerabilities and problems

Complete and maintain inventories of all IT equipment

Notify ADP of equipment changes

Train and submit division requests for new equipment.

Ensure electrical safety checks conducted

Inform ADP of personnel changes

Assist with creating Outlook PST files

Assist uses in mapping drives

Assist Combat Systems with (Information Security) IS inspections

Communicate news from meetings with leadership.

8

What is a network violation?

Auto-forwarding Navy email to commercial email

Bypass firewalls

Use unauthorized software

Relocate or change equipment

Upload/download files

Using personal hardware

Misuse of IT resourcesto adversely reflect on Navy

9

What are spillage procedures?

Report to CoC, electronic spillage report must go out every 24hrs to every command involved.

10

What's NETSEC responsible for?

All data security,assurance policy, network configuration management, spillage reporting

11

How often is anti-virus done

7 days

12

What did Private Manning do?

Copied classified classified info and uploaded to Internet.

13

What did Edward Snowden do?

Copied classified material to external hard drive and released it to the public.

14

Information Assurance

Practice of assuring information and managing risks related to the use, storage, and transmission of information or data.

15

Interim Authority To Operate

Has authorized termination date within 180 days; can't have consecutive IATO totaling more than 360 days.

16

Authority To Operate (ATO)

Issued for 3 years; DAA authorized to run Information Systems at an acceptable level of risk

17

Public-key infrastructure (PKI)

Crypto technique that enables users to communicate on an insecure public network verify users identity by digital signatures.

18

Information Assurance Vulnerability Alert (IAVA)

Announcement of a computer vulnerability notification. IAVA's require acknowledgement and compliance.

19

Public-key infrastructure (PKI)

Crypto technique that allows users to securely communicate on an insecure network using digital signatures to verify.

20

Information Assurance Vulnerability Bulletin (IAVB)

Announcement of a computer vulnerability. IAVBs require acknowledgement.

21

Information Assurance Vulnerability Technical (IAVT)

Announcement of a computer vulnerability. IAVT require notification only.

22

Computer Tracking Order (CTO)

Document sent out to change network posture of the fleet.

24

Information Assurance Manager (IAM)

Responsible for ensuring commands Information Systems are operated, used, maintained and disposed of

25

Virus

Harmful program in disguise

26

Worm

Self-replicating sub-viruses

27

Network Enumeration

Process of extracting valid account or exported resource names from systems using active connections and desires queries

27

Trojans

Harmful program disguised as a legit application

29

Network Enumeration

Extracting valid account or exported resource names from systems using active connections and desires queries

30

SQL Injection

Code injection technique; used to attack data-driven applications.

31

Privilege Escalation

Using a flaw to increase privilege level

32

Social Engineering

Deception to get sensitive information.

33

Host-Based Security System

Can detect and counter, in real time, against known cyber threats.

33

Dictionary attack

Using all words in dictionary to crack a code

34

Brute Force Attack

Using all possible methods to crack a code

35

Assured Compliance Assessment Solution (ACAS)

Used to scan the network for compliance of the latest patches in conjunction with VRAM.

36

Information Operation Condition (INFOCON)

5 levels; 1 is most dangerous and 5 is least dangerous. We are currently at 3.

37

Electronic Spillage

Placing sensitive material on a less sensitive network. Ex. Can't go from high to low.

38

Navy Cyber Defense Operations Command (NCDOC)

Ensuring proper internet usage on-board USN Afloat Commands.

39

MSG Server

Provides 2 basic services on an enterprise firewall and a web proxy/cache server.

40

Non-classified Internet Protocol Router Network (NIPRNET)

Unclassified network. Ex: Facebook

41

Secret Internet Protocol Router Network (SIPRNET)

Classified network.

42

Joint Worldwide Intelligence Communications Systems (JWICS)

TS/SCI network

43

Virtual Local Area Network (VLAN)

Group of workstations, servers and network devices that appear to be on the same LAN despite geographical location

44

Domain Name System

Converting computer host names and domain names into IP addresses.

45

Dynamic Host Control Protocol (DHCP)

Provides IP addresses to computers.

46

Domain Controllers

Run Active Directory, Dynamic Host Configuration Protocol (DHCP), Domain Name System. We have 2 per network

47

Active Directory

Used to create, manage and edit objects on the network.

48

IPv4 address space

32 bit field and can support up to 4.3 billion IP addresses.

49

IPv6

Uses 128 bit addresses.

50

Common UDP/TCP Ports

20/21 - File Transfer Protocol (20 is data, 21 is control)

23 - Telnet

25 - Simple Mail Transfer Protocol

80 - Hypertext Transfer Protocol

443 - Hypertext Transfer Protocol w/ Secure Sockets Layer

51

Web Tier

Aka Web User Groups. Used to control bandwidth.

52

Web Tier

Web User Groups. Used to control bandwidth. We have 3 (low, medium and high)

53

DOS Commands

Ping: Used to reach the ability of a host on a IP network.

Trace Route: used to determine the path taken to a destination across a network.

IPCONFIG: Tool used to view network interface configurations.

54

Navy Information Application Product Suite (NIAPS)

Deliver maintenance, logistics, administrative, training and management applications to users at sea.

NKO Afloat, FEDLOG, Distance Support

55

Navy Tactical Command Support System (NTCSS)

Provides a full range of of standardized mission support ADP hardware and software.

56

NTCSS Applications include:

R-Supply: Relation supply provides Navy and Marines tools and functions needed to perform daily tasks.

OMMS-NG (Organizational Maintenance Management System-Next Generation: Provides quick, convenient access to the maintenance information needed for readiness

R-ADM (Relational Administrative Data Management): Personnel management

NALCOMIS (Naval Logistics Command Management Information System): Provides aviation maintenance and material management with information.

57

TMIP-M (Theater Medical Information Program-Maritime)

AHLTA: Utilized for sick call information and dr's notes

SAMS: Holds shot records, and transit data off ship to NMO

58

FLTNOC (Fleet Network Operations Centers)

ECRNOC: European; Naples, Italy

IONOC: Indian Ocean; Bahrain.

PRNOC: Pacific; Wahiawa, HI

UARNOC: Unified Atlantic; Norfolk, VA

59

DCGS-N (Distributed Common Ground System-Navy):

Provides real time imagery in support of fleet intelligence.

60

CENTRIXS (Combined Enterprise Regional Information Exchange System):

Global data network for U.S. and petter forces to share classified operational and intelligence information.

61

GCCS-M (Global Command and Combat System-Maritime)

Provides afloat joint and allied commanders a single integrated C4I with intelligence and environmental information.

62

Who is the ships Information Assurance Manager (IAM)

LT Johnson and ITC Brown

63

How many layers are there in the OSI model

7

64

Layer 1 of OSI Model

Physical

65

Layer 2 of OSI Model

Data Link

66

Layer 3 of OSI Model

Network

67

Layer 4 of OSI Model

Transport

68

Layer 5 of OSI Model

Session

69

Layer 6 of OSI Model

Presentation

70

Layer 7 of OSI Model

Application