IW Book 1 Study

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Battle of Guadalcanal

(1942-1943) World War II battle in the Pacific; it represented the first Allied counter-attack against Japanese forces; Allied victory forced Japanese forces to abandon the island

Gemini 3

- 23 Mar 1965 - 1st U.S. 2-man space mission - 1st to maneuver from one orbit to another with John Young

effects of heat stroke

- Hot and/or dry skin(may appear red) -Uneven pupils -Weak rapid pulse

effects of heat stress

- Increased body temperature causing fatigue, headache, nausea, can be life threatening.

Hainan Island EP-3 Incident

01APR 2001: U.S. recon plane carrying a crew of 24 collided with a Chinese fighter, forcing EP-3 to emergency land in the People's Republic of China.

Attack on USS Liberty

08 JUN 1967: Arab-Israeli Six-Day War, Liberty was attacked by Israeli torpedo boats at 1400 accidentally and ensued in the loss of 34 men. The largest loss of life in a single event in American cryptologic history.

State the seven principles of Naval Logistics

1. Responsiveness 2. Simplicity 3. Flexibility 4. Economy 5. Attainability 6. Sustainability 7. Survivability

sloops of war

10-20 guns

STS-1

12-14 APR 1981 (John W. Young and Robert L. Crippen) - First orbital test flight of a Space Shuttle. All Navy crew

Voyage of the Great White Fleet (significance)

14 month voyage, show of naval dominance, ordered by Teddy Roosevelt

EC-121 Shoot Down

15April1969- shot down while on reconnaissance mission by North Korean aircraft over Sea of Japan. All 31 Americans were killed

Discuss ARPANET and when it was developed

1966 Advanced Research Projects Agency Network (ARPANET) of the U.S. DoD. Initially developed to communicate with and share computer resources

Apollo 11

1969, Neil Armstrong and Buzz Aldrin became first people to walk on the moon

Apollo 17

1979 Eugene Cernan & Ronald Evans 7th and final lunar landing

When/Why were the Navy Core Values Developed

1992 Admiral Kelso adopted them to provide principles to guide sailors

When and why was the Sailor's Creed developed?

1993 To remind us that we are Sailors first

Capture of USS Pueblo

23 JAN 1968: While in international waters off of the Korean Coast, N. Koreans attacked. 82 crewmen were held for 11 months before being released. Pueblo remains in N. Korea to this day, constituted as the largest single loss of sensitive material

Frigates

28-44 guns cruisers

Timeline for reporting mishaps involving all others

30 days

Battle of Coral Sea (dates)

4-8 May 1942

Ship of the Line

64-100 guns biggest of all warships

Timeline for reporting mishaps involving on duty civilians and all military fatalities

8 hours

how long a Commanding Officer can administratively suspend access before DoDCAF revokes a clearance

90 days

NSN (National Stock Number)

A 13 digit number assigned by the Defense Logistics Agency to identify an item of material in the supply distribution systems

Explain what is meant by 'need to know'

A determination that an individual requires access to specific classified information in the performance of lawful and authorized government functions and duties

Red Team

A group of people authorized and organized to emulate a potential adversary's attack or exploitation capabilities against an enterprise's security posture.

CHRIMP - Consolidated Hazardous Material Re-utilization Inventory Management Program

A hazardous material (HM) control and management program that requires all HM to be centrally controlled on board ships and submarines

Discuss the purpose of and components of Naval Tactical Command Support System (NTCSS)

A suit of software applications and requisite Commercial Off The Shelf (COTS) hardware used to provide ship and aviation maintenance management

APL - Allowance Parts List

A technical document prepared for individual equipment/components which are on board

AEL - Allowance Equipage List

A technical document prepared for various categories of equipage for mechanical, electrical, electronic, and ordnance systems

COG - Cognizance

A two character symbol that designates the stores account in which a type of material is carried and the responsible inventory control point

Describe the procedures for treatment in regards to electrical shock

ABC's, artificial ventilation, CPR, AED, Cover exit woulds loosely, treat as a burn victim

purpose of evaluation/fit rep report

Account for a sailors performance and are used to provide feedback

Use of SF701

Active Security Checklist Filled out at the end of each day to ensure that classified materials are secured properly and allows for employee accountability in the event that irregularities are discovered

State the purpose and contents Officer Distribution Control Report (ODCR)

Activity, admin, personnel and fitness reports

NMEC

Acts as a document and media exploitation service of common concern

Describe the logistics area of Naval Doctrine

Addresses the full range of logistical capabilities that are essential in the support of naval forces

Duties and responsibilities of the Command ESO

Administers educational and advancement exams and coordinates training

Page 13

Administrative Remarks

Responsibilities of Numbered Fleet Commander

Admirals in command of a numbered fleet

State the purpose and contents Billet Based Distribution (BBD)

Aligns enlisted sailors with billet level requirements

Explain the procedures for NRFI (Not Ready for Issue) DLRs in regards to RIP (Remain in Place)

Although the part may be degraded, it is required to remain in use until the new item arrived

SF 30

Amendment of Solicitation/Modification of Contract

GSA Acquisitions - General Services Administration

America's only source solely dedicated to procuring goods and services for government

Proxy Server

An internet server that controls client access to the internet. It can stop employees from accessing undesirable websites

Unclassified

Applied to information generally available to anyone, though caveats may still limit the distribution

Confidential

Applied to information whose unauthorized disclosure could reasonably be expected to cause damage to the national security

Damage if TOP SECRET is disclosed

Applied to information whose unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to national security

Damage if SECRET information is disclosed

Applied to information whose unauthorized disclosure could reasonably be expected to cause serious damage to the national security

Operating area of 5th fleet

Arabian Gulf, Gulf of Oman, Gulf of Aden, Red Sea, Arabian Sea

Areographer's mates (AG)

Are the meteorological and oceanographic experts

Operating area of 10th fleet

Atlantic Fleet

Explain ADCON

Authority over subordinate to other organization in administration and support

Explain OPCON

Authority to employ them as Commander in operational control

PSP (Personnel Security Program)

Authorizes initial and continued access to classified information and/or initial and continues assignment to sensitive duties to those who qualify

CASREP Categories

C-1 - Training C-2 - cause minor degradation C-3 - cause major degradation C-4 - cause loss to at least one primary mission

Use of SF153

COMSEC Material Report Acquisition/transfer of secure communication devices

CASREP

Casualty Report

Four required mishap reportable items

Class A - C government property damage Class A -C civilian on duty or military on/off duty Any work related illness/injury involving more than first aid All mishaps involving DOD evolution, operations, or activities

Use of SF312

Classified Information Nondisclosure Agreement A contractual agreement between the U.S Government and a cleared employee that must be executed as a condition of access to classified information

Define SCI

Classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director of Central Intelligence.

Intelligence Specialist (IS)

Collects and interprets intelligence for operational units, prepares charts and maps

Location and mission of NORTHCOM

Colorado to conduct homeland defense, civil support and security cooperation to defend and secure the U.S.

State the six areas of Naval Doctrine

Command and control Operations Warfare Logistics Intelligence Planning

Define C5I

Command, Control, Communications, Computers, Collaboration, and Intelligence

Impact of the John Walker espionage case

Compromised COMSEC and highlighted many security gaps Started 2 person integrity

Cryptologic Technician Networks (CTN)

Computer networks

RADM Grace Hopper

Computer programmer that created COBAL and coined the term computer bug and debug

Responsibilities of Secretary of the Navy

Conducts all of the affairs of the Department of the Navy

RAM - Random Anti terrorism Measures

Consists of the random implementation of higher FPCON measures in consideration of the local terrorist capabilities

Responsibilities of Type Commander

Controls the ship during its primary and intermediate training cycles

NSA (National Security Agency)

Coordinates, directs, and performs highly specialized activities to protect the U.S

C-Way program

Corporate information technology system which matches personnel inventory to requirements with the best performing sailors

Voyage of the Great White Fleet Date

Dec 1907-Feb1909

Describe the key concept of ORM

Decision making tool that helps assess and minimize risk

DD Form 1155

Delivery/Task Order: order for supplies or services

Page 2

Dependency Application/Record of Emergency Data

Location and mission of CNO N2/N6

Deputy Chief of Naval Operations for Information Warfare Develop a superior knowledge of the battle space, provide our operating forces, ensure our ability to deeply infiltrate and understand the inner workings of our adversaries

NRO - National Reconnaissance Office

Designs, builds, and operates the nation's reconnaissance satellites

Vulnerability Assessment

Determines the potential impact of disruptive events on the organization's business processes.

Describe the operations area of Naval Doctrine

Develops the doctrine to reaffirm the foundation of the U.S. Navy and Marines

Three methods of controlling bleeding

Direct pressure Pressure points Tourniquet

DD Form 1348-6

DoD Single Line Item Requisition System Document

Name the first computer and where it was located

Electronic Numerical Integrator and Computer (ENIAC) -located at the Univ of Pennsylvania -ENIAC was operational in 1945

Purpose of the Navy Drug Screening Program

Establish a valid and reliable method for inspecting personnel in support of drug and alcohol abuse and prevention

ODNI - Office of the Director of National Intelligence

Established to manage the extensive efforts of the IC

Purpose of the Defense Courier Service (DCS)

Establishes, staffs, operates, and maintains an international network of couriers and courier stations for the expeditious, cost effective, and secure transmission of qualified classified documents and material

Describe the planning area of Naval Doctrine

Examines the forces planning and the relationship between our capabilities and operational planning

Mission of NCDOC

Execute DCO, enable global power projection through proactive network defense

Describe potential risks of improperly labeled and stored HAZMAT

Fire, explosion, harmful gasses, improper medical treatment/difficulties

On-the-roof-gang

First cryptologic school, 176 radiomen, located on top of the old ONI building

Location and mission of SOUTHCOM

Florida leverages rapid response capabilities, partner nation collaboration

System Security Plan

Formal document that provides an overview of the security requirements for the information system and describes the security controls in place or planned for meeting those requirements. (Security Plan) FIPS 200; SP 800‐53; SP 800‐53A; SP 800‐37; SP 800‐18

Location and mission of USCYBERCOM

Fort Meade, MD Plans, coordinates, integrates, synchronizes and conducts activities

Location and mission of AFRICOM

Germany disrupts and neutralizes transnational threats, protects U.S. personnel and facilities, prevents and mitigates conflict

OPNAVINST 5102.1D

Governs safety and mishap reporting

Explain the purpose of the Public Affairs Office

Guarantee access to public information Communicate information about Navy/Marine programs Act as liaisons Expedite the flow of information

Location and mission of PACOM

Hawaii protect and defend the territory of the U.S, its people and its interests

HERF

Hazards of Electromagnetic Radiation to Fuel

HERO

Hazards of Electromagnetic Radiation to Ordnance

HERP

Hazards of Electromagnetic Radiation to Personnel

Explain Alan Turnig's contributions to the IW field

He broke the Enigma Code

Why was a ship named after Osmond Imgram?

He was the first enlisted man killing in action in WWI

Responsibilities of Chairman Joint Chiefs of Staff

Highest ranking military officer, principal adviser

State who can give the order to initiate Emergency Destruction

Highest ranking person on station for SCI

Steps of ORM

Identify Hazards Assess Hazards Make Risk Decisions Implement Controls Supervise

What information does an SDS provide

Identity, Hazardous ingredients, physical/chemical characteristics, physical/health hazards, reactivity, handling precautions, first aid, counter measures, routes into the body, date of SDS, contact information for HAZMAT

Location and mission of TRANSCOM

Illinios provides full spectrum global mobility solutions and related enabling capabilities for supported customers

IT21/ISNS

Information Technology Information for 21st Century

Cryptologic Technician Maintenance (CTM)

Installs, configures, diagnoses, and repairs state-of-the-art electronics, computers and hardwares

CNO's four core attributes

Integrity Accountability Initiative Toughness

Discuss the uses of IMPAC

International Merchant Purchase Authorization Card is VISA purchase card for which every statement has to be paid in full

SIM (Selected Item Maintenance)

Inventory control system by which maximum attention is given to those items experiencing a high rate of usage

The Purple Code

Japanese code Broken in WW2

Identify the 11 pressure points

Jaw, Temple, Collar Bone, Neck, Inner-upper arm, inner elbow, wrist, upper thigh, groin, knee, ankle

Who was in command of the USS Alfred

John Barry

Battle of Midway date

June 1942

Battle of Normandy (D-Day)

June-August 1944, largest amphibious assault in history

How to store HAZMAT

Keep different types separate Close all containers tightly Flammables should be kept in lockers

Who was the first CIO/DNI

LT Theodorus Bailey Myers Mason

NASA

Lead an innovative and sustainable program of exploration

Explain the importance of character related to IW professionals

Leadership development encompasses leadership, character development and ethics

USN - U.S Navy

Leading provider of maritime intelligence

Mishap Probability SubCAT A

Likely to occur immediately or within a short period of time

State the responsibilities of the Top Secret Control Officer (TSCO)

Maintains a system of accountability to record the receipt, reproduction, transfer, transmission, downgrading, declassification and destruction of command Top Secret Information

When was ONI established and by whom?

March 23, 1882. Secretary of the Navy William Hunt.

NC - Not carried

Material for which there is no storeroom allowance

NIS - Not in Stock

Material that is normally stocked but supply is temporarily exhausted

Attack on USS Stark

May 1987, Stark attacked by Iraqi Fighter, 37 Sailor died. Only successful anti-ship missile

Mercury 3

May 5, 1961 First US manned space flight. LT Alan Shepard, USN

Mishap Probability SubCAT C

Might occur

Members of NCA

Military Chairman Unified commands

DD Form 448

Military interdepartmental Purchase Request (MIPR); used to forward a request for contractual action to another military department

Effects of Heat Exhaustion

Moist, Clammy skin, and dilated pupils

Type of investigation needed for Confidential

NACLC every 15 years

Operating Area of 6th Fleet

NAVEUR-NAVAF

Location and mission of NCTS Naples

Naples, Italy Telecommunications connectivity

Type of investigation needed for Secret

National Agency Check with Local Agency and Credit Checks (NACLC) - every 10 years

Navajo Code Talkers

Native Americans from the Navajo tribe used their own language to make a code for the U.S. military that the Japanese could not decipher

Discuss the Depot Level Repairable (DLRs) program

Navy managed items that have been selected for special inventory control based on unit cost, annual demand, difficulty of repair, and other economic considerations

Location and mission of STRATCOM

Nebraska deters strategic attack and employs forces, as directed, to guarantee the security of our nation and our allies

JWICS - Joint Worldwide Intelligence Community System

Network established by DIA to connect all members of the DoDIIS community

Location and mission of NNWC

Norfolk, VA Execute tactical-level command and control to direct, operate, maintain and secure Navy communications

Location and mission of NCTAMS LANT

Norfolk, VA Operates and defends responsive, resilient, and secure computer and telecommunications systems

Unit sitrep

Not big enough to be sent to CNO/Low media interest

Discuss the purpose of personnel security

Objective is to authorize initial and continued access to classified information and/or initial and continued assignment to sensitive duties to those persons whose loyalty, reliability and trustworthiness are such that entrusting them with classified information is clearly consistent with the interests of national security

Name the 2 departments that were combined to form the ONI

Office of Intelligence Department of Library

What is the oldest intelligence organization in the Navy?

Office of Naval Intelligence (ONI)

Information Systems Technician (IT)

Operates communication equipment; transmits, receives and processes all forms of military record and voice communications; installs and maintains telecommunications equipment.

First ship named after an enlisted man

Osmond Ingram (DD 255)

COMSEC

Outlines measures and controls taken to deny unauthorized persons access to information derived from telecommunications and to ensure the authenticity of those communications.

National Security Act 1947

Passed in 1947 in response to perceived threats from the Soviet Union after WWII. It established the Department of Defense and the Central Intelligence Agency (CIA) and National Security Council.

List the items prohibited in a SCIF

Personally owned auto, photographic and video equipment Personally owned computers and associated media Bluetooth devices

Operating Area of 3rd Fleet

Point Loma, California Pacific Fleet

Location and mission of Naval Satellite Operations Center

Point Mugu Is responsible for operating, managing and maintaining assigned narrow band satellite systems

Describe the intelligence area of Naval Doctrine

Points the way for intelligence support meeting requirements of both regional conflicts and other operations

Type of investigation needed for SCI

Pre-nomination interview conducted by the SSO or its designee

What is the goal of the Navy's Hearing Conservation Program

Prevent occupational hearing loss and assure auditory fitness

Explain and state the purpose of Emergency Destruction Procedures

Prevent uncleared personnel from access to classified material in case of emergency such as fire, natural disaster, civil disturbance, terrorist activities, or enemy attack

Importance of IG

Principal adviser to SecDef

Responsibilities of Secretary of Defense

Principal defense policy adviser to the president

Mishap Probability

Probability that a hazard will result in a mishap or loss

Mishap Probability SubCAT B

Probably will occur in time

SF 368

Product Quality Deficiency Report (PQDR): for reporting product quality deficiencies to another component

Conditions that led to the formation of the Navy

Protection from pirates and the British

DOE - Department of Energy

Protects vital national security information and technologies

Fleet / Force / Command Master Chief

Provide leadership to the enlisted force and advise commanders and COs

CENTRIXS - Combined Enterprise Regional Information Exchange System

Provides U.S coalition and allied interests with a secure, reliable, high speed LAN with access to the coalition WAN

Purpose of Concurrent report

Provides a record of significant performance that was not directly observable

NIPRNET - Non-Classified Internet Protocol Router Network

Provides access for unclassified combat support operations Used to exchange sensitive but unclassified information between internal users as well as providing those users with internet access

Explain how Defense Property Accountability System (DPAS) is used to track equipment

Provides accountability, asset management capabilities, and property financial reporting information

DRMO - Defense Re-utilization and Marketing Office

Provides for the redistribution and disposal of DoD equipment and supplies no longer needed by the original user

Senior Leadership

Provides knowledge and skills required to manage and lead effectively

Purpose of the Maintenance and Material Management (3-M) System

Provides maintenance and material management managers with a process for planning, acquiring, organizing, directing, controlling, and evaluating the manpower and material resources used to support maintenance

Purpose of a HAZREP message

Provides means for unit discovering a hazardous condition or experiencing a near mishap to alert COMNAVSAFECEN-Norfolk, collect data/lessons learned

CIA - Central Intelligence Agency

Provides national security intelligence to senior U.S policymakers

USAF - U.S Air Force

Provides policy, oversight, and guidance to all Air Force intelligence organizations

Describe the command and control area of Naval Doctrine

Provides the basic concepts to fulfill the information needs of commanders, forces and weapons systems

State the purpose and contents Activity Manpower Document (AMD)

Provides the quantitative and qualitative manpower requirements

DOS - Department of State

Provides the secretary of state with timely, objective analysis of global developments

Mission of DISA

Provides, operates, and assures command and control information sharing capabilities

SF 44

Purchase Order Invoice Voucher: a multi-purpose form designed for on-the-spot, over-the-counter purchases of supplies and non-personal services

color for Secret

Red

Define the purpose of the MAMs (Maintenance Assist Module)

Replaceable assemblies needed to perform and approved maintenance plan which calls for identifying the fault of failed module through progressive and/or selective module substitution

SF 364

Report of Discrepancy used to identify and describe the specific technical data discrepancy

DD Form 200

Report of Survey: FLIPL; to officially report the facts and circumstances supporting the assessment of financial charges for the loss, damage, or destruction of DoD-controlled property

Cryptologic Technician Collection (CTR)

Reports on communication signals

NAVCOMPT 2276

Request for contractual procurement

DD Form 1149

Requisition and Invoice/Shipping Document: Used to invoice, requisition and shipping of materials between shipping and receiving parties who are under the DoD

DEA - Drug Enforcement Agency

Responsible for enforcing the controlled substance laws and regulations

USA - U.S Army

Responsible for the overall coordination of the 5 major MI

DOT - Department of the Treasury

Responsible for the receipt, analysis, collation and dissemination of foreign intelligence

FBI - Federal Bureau of Investigation

Responsible for understanding threats to our national security

State the qualities that characterize the Navy/Marine Corps team as instruments to support national policies

SMRF Self Sustainability Mobility Readiness Flexibility

Operating Area of 4th Fleet

SOUTHCOM

Who has overall authority of, and controls access to, a SCIF

SSO

Switch

Same as a HUB only smarter

Location and mission of NCTS San Diego

San Diego Operates robust and secure satellite, network, and strategic communications

Three objectives of first aid

Save life Prevent further injury Prevent infection

SIPRNET - Secret Internet Protocol Router Network

Secret level network that supports the DoD community, law enforcement agencies

What is SAER

Security Access Eligibility Report

Use of SF702

Security Container Check Sheet Provides a record of the names and times that persons have open, closed and checked a particular container that holds classified information

use of SF700

Security Container Information Contains vital information about the security container in which it is located, including location, container number, lock serial number, and contact information in the container is found open and unattended

Master Chief Petty Officer of the Navy

Senior enlisted member, an adviser to the CNO and CNP

Responsibilities of Chief of Naval Operations

Senior military officer of the DON, responsible to SECNAV for the command utilization of resources and operating efficiency

SGLI

Service Members Group Life Insurance

Three classes of Naval vessels that existed at the inception of the Navy

Ship of the line Frigates Sloops of war

Location and mission of NOAA

Silver Springs, MD Science, Service, Stewardship

Type of investigation needed for Top Secret

Sing Scope Background Investigation (SSBI)- Every 5 years

SF 1449

Solicitation/Contract/Order for Commercial Items

Define the purpose of the Bulkhead mounted spares

Spares that are kept in the work center due to size or cost resulting in the parent department head to be responsible for their upkeep

Six Programs of Brilliant on the Basics

Sponsorship, INDOC, CDB, Ombudsman, Mentorship, Recognition Programs

What is the DLPT

Standardized test for measuring proficiency in a foreign language

Methods for clearing an obstructed airway

Standing abdominal thrust Reclining abdominal thrust Standing chest thrust Reclining chest thrust

Location and mission of CNMOC

Stennis Space Center, MS U.S. forces are so superior in knowing, predicting, and exploiting the physical environment in operations that our adversaries avoid us

Location and mission of NAVIFOR

Suffolk, VA Provide naval and joint operational commanders with combat ready information warfare forces

USCG - U.S Coast Guard

Support CG tactical and operational commanders

State the three levels of war

Tactical Operational Strategic

Location and mission of SOCOM

Tampa FL synchronizes the planning of special operators and provides Special Operation forces to support persistent and networked threats

Location and mission of CENTCOM

Tampa Florida to direct and enable military operations and activities with allies and partners to increase regional security and stability in support of enduring U.S. interests

IATO (Interim Authority to Operate)

Temporary authorization granted by DAA or SCO

Landing at Inchon

The Battle of Inchon was an amphibious invasion and battle of the Korean War that resulted in a decisive victory and strategic reversal in favor of the United Nations.

Mission of NASIC

The National Air/Space Intelligence Center produces integrated/predictive air, space, and specialized intel to enable military ops, force modernization, and policy making

Describe the warfare area of Naval Doctrine

The inherent nature and enduring principles of naval forces

Direct Leadership

The leader controls the interaction of the group by giving directions and information and allowing little discussion.

Explain the procedures for NRFI (Not Ready for Issue) DLRs in regards to Turn-in

The part that needs to be replaced is turned-in to supply then the process is initiated to replace the part

Bletchley Park

The place where British had a code breaking center, helped save Britain

COMPUSEC

The protection of computing systems against threats to confidentiality, integrity, availability and accountability. It must address the threats to electronic transactions and files

Responsibilities of Commander in Chief

The senior military authority in the nation and is ultimately responsible for the protection of the U.S.

Discuss the purpose of the Material Obligation Validation (MOV)

The unfilled portion of a requisition that is not immediately available for issue

Location and mission of Office of Oceanographer/Navigator of the Navy

To evaluate and provide up-to-date and accurate ocean maps

Mission of the US Navy

To maintain, train and equip combat-ready Naval forces capable of winning wars, deterring aggression and maintaining freedom of the seas.

Use of SF703

Top Secret Cover Sheet Cover sheet for top secret materials

Battle of Midway

Turning point in WWII

Name the first submarine used in naval warfare

Turtle

Officer accession programs that are available to enlisted personnel

US Naval Academy Officer Candidate School MECP MSCIPP LDO CWO STA-21

Location and mission of NCTS Bahrain

USCENTCOM Delivers voice and IP services to shore and fleet warfighters and executes problem resolution

name the first U.S. flag ship

USS Alfred

Describe the procedures for preparing hard copy classified material for transportation via hand-carry

Use a classified material cover sheet, file folder, or other covering Double-wrap the classified information when hand carrying outside the command The security manager shall provide written authorization to all individuals escorting classified information

Describe the procedures for preparing hard copy classified material for transportation via DCS

Use of metal banding is prohibited Double wrapped with opaque material Properly marked classification and address Minimum size is 8 ½ " x 11" flat envelope or small box measuring at least 20" in linear length If over 300 pounds or 90" linear length coordinate in advance All seams will be reinforces with the prescribed tape-gummed kraft paper tape

ATFP (Anti-Terrorism Force Protection)

Used to ensure special emphasis to reducing the vulnerability of personnel, family, resources , facilities, critical infrastructure and ships under DON cognizance to terrorist acts

DHS - Department of Homeland Security

Uses information to identify and assess current and future threats to the U.S

Location and mission of Joint Space Operations Center

Vanderberg, AFB Provides responsive C2 capabilities to conduct space operations

Location and mission of NCTAMS PAC

Wahiawa, Hawaii Provide C4I warfighting services, operate, maintain, secure, and defend the Navy's portion, direct the daily operations of two subordinate commands

Location and mission of ONI

Washington D.C. To gain and hold a decisive information advantage over America's potential adversaries

Why core values are important to IW missions

We are entrusted by the citizens of the U.S. for the defense of the nation

Symptoms of shock

Weak, rapid pulse Shallow, rapid, irregular breathing Cold, pale skin Sweating Dilated pupils thirst, weakness, faintness, dizziness, nauseous, anxious Less responsive to unconscious

Location and mission of NCTS Guam

Western Pacific, Indian Oceans Provides multispectral connectivity, NetOps and IA

When should safe combinations be changed?

When the lock is first installed/used When compromised or believed to be compromised Whenever deemed necessary

WAP

Wireless access protocol is an open international standard for application layer network communications in a wireless communication environment

NMCI - Navy/Marine Corps Intranet

a DON program where information technology services have been outsourced to an outside contractor

CTO

a DoD-wide instruction that promulgates mandatory changes in standing instructions on how communications are handled

ONENET - OCONUS Navy Network

a Navy-wide initiative to install a common and secure IT infrastructure to OCONUS Navy locations

Hub

a common connection point for devices in a network. Usually used to connect segments of a LAN

Task Force (TF)

a component of a fleet organized by the commander of a task fleet or higher authority

Task Unit (TU)

a component of a naval task group organized by the commander of a task group or higher authority

Task Element (TE)

a component of a naval task group organized by the commanders of a task unit

Task Group (TG)

a component of naval task force organized by the commander of a task force

Security Violation

a compromise of classified information to persons not authorized to receive it or a serious failure to comply with security regulations and is likely to result in compromise

Firewall

a device configured to permit or deny computer applications upon a set of rules or other criteria

Repeater

a device that regenerates an incoming electrical, wireless or optical signals

Practice dangerous to security

a failure to comply with security regulations causing a potential compromise of classified information

High-Level Language

a language that enables a programmer to write programs that are more or less independent of a particular type of computer

Assembly Language

a low level programming language using the human readable instructions of the CPU

Router

a physical device that joins multiple wired or wireless networks together

Trojan

a program that appears legitimate but performs some illicit activity when it is run

Backdoor

a remote administration utility that once installed on a computer allows a user access and control it over a network or the internet

Worm

a self-replicating virus that does not alter files but resides in active memory and duplicates itself; causes system to slow or halt completely

Application Server

a specialized server in a client server network that has the sole responsibility of running specific applications within that network

NTD

a widely disseminated Naval Message giving an order or direction about a certain IT function that needs to be complied with

IAVB

addresses new vulnerabilities that do not pose an immediate risk to DOD systems but are significant enough that noncompliance with the corrective action could escalate the risk

Machine Language

also called machine code. This is the low-level binary code executed by the processor

Explain TACON

an authority over assigned or attached forces or commands made available for tasking

Risk Assessment Code

an expression of risk associated with a hazard that combines the hazard severity and mishap probability into a single number

Operating System

an interface between the hardware and user which is responsible for the management and coordination of activities and the sharing of the resources of a computer

Application

any program designed to perform a specific function directly for the user or for another application program

HAZMAT

any substance or material that when released may cause harm, serious injury, or death to humans or animals, or harm the environment

Treatment for burns >20% of the body

apply sterile bandaged, apirin

Define OCO

are CO missions intended to project power in and through foreign cyberspace

State the purpose of the Intelligence Community Directives (ICD) systems

are the principal means by which the DNI provides guidance, policy and direction to the Intelligence Community

NAVPERS 1070/880 and 881

awards and honors

Color for confidential

blue

Effects of hypothermia

body cannot regulate core temperature, shivering stops, hallucinations

VPN Connector

built for creating remote access VPNs with high availability, high performance and scalability

Cryptologic Technician Technical (CTT)

collect and process airborne, ship-borne, and land-based radar signals

Explain National Command Authority

collectively describes the President and Secretary of Defense

Explain the function of Navy Component Command

commands that report to the parent command

Certification

comprehensive evaluation of the technical and non-technical security safeguards of an information system to support the accreditation process that establishes the extent to which a particular design and implementation meets a set of specified security requirements

Unified commands' role in NCA

conduct military operations

RAC 1

critical

DoDN GIG - DoD Network Global Information Grid

defined as a globally interconnected end to end set of information capabilities for collecting, processing,storing, disseminating and managing info on demand

Military's role in NCA

department trains and equips all military forces

Battle of midway (crypto achievements)

due to cryptologic achievements we knew when the attack was going to happen

CANES - Consolidated/ISNS Afloat Networks and Enterprise Services

due to replace IT-21/ISNS with centralized, managed system to facilitate collaboration/information sharing between units and shore facilities

Explain the function of COCOM

establish unified combatant commands and specified combatant commands to perform military missions

Battle of Coral Sea (significance)

first carrier battle where the ships never saw each other. Lexington sunk, Yorktown damaged

Explain the function of FLTCOM

fleet commanders are responsible for numbered fleets

Accreditation

formal declaration that an information system is approved to operate at an acceptable level of risk in a specified environment based on the implementation meets a set of specified security requirements

effects of frostbite

freezing of body parts

Operating area of 7th fleet

from the international date line to the India border

Purpose of HERO,HERP, and HERF

govern the precautions and procedures for personnel safety and safe handling

color for unclassified

green

Responsibility of the Designated Disclosure Authority (DDA)

has the authority and responsibility to control disclosures of CMI and CUI to foreign governments and international organizations and their representatives or persons sponsored by them

DAO

has the authority to formally assume responsibility for operating a system at an acceptable level of risk

Host/Client

host is the main computer connected to other computers to which provides data or computing services via a network

Treatment for burns <20% of the body

immerse in cold water, pat dry

Purpose of the Preventive Maintenance System

is a standardized method for planning, scheduling, and accomplishing preventive maintenance by ship's force

Define IA

is measures that protect and defend information and information systems by ensuring their availability, integrity, authentication confidentiality, and non-repudiation.

Blue Team

is there to find ways to defend, change and re-group defense mechanisms to make incident response much stronger

Treatment for shock

lie patient down, feet stay elevated, immobilize wounds

Cryptologic Technician Interpreter (CTI)

linguists

DIA - Defense Intelligence Agency

major producer and manager of foreign military intelligence and provides military intelligence to warfighters, defense policymakers, and force planners

Configuration Management

management of security features and assurances through control of changes made to hardware, software, firmware, documentation, test, test fixtures, and test documentation throughout the life-cycle of a IS

RAC 4

minor

Define DCO

missions are executed to defend the DODIN from active cyberspace threats

RAC 3

moderate

RAC 5

negligible

IAVA (Information Assurance Vulnerability Alert)

notification that is generated when an information assurance vulnerability may result in an immediate and potentially severe threat to the DoD systems and information

Patch

operating system and application software code revisions

Color for top secret

orange

Explain the function of TYCOM

perform vital administrative personnel and operational training functions for a "type" of weapon system

Chairman's role in NCA

plans and coordinates military deployments and operations

Navy Blue sitrep

provides CNO notifications of incidents

NGA - National Geospatial-Intelligence Agency

provides timely, relevant and accurate GEOINT; tailored for customer-specific solutions

PINNACLE sitrep

reports incidents that are national-level interest to NMCC

INFOSEC

securing information whose protection is authorized by executive order 13526

RAC 2

serious

Treatment of hypothermia

slowly warm person

treatment for frostbite

slowly warm the body parts, do not rub, do not let refreeze

Virus

software, program, script or macro designed to infect, destroy, modify or cause other problems with your computer or software programs

Define SDS

technical bulletins that contain information about hazardous materials

DISN - Defense Information Systems Network

the DoD enterprise network for providing data, video and voice services

Phishing

the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication

executive leadership

the directing of activities toward the accomplishment of corporate objectives

ATO- Approval to operate

the official management decision to authorize operation of an information system and to explicitly accept the residual risk to agency operations

Back-up

the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event

Purpose of SAER

to determine that the person is unacceptable security risk

treatment of heat stress

transfer to a cool area, give water

treatment for heat stroke

transfer to a cool area, pack "hot spots" with ice

treatment of heat exhaustion

transfer to a cool area, remove clothing, DO NOT allow to chill, salt tabs

Describe the procedures of personnel rescue in regards to electrical shock

turn off power/ remove power source

Purpose of Navy Correspondence Manual

uniform standards for the Department of the Navy

Mishap Probability SubCAT D

unlikely to occur

Explain and state the purpose of an EAP

written emergency plan for safeguarding COMSEC or CCI material


Ensembles d'études connexes

Lesson 3: Consumer Behaviour, Target Audience Decisions, and Brand Positioning (CH 3 & 6)

View Set

Biology 102 Chapter 3 Lab Quiz 2

View Set

Winter W3 - Stigma, Mental Health and Disease

View Set

Final Exam Chapter 22 (Corporations: Formation & Organization)

View Set