IW Book 1 Study
Battle of Guadalcanal
(1942-1943) World War II battle in the Pacific; it represented the first Allied counter-attack against Japanese forces; Allied victory forced Japanese forces to abandon the island
Gemini 3
- 23 Mar 1965 - 1st U.S. 2-man space mission - 1st to maneuver from one orbit to another with John Young
effects of heat stroke
- Hot and/or dry skin(may appear red) -Uneven pupils -Weak rapid pulse
effects of heat stress
- Increased body temperature causing fatigue, headache, nausea, can be life threatening.
Hainan Island EP-3 Incident
01APR 2001: U.S. recon plane carrying a crew of 24 collided with a Chinese fighter, forcing EP-3 to emergency land in the People's Republic of China.
Attack on USS Liberty
08 JUN 1967: Arab-Israeli Six-Day War, Liberty was attacked by Israeli torpedo boats at 1400 accidentally and ensued in the loss of 34 men. The largest loss of life in a single event in American cryptologic history.
State the seven principles of Naval Logistics
1. Responsiveness 2. Simplicity 3. Flexibility 4. Economy 5. Attainability 6. Sustainability 7. Survivability
sloops of war
10-20 guns
STS-1
12-14 APR 1981 (John W. Young and Robert L. Crippen) - First orbital test flight of a Space Shuttle. All Navy crew
Voyage of the Great White Fleet (significance)
14 month voyage, show of naval dominance, ordered by Teddy Roosevelt
EC-121 Shoot Down
15April1969- shot down while on reconnaissance mission by North Korean aircraft over Sea of Japan. All 31 Americans were killed
Discuss ARPANET and when it was developed
1966 Advanced Research Projects Agency Network (ARPANET) of the U.S. DoD. Initially developed to communicate with and share computer resources
Apollo 11
1969, Neil Armstrong and Buzz Aldrin became first people to walk on the moon
Apollo 17
1979 Eugene Cernan & Ronald Evans 7th and final lunar landing
When/Why were the Navy Core Values Developed
1992 Admiral Kelso adopted them to provide principles to guide sailors
When and why was the Sailor's Creed developed?
1993 To remind us that we are Sailors first
Capture of USS Pueblo
23 JAN 1968: While in international waters off of the Korean Coast, N. Koreans attacked. 82 crewmen were held for 11 months before being released. Pueblo remains in N. Korea to this day, constituted as the largest single loss of sensitive material
Frigates
28-44 guns cruisers
Timeline for reporting mishaps involving all others
30 days
Battle of Coral Sea (dates)
4-8 May 1942
Ship of the Line
64-100 guns biggest of all warships
Timeline for reporting mishaps involving on duty civilians and all military fatalities
8 hours
how long a Commanding Officer can administratively suspend access before DoDCAF revokes a clearance
90 days
NSN (National Stock Number)
A 13 digit number assigned by the Defense Logistics Agency to identify an item of material in the supply distribution systems
Explain what is meant by 'need to know'
A determination that an individual requires access to specific classified information in the performance of lawful and authorized government functions and duties
Red Team
A group of people authorized and organized to emulate a potential adversary's attack or exploitation capabilities against an enterprise's security posture.
CHRIMP - Consolidated Hazardous Material Re-utilization Inventory Management Program
A hazardous material (HM) control and management program that requires all HM to be centrally controlled on board ships and submarines
Discuss the purpose of and components of Naval Tactical Command Support System (NTCSS)
A suit of software applications and requisite Commercial Off The Shelf (COTS) hardware used to provide ship and aviation maintenance management
APL - Allowance Parts List
A technical document prepared for individual equipment/components which are on board
AEL - Allowance Equipage List
A technical document prepared for various categories of equipage for mechanical, electrical, electronic, and ordnance systems
COG - Cognizance
A two character symbol that designates the stores account in which a type of material is carried and the responsible inventory control point
Describe the procedures for treatment in regards to electrical shock
ABC's, artificial ventilation, CPR, AED, Cover exit woulds loosely, treat as a burn victim
purpose of evaluation/fit rep report
Account for a sailors performance and are used to provide feedback
Use of SF701
Active Security Checklist Filled out at the end of each day to ensure that classified materials are secured properly and allows for employee accountability in the event that irregularities are discovered
State the purpose and contents Officer Distribution Control Report (ODCR)
Activity, admin, personnel and fitness reports
NMEC
Acts as a document and media exploitation service of common concern
Describe the logistics area of Naval Doctrine
Addresses the full range of logistical capabilities that are essential in the support of naval forces
Duties and responsibilities of the Command ESO
Administers educational and advancement exams and coordinates training
Page 13
Administrative Remarks
Responsibilities of Numbered Fleet Commander
Admirals in command of a numbered fleet
State the purpose and contents Billet Based Distribution (BBD)
Aligns enlisted sailors with billet level requirements
Explain the procedures for NRFI (Not Ready for Issue) DLRs in regards to RIP (Remain in Place)
Although the part may be degraded, it is required to remain in use until the new item arrived
SF 30
Amendment of Solicitation/Modification of Contract
GSA Acquisitions - General Services Administration
America's only source solely dedicated to procuring goods and services for government
Proxy Server
An internet server that controls client access to the internet. It can stop employees from accessing undesirable websites
Unclassified
Applied to information generally available to anyone, though caveats may still limit the distribution
Confidential
Applied to information whose unauthorized disclosure could reasonably be expected to cause damage to the national security
Damage if TOP SECRET is disclosed
Applied to information whose unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to national security
Damage if SECRET information is disclosed
Applied to information whose unauthorized disclosure could reasonably be expected to cause serious damage to the national security
Operating area of 5th fleet
Arabian Gulf, Gulf of Oman, Gulf of Aden, Red Sea, Arabian Sea
Areographer's mates (AG)
Are the meteorological and oceanographic experts
Operating area of 10th fleet
Atlantic Fleet
Explain ADCON
Authority over subordinate to other organization in administration and support
Explain OPCON
Authority to employ them as Commander in operational control
PSP (Personnel Security Program)
Authorizes initial and continued access to classified information and/or initial and continues assignment to sensitive duties to those who qualify
CASREP Categories
C-1 - Training C-2 - cause minor degradation C-3 - cause major degradation C-4 - cause loss to at least one primary mission
Use of SF153
COMSEC Material Report Acquisition/transfer of secure communication devices
CASREP
Casualty Report
Four required mishap reportable items
Class A - C government property damage Class A -C civilian on duty or military on/off duty Any work related illness/injury involving more than first aid All mishaps involving DOD evolution, operations, or activities
Use of SF312
Classified Information Nondisclosure Agreement A contractual agreement between the U.S Government and a cleared employee that must be executed as a condition of access to classified information
Define SCI
Classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director of Central Intelligence.
Intelligence Specialist (IS)
Collects and interprets intelligence for operational units, prepares charts and maps
Location and mission of NORTHCOM
Colorado to conduct homeland defense, civil support and security cooperation to defend and secure the U.S.
State the six areas of Naval Doctrine
Command and control Operations Warfare Logistics Intelligence Planning
Define C5I
Command, Control, Communications, Computers, Collaboration, and Intelligence
Impact of the John Walker espionage case
Compromised COMSEC and highlighted many security gaps Started 2 person integrity
Cryptologic Technician Networks (CTN)
Computer networks
RADM Grace Hopper
Computer programmer that created COBAL and coined the term computer bug and debug
Responsibilities of Secretary of the Navy
Conducts all of the affairs of the Department of the Navy
RAM - Random Anti terrorism Measures
Consists of the random implementation of higher FPCON measures in consideration of the local terrorist capabilities
Responsibilities of Type Commander
Controls the ship during its primary and intermediate training cycles
NSA (National Security Agency)
Coordinates, directs, and performs highly specialized activities to protect the U.S
C-Way program
Corporate information technology system which matches personnel inventory to requirements with the best performing sailors
Voyage of the Great White Fleet Date
Dec 1907-Feb1909
Describe the key concept of ORM
Decision making tool that helps assess and minimize risk
DD Form 1155
Delivery/Task Order: order for supplies or services
Page 2
Dependency Application/Record of Emergency Data
Location and mission of CNO N2/N6
Deputy Chief of Naval Operations for Information Warfare Develop a superior knowledge of the battle space, provide our operating forces, ensure our ability to deeply infiltrate and understand the inner workings of our adversaries
NRO - National Reconnaissance Office
Designs, builds, and operates the nation's reconnaissance satellites
Vulnerability Assessment
Determines the potential impact of disruptive events on the organization's business processes.
Describe the operations area of Naval Doctrine
Develops the doctrine to reaffirm the foundation of the U.S. Navy and Marines
Three methods of controlling bleeding
Direct pressure Pressure points Tourniquet
DD Form 1348-6
DoD Single Line Item Requisition System Document
Name the first computer and where it was located
Electronic Numerical Integrator and Computer (ENIAC) -located at the Univ of Pennsylvania -ENIAC was operational in 1945
Purpose of the Navy Drug Screening Program
Establish a valid and reliable method for inspecting personnel in support of drug and alcohol abuse and prevention
ODNI - Office of the Director of National Intelligence
Established to manage the extensive efforts of the IC
Purpose of the Defense Courier Service (DCS)
Establishes, staffs, operates, and maintains an international network of couriers and courier stations for the expeditious, cost effective, and secure transmission of qualified classified documents and material
Describe the planning area of Naval Doctrine
Examines the forces planning and the relationship between our capabilities and operational planning
Mission of NCDOC
Execute DCO, enable global power projection through proactive network defense
Describe potential risks of improperly labeled and stored HAZMAT
Fire, explosion, harmful gasses, improper medical treatment/difficulties
On-the-roof-gang
First cryptologic school, 176 radiomen, located on top of the old ONI building
Location and mission of SOUTHCOM
Florida leverages rapid response capabilities, partner nation collaboration
System Security Plan
Formal document that provides an overview of the security requirements for the information system and describes the security controls in place or planned for meeting those requirements. (Security Plan) FIPS 200; SP 800‐53; SP 800‐53A; SP 800‐37; SP 800‐18
Location and mission of USCYBERCOM
Fort Meade, MD Plans, coordinates, integrates, synchronizes and conducts activities
Location and mission of AFRICOM
Germany disrupts and neutralizes transnational threats, protects U.S. personnel and facilities, prevents and mitigates conflict
OPNAVINST 5102.1D
Governs safety and mishap reporting
Explain the purpose of the Public Affairs Office
Guarantee access to public information Communicate information about Navy/Marine programs Act as liaisons Expedite the flow of information
Location and mission of PACOM
Hawaii protect and defend the territory of the U.S, its people and its interests
HERF
Hazards of Electromagnetic Radiation to Fuel
HERO
Hazards of Electromagnetic Radiation to Ordnance
HERP
Hazards of Electromagnetic Radiation to Personnel
Explain Alan Turnig's contributions to the IW field
He broke the Enigma Code
Why was a ship named after Osmond Imgram?
He was the first enlisted man killing in action in WWI
Responsibilities of Chairman Joint Chiefs of Staff
Highest ranking military officer, principal adviser
State who can give the order to initiate Emergency Destruction
Highest ranking person on station for SCI
Steps of ORM
Identify Hazards Assess Hazards Make Risk Decisions Implement Controls Supervise
What information does an SDS provide
Identity, Hazardous ingredients, physical/chemical characteristics, physical/health hazards, reactivity, handling precautions, first aid, counter measures, routes into the body, date of SDS, contact information for HAZMAT
Location and mission of TRANSCOM
Illinios provides full spectrum global mobility solutions and related enabling capabilities for supported customers
IT21/ISNS
Information Technology Information for 21st Century
Cryptologic Technician Maintenance (CTM)
Installs, configures, diagnoses, and repairs state-of-the-art electronics, computers and hardwares
CNO's four core attributes
Integrity Accountability Initiative Toughness
Discuss the uses of IMPAC
International Merchant Purchase Authorization Card is VISA purchase card for which every statement has to be paid in full
SIM (Selected Item Maintenance)
Inventory control system by which maximum attention is given to those items experiencing a high rate of usage
The Purple Code
Japanese code Broken in WW2
Identify the 11 pressure points
Jaw, Temple, Collar Bone, Neck, Inner-upper arm, inner elbow, wrist, upper thigh, groin, knee, ankle
Who was in command of the USS Alfred
John Barry
Battle of Midway date
June 1942
Battle of Normandy (D-Day)
June-August 1944, largest amphibious assault in history
How to store HAZMAT
Keep different types separate Close all containers tightly Flammables should be kept in lockers
Who was the first CIO/DNI
LT Theodorus Bailey Myers Mason
NASA
Lead an innovative and sustainable program of exploration
Explain the importance of character related to IW professionals
Leadership development encompasses leadership, character development and ethics
USN - U.S Navy
Leading provider of maritime intelligence
Mishap Probability SubCAT A
Likely to occur immediately or within a short period of time
State the responsibilities of the Top Secret Control Officer (TSCO)
Maintains a system of accountability to record the receipt, reproduction, transfer, transmission, downgrading, declassification and destruction of command Top Secret Information
When was ONI established and by whom?
March 23, 1882. Secretary of the Navy William Hunt.
NC - Not carried
Material for which there is no storeroom allowance
NIS - Not in Stock
Material that is normally stocked but supply is temporarily exhausted
Attack on USS Stark
May 1987, Stark attacked by Iraqi Fighter, 37 Sailor died. Only successful anti-ship missile
Mercury 3
May 5, 1961 First US manned space flight. LT Alan Shepard, USN
Mishap Probability SubCAT C
Might occur
Members of NCA
Military Chairman Unified commands
DD Form 448
Military interdepartmental Purchase Request (MIPR); used to forward a request for contractual action to another military department
Effects of Heat Exhaustion
Moist, Clammy skin, and dilated pupils
Type of investigation needed for Confidential
NACLC every 15 years
Operating Area of 6th Fleet
NAVEUR-NAVAF
Location and mission of NCTS Naples
Naples, Italy Telecommunications connectivity
Type of investigation needed for Secret
National Agency Check with Local Agency and Credit Checks (NACLC) - every 10 years
Navajo Code Talkers
Native Americans from the Navajo tribe used their own language to make a code for the U.S. military that the Japanese could not decipher
Discuss the Depot Level Repairable (DLRs) program
Navy managed items that have been selected for special inventory control based on unit cost, annual demand, difficulty of repair, and other economic considerations
Location and mission of STRATCOM
Nebraska deters strategic attack and employs forces, as directed, to guarantee the security of our nation and our allies
JWICS - Joint Worldwide Intelligence Community System
Network established by DIA to connect all members of the DoDIIS community
Location and mission of NNWC
Norfolk, VA Execute tactical-level command and control to direct, operate, maintain and secure Navy communications
Location and mission of NCTAMS LANT
Norfolk, VA Operates and defends responsive, resilient, and secure computer and telecommunications systems
Unit sitrep
Not big enough to be sent to CNO/Low media interest
Discuss the purpose of personnel security
Objective is to authorize initial and continued access to classified information and/or initial and continued assignment to sensitive duties to those persons whose loyalty, reliability and trustworthiness are such that entrusting them with classified information is clearly consistent with the interests of national security
Name the 2 departments that were combined to form the ONI
Office of Intelligence Department of Library
What is the oldest intelligence organization in the Navy?
Office of Naval Intelligence (ONI)
Information Systems Technician (IT)
Operates communication equipment; transmits, receives and processes all forms of military record and voice communications; installs and maintains telecommunications equipment.
First ship named after an enlisted man
Osmond Ingram (DD 255)
COMSEC
Outlines measures and controls taken to deny unauthorized persons access to information derived from telecommunications and to ensure the authenticity of those communications.
National Security Act 1947
Passed in 1947 in response to perceived threats from the Soviet Union after WWII. It established the Department of Defense and the Central Intelligence Agency (CIA) and National Security Council.
List the items prohibited in a SCIF
Personally owned auto, photographic and video equipment Personally owned computers and associated media Bluetooth devices
Operating Area of 3rd Fleet
Point Loma, California Pacific Fleet
Location and mission of Naval Satellite Operations Center
Point Mugu Is responsible for operating, managing and maintaining assigned narrow band satellite systems
Describe the intelligence area of Naval Doctrine
Points the way for intelligence support meeting requirements of both regional conflicts and other operations
Type of investigation needed for SCI
Pre-nomination interview conducted by the SSO or its designee
What is the goal of the Navy's Hearing Conservation Program
Prevent occupational hearing loss and assure auditory fitness
Explain and state the purpose of Emergency Destruction Procedures
Prevent uncleared personnel from access to classified material in case of emergency such as fire, natural disaster, civil disturbance, terrorist activities, or enemy attack
Importance of IG
Principal adviser to SecDef
Responsibilities of Secretary of Defense
Principal defense policy adviser to the president
Mishap Probability
Probability that a hazard will result in a mishap or loss
Mishap Probability SubCAT B
Probably will occur in time
SF 368
Product Quality Deficiency Report (PQDR): for reporting product quality deficiencies to another component
Conditions that led to the formation of the Navy
Protection from pirates and the British
DOE - Department of Energy
Protects vital national security information and technologies
Fleet / Force / Command Master Chief
Provide leadership to the enlisted force and advise commanders and COs
CENTRIXS - Combined Enterprise Regional Information Exchange System
Provides U.S coalition and allied interests with a secure, reliable, high speed LAN with access to the coalition WAN
Purpose of Concurrent report
Provides a record of significant performance that was not directly observable
NIPRNET - Non-Classified Internet Protocol Router Network
Provides access for unclassified combat support operations Used to exchange sensitive but unclassified information between internal users as well as providing those users with internet access
Explain how Defense Property Accountability System (DPAS) is used to track equipment
Provides accountability, asset management capabilities, and property financial reporting information
DRMO - Defense Re-utilization and Marketing Office
Provides for the redistribution and disposal of DoD equipment and supplies no longer needed by the original user
Senior Leadership
Provides knowledge and skills required to manage and lead effectively
Purpose of the Maintenance and Material Management (3-M) System
Provides maintenance and material management managers with a process for planning, acquiring, organizing, directing, controlling, and evaluating the manpower and material resources used to support maintenance
Purpose of a HAZREP message
Provides means for unit discovering a hazardous condition or experiencing a near mishap to alert COMNAVSAFECEN-Norfolk, collect data/lessons learned
CIA - Central Intelligence Agency
Provides national security intelligence to senior U.S policymakers
USAF - U.S Air Force
Provides policy, oversight, and guidance to all Air Force intelligence organizations
Describe the command and control area of Naval Doctrine
Provides the basic concepts to fulfill the information needs of commanders, forces and weapons systems
State the purpose and contents Activity Manpower Document (AMD)
Provides the quantitative and qualitative manpower requirements
DOS - Department of State
Provides the secretary of state with timely, objective analysis of global developments
Mission of DISA
Provides, operates, and assures command and control information sharing capabilities
SF 44
Purchase Order Invoice Voucher: a multi-purpose form designed for on-the-spot, over-the-counter purchases of supplies and non-personal services
color for Secret
Red
Define the purpose of the MAMs (Maintenance Assist Module)
Replaceable assemblies needed to perform and approved maintenance plan which calls for identifying the fault of failed module through progressive and/or selective module substitution
SF 364
Report of Discrepancy used to identify and describe the specific technical data discrepancy
DD Form 200
Report of Survey: FLIPL; to officially report the facts and circumstances supporting the assessment of financial charges for the loss, damage, or destruction of DoD-controlled property
Cryptologic Technician Collection (CTR)
Reports on communication signals
NAVCOMPT 2276
Request for contractual procurement
DD Form 1149
Requisition and Invoice/Shipping Document: Used to invoice, requisition and shipping of materials between shipping and receiving parties who are under the DoD
DEA - Drug Enforcement Agency
Responsible for enforcing the controlled substance laws and regulations
USA - U.S Army
Responsible for the overall coordination of the 5 major MI
DOT - Department of the Treasury
Responsible for the receipt, analysis, collation and dissemination of foreign intelligence
FBI - Federal Bureau of Investigation
Responsible for understanding threats to our national security
State the qualities that characterize the Navy/Marine Corps team as instruments to support national policies
SMRF Self Sustainability Mobility Readiness Flexibility
Operating Area of 4th Fleet
SOUTHCOM
Who has overall authority of, and controls access to, a SCIF
SSO
Switch
Same as a HUB only smarter
Location and mission of NCTS San Diego
San Diego Operates robust and secure satellite, network, and strategic communications
Three objectives of first aid
Save life Prevent further injury Prevent infection
SIPRNET - Secret Internet Protocol Router Network
Secret level network that supports the DoD community, law enforcement agencies
What is SAER
Security Access Eligibility Report
Use of SF702
Security Container Check Sheet Provides a record of the names and times that persons have open, closed and checked a particular container that holds classified information
use of SF700
Security Container Information Contains vital information about the security container in which it is located, including location, container number, lock serial number, and contact information in the container is found open and unattended
Master Chief Petty Officer of the Navy
Senior enlisted member, an adviser to the CNO and CNP
Responsibilities of Chief of Naval Operations
Senior military officer of the DON, responsible to SECNAV for the command utilization of resources and operating efficiency
SGLI
Service Members Group Life Insurance
Three classes of Naval vessels that existed at the inception of the Navy
Ship of the line Frigates Sloops of war
Location and mission of NOAA
Silver Springs, MD Science, Service, Stewardship
Type of investigation needed for Top Secret
Sing Scope Background Investigation (SSBI)- Every 5 years
SF 1449
Solicitation/Contract/Order for Commercial Items
Define the purpose of the Bulkhead mounted spares
Spares that are kept in the work center due to size or cost resulting in the parent department head to be responsible for their upkeep
Six Programs of Brilliant on the Basics
Sponsorship, INDOC, CDB, Ombudsman, Mentorship, Recognition Programs
What is the DLPT
Standardized test for measuring proficiency in a foreign language
Methods for clearing an obstructed airway
Standing abdominal thrust Reclining abdominal thrust Standing chest thrust Reclining chest thrust
Location and mission of CNMOC
Stennis Space Center, MS U.S. forces are so superior in knowing, predicting, and exploiting the physical environment in operations that our adversaries avoid us
Location and mission of NAVIFOR
Suffolk, VA Provide naval and joint operational commanders with combat ready information warfare forces
USCG - U.S Coast Guard
Support CG tactical and operational commanders
State the three levels of war
Tactical Operational Strategic
Location and mission of SOCOM
Tampa FL synchronizes the planning of special operators and provides Special Operation forces to support persistent and networked threats
Location and mission of CENTCOM
Tampa Florida to direct and enable military operations and activities with allies and partners to increase regional security and stability in support of enduring U.S. interests
IATO (Interim Authority to Operate)
Temporary authorization granted by DAA or SCO
Landing at Inchon
The Battle of Inchon was an amphibious invasion and battle of the Korean War that resulted in a decisive victory and strategic reversal in favor of the United Nations.
Mission of NASIC
The National Air/Space Intelligence Center produces integrated/predictive air, space, and specialized intel to enable military ops, force modernization, and policy making
Describe the warfare area of Naval Doctrine
The inherent nature and enduring principles of naval forces
Direct Leadership
The leader controls the interaction of the group by giving directions and information and allowing little discussion.
Explain the procedures for NRFI (Not Ready for Issue) DLRs in regards to Turn-in
The part that needs to be replaced is turned-in to supply then the process is initiated to replace the part
Bletchley Park
The place where British had a code breaking center, helped save Britain
COMPUSEC
The protection of computing systems against threats to confidentiality, integrity, availability and accountability. It must address the threats to electronic transactions and files
Responsibilities of Commander in Chief
The senior military authority in the nation and is ultimately responsible for the protection of the U.S.
Discuss the purpose of the Material Obligation Validation (MOV)
The unfilled portion of a requisition that is not immediately available for issue
Location and mission of Office of Oceanographer/Navigator of the Navy
To evaluate and provide up-to-date and accurate ocean maps
Mission of the US Navy
To maintain, train and equip combat-ready Naval forces capable of winning wars, deterring aggression and maintaining freedom of the seas.
Use of SF703
Top Secret Cover Sheet Cover sheet for top secret materials
Battle of Midway
Turning point in WWII
Name the first submarine used in naval warfare
Turtle
Officer accession programs that are available to enlisted personnel
US Naval Academy Officer Candidate School MECP MSCIPP LDO CWO STA-21
Location and mission of NCTS Bahrain
USCENTCOM Delivers voice and IP services to shore and fleet warfighters and executes problem resolution
name the first U.S. flag ship
USS Alfred
Describe the procedures for preparing hard copy classified material for transportation via hand-carry
Use a classified material cover sheet, file folder, or other covering Double-wrap the classified information when hand carrying outside the command The security manager shall provide written authorization to all individuals escorting classified information
Describe the procedures for preparing hard copy classified material for transportation via DCS
Use of metal banding is prohibited Double wrapped with opaque material Properly marked classification and address Minimum size is 8 ½ " x 11" flat envelope or small box measuring at least 20" in linear length If over 300 pounds or 90" linear length coordinate in advance All seams will be reinforces with the prescribed tape-gummed kraft paper tape
ATFP (Anti-Terrorism Force Protection)
Used to ensure special emphasis to reducing the vulnerability of personnel, family, resources , facilities, critical infrastructure and ships under DON cognizance to terrorist acts
DHS - Department of Homeland Security
Uses information to identify and assess current and future threats to the U.S
Location and mission of Joint Space Operations Center
Vanderberg, AFB Provides responsive C2 capabilities to conduct space operations
Location and mission of NCTAMS PAC
Wahiawa, Hawaii Provide C4I warfighting services, operate, maintain, secure, and defend the Navy's portion, direct the daily operations of two subordinate commands
Location and mission of ONI
Washington D.C. To gain and hold a decisive information advantage over America's potential adversaries
Why core values are important to IW missions
We are entrusted by the citizens of the U.S. for the defense of the nation
Symptoms of shock
Weak, rapid pulse Shallow, rapid, irregular breathing Cold, pale skin Sweating Dilated pupils thirst, weakness, faintness, dizziness, nauseous, anxious Less responsive to unconscious
Location and mission of NCTS Guam
Western Pacific, Indian Oceans Provides multispectral connectivity, NetOps and IA
When should safe combinations be changed?
When the lock is first installed/used When compromised or believed to be compromised Whenever deemed necessary
WAP
Wireless access protocol is an open international standard for application layer network communications in a wireless communication environment
NMCI - Navy/Marine Corps Intranet
a DON program where information technology services have been outsourced to an outside contractor
CTO
a DoD-wide instruction that promulgates mandatory changes in standing instructions on how communications are handled
ONENET - OCONUS Navy Network
a Navy-wide initiative to install a common and secure IT infrastructure to OCONUS Navy locations
Hub
a common connection point for devices in a network. Usually used to connect segments of a LAN
Task Force (TF)
a component of a fleet organized by the commander of a task fleet or higher authority
Task Unit (TU)
a component of a naval task group organized by the commander of a task group or higher authority
Task Element (TE)
a component of a naval task group organized by the commanders of a task unit
Task Group (TG)
a component of naval task force organized by the commander of a task force
Security Violation
a compromise of classified information to persons not authorized to receive it or a serious failure to comply with security regulations and is likely to result in compromise
Firewall
a device configured to permit or deny computer applications upon a set of rules or other criteria
Repeater
a device that regenerates an incoming electrical, wireless or optical signals
Practice dangerous to security
a failure to comply with security regulations causing a potential compromise of classified information
High-Level Language
a language that enables a programmer to write programs that are more or less independent of a particular type of computer
Assembly Language
a low level programming language using the human readable instructions of the CPU
Router
a physical device that joins multiple wired or wireless networks together
Trojan
a program that appears legitimate but performs some illicit activity when it is run
Backdoor
a remote administration utility that once installed on a computer allows a user access and control it over a network or the internet
Worm
a self-replicating virus that does not alter files but resides in active memory and duplicates itself; causes system to slow or halt completely
Application Server
a specialized server in a client server network that has the sole responsibility of running specific applications within that network
NTD
a widely disseminated Naval Message giving an order or direction about a certain IT function that needs to be complied with
IAVB
addresses new vulnerabilities that do not pose an immediate risk to DOD systems but are significant enough that noncompliance with the corrective action could escalate the risk
Machine Language
also called machine code. This is the low-level binary code executed by the processor
Explain TACON
an authority over assigned or attached forces or commands made available for tasking
Risk Assessment Code
an expression of risk associated with a hazard that combines the hazard severity and mishap probability into a single number
Operating System
an interface between the hardware and user which is responsible for the management and coordination of activities and the sharing of the resources of a computer
Application
any program designed to perform a specific function directly for the user or for another application program
HAZMAT
any substance or material that when released may cause harm, serious injury, or death to humans or animals, or harm the environment
Treatment for burns >20% of the body
apply sterile bandaged, apirin
Define OCO
are CO missions intended to project power in and through foreign cyberspace
State the purpose of the Intelligence Community Directives (ICD) systems
are the principal means by which the DNI provides guidance, policy and direction to the Intelligence Community
NAVPERS 1070/880 and 881
awards and honors
Color for confidential
blue
Effects of hypothermia
body cannot regulate core temperature, shivering stops, hallucinations
VPN Connector
built for creating remote access VPNs with high availability, high performance and scalability
Cryptologic Technician Technical (CTT)
collect and process airborne, ship-borne, and land-based radar signals
Explain National Command Authority
collectively describes the President and Secretary of Defense
Explain the function of Navy Component Command
commands that report to the parent command
Certification
comprehensive evaluation of the technical and non-technical security safeguards of an information system to support the accreditation process that establishes the extent to which a particular design and implementation meets a set of specified security requirements
Unified commands' role in NCA
conduct military operations
RAC 1
critical
DoDN GIG - DoD Network Global Information Grid
defined as a globally interconnected end to end set of information capabilities for collecting, processing,storing, disseminating and managing info on demand
Military's role in NCA
department trains and equips all military forces
Battle of midway (crypto achievements)
due to cryptologic achievements we knew when the attack was going to happen
CANES - Consolidated/ISNS Afloat Networks and Enterprise Services
due to replace IT-21/ISNS with centralized, managed system to facilitate collaboration/information sharing between units and shore facilities
Explain the function of COCOM
establish unified combatant commands and specified combatant commands to perform military missions
Battle of Coral Sea (significance)
first carrier battle where the ships never saw each other. Lexington sunk, Yorktown damaged
Explain the function of FLTCOM
fleet commanders are responsible for numbered fleets
Accreditation
formal declaration that an information system is approved to operate at an acceptable level of risk in a specified environment based on the implementation meets a set of specified security requirements
effects of frostbite
freezing of body parts
Operating area of 7th fleet
from the international date line to the India border
Purpose of HERO,HERP, and HERF
govern the precautions and procedures for personnel safety and safe handling
color for unclassified
green
Responsibility of the Designated Disclosure Authority (DDA)
has the authority and responsibility to control disclosures of CMI and CUI to foreign governments and international organizations and their representatives or persons sponsored by them
DAO
has the authority to formally assume responsibility for operating a system at an acceptable level of risk
Host/Client
host is the main computer connected to other computers to which provides data or computing services via a network
Treatment for burns <20% of the body
immerse in cold water, pat dry
Purpose of the Preventive Maintenance System
is a standardized method for planning, scheduling, and accomplishing preventive maintenance by ship's force
Define IA
is measures that protect and defend information and information systems by ensuring their availability, integrity, authentication confidentiality, and non-repudiation.
Blue Team
is there to find ways to defend, change and re-group defense mechanisms to make incident response much stronger
Treatment for shock
lie patient down, feet stay elevated, immobilize wounds
Cryptologic Technician Interpreter (CTI)
linguists
DIA - Defense Intelligence Agency
major producer and manager of foreign military intelligence and provides military intelligence to warfighters, defense policymakers, and force planners
Configuration Management
management of security features and assurances through control of changes made to hardware, software, firmware, documentation, test, test fixtures, and test documentation throughout the life-cycle of a IS
RAC 4
minor
Define DCO
missions are executed to defend the DODIN from active cyberspace threats
RAC 3
moderate
RAC 5
negligible
IAVA (Information Assurance Vulnerability Alert)
notification that is generated when an information assurance vulnerability may result in an immediate and potentially severe threat to the DoD systems and information
Patch
operating system and application software code revisions
Color for top secret
orange
Explain the function of TYCOM
perform vital administrative personnel and operational training functions for a "type" of weapon system
Chairman's role in NCA
plans and coordinates military deployments and operations
Navy Blue sitrep
provides CNO notifications of incidents
NGA - National Geospatial-Intelligence Agency
provides timely, relevant and accurate GEOINT; tailored for customer-specific solutions
PINNACLE sitrep
reports incidents that are national-level interest to NMCC
INFOSEC
securing information whose protection is authorized by executive order 13526
RAC 2
serious
Treatment of hypothermia
slowly warm person
treatment for frostbite
slowly warm the body parts, do not rub, do not let refreeze
Virus
software, program, script or macro designed to infect, destroy, modify or cause other problems with your computer or software programs
Define SDS
technical bulletins that contain information about hazardous materials
DISN - Defense Information Systems Network
the DoD enterprise network for providing data, video and voice services
Phishing
the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication
executive leadership
the directing of activities toward the accomplishment of corporate objectives
ATO- Approval to operate
the official management decision to authorize operation of an information system and to explicitly accept the residual risk to agency operations
Back-up
the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event
Purpose of SAER
to determine that the person is unacceptable security risk
treatment of heat stress
transfer to a cool area, give water
treatment for heat stroke
transfer to a cool area, pack "hot spots" with ice
treatment of heat exhaustion
transfer to a cool area, remove clothing, DO NOT allow to chill, salt tabs
Describe the procedures of personnel rescue in regards to electrical shock
turn off power/ remove power source
Purpose of Navy Correspondence Manual
uniform standards for the Department of the Navy
Mishap Probability SubCAT D
unlikely to occur
Explain and state the purpose of an EAP
written emergency plan for safeguarding COMSEC or CCI material