Block 2 - Unit 5 Flashcards
The cyberspace domain is the use of electronics and the __________ __________ to store, modify and exchange data via networked systems and associated physical infrastructures
Electromagnetic spectrum - EMS
__________ __________ missions deny, degrade, disrupt, destroy, or deceive an adversary’s cyberspace capability
Offensive cyberspace
__________ __________ is an offensive cyberspace operation employing network-based capabilities to destroy, disrupt, or corrupt information resident in or transmitting through networks
Network Attack - NetA
_________ __________ use traditional kinetic means to physically destroy a target
Physical attack
_________ __________ objective is to protect friendly forces and vital interests from adversary cyberspace attack
Defensive mission
What are the three major components of network defense activities?
- Active
- Passive
- Inherent
_________ __________ are measures taken to directly counter adversary activities to penetrate a network
Active defenses
__________ __________ is a major component of network defense involving security related activities such as malicious software detection, port security, and system configuration
Passive defense
Using a computer network to gather data from target or an adversary automated information systems or network is __________ __________ ___________
Computer Network Exploitation
Activities used to negate, neutralize or diminish the effects of or an advantage from foreign psychological operations are ____________
Counterpropaganda
Psychological operations target the adversary’s ___________
Mind
The influence operations capability designed to deceive our adversaries is ________ ________
MILDEC
__________ __________ is the methodology applied to an operation for the purpose of denying critical information to the adversary
OPSEC
__________ ___________ operations are the first line of defense against adversary propaganda and disinformation
Public Affairs - PA
Electronic warfare (EW) is any military action using the electromagnetic or __________ __________ to manipulate the electromagnetic spectrum to attack an adversary
Directed energy
The electronic warfare operation that uses directed energy (DE) of anti-radiation weapons to attack personnel, facilities, or equipment is known as __________ __________
Electronic Attack - EA
The electronic warfare operation focused on protecting personnel, facilities, and equipment from adversary’s employment of electronic warfare is _________ _________
Electronic Protection - EP
The collection of electromagnetic data used for making timely decisions involving electronic warfare operations is __________ ___________ __________
Electronic Warfare Support - ES
__________ systems are employed to control, manage, and monitor large complex systems
Supervisory Control and Data Acquisition - SCADA
Why are SCADA systems a concern for cyber warriors?
A cyber terrorist with the proper knowledge and equipment can attack our networks and cause damages. Things at risk are public and private institutions in the sectors of agriculture, food, water, public health, emergency services, government, etc.
Tactical Data Link (TADL) systems were developed in conjunction with digital computers to permit Joint and Coalition forces to exchange information across a ____________ interface
Digital
Tactical Data Link (TADL) systems are immune from cyberspace attack. (T/F)
False!
__________ is composed of hundreds of thousands of interconnected computers, servers, routers, switches and fiber optic cables that allow our critical infrastructures to work
Cyberspace
How can superior cyber capabilities be used to target an adversary’s decision cycle?
Cyber combat operations can disrupt, degrade, or deny the adversary’s ability to collect or display information, command forces or even take action against friendly forces