Block 2 - Unit 5 Flashcards
The cyberspace domain is the use of electronics and the __________ __________ to store, modify and exchange data via networked systems and associated physical infrastructures
Electromagnetic spectrum - EMS
__________ __________ missions deny, degrade, disrupt, destroy, or deceive an adversary’s cyberspace capability
Offensive cyberspace
__________ __________ is an offensive cyberspace operation employing network-based capabilities to destroy, disrupt, or corrupt information resident in or transmitting through networks
Network Attack - NetA
_________ __________ use traditional kinetic means to physically destroy a target
Physical attack
_________ __________ objective is to protect friendly forces and vital interests from adversary cyberspace attack
Defensive mission
What are the three major components of network defense activities?
- Active
- Passive
- Inherent
_________ __________ are measures taken to directly counter adversary activities to penetrate a network
Active defenses
__________ __________ is a major component of network defense involving security related activities such as malicious software detection, port security, and system configuration
Passive defense
Using a computer network to gather data from target or an adversary automated information systems or network is __________ __________ ___________
Computer Network Exploitation
Activities used to negate, neutralize or diminish the effects of or an advantage from foreign psychological operations are ____________
Counterpropaganda
Psychological operations target the adversary’s ___________
Mind
The influence operations capability designed to deceive our adversaries is ________ ________
MILDEC
__________ __________ is the methodology applied to an operation for the purpose of denying critical information to the adversary
OPSEC
__________ ___________ operations are the first line of defense against adversary propaganda and disinformation
Public Affairs - PA
Electronic warfare (EW) is any military action using the electromagnetic or __________ __________ to manipulate the electromagnetic spectrum to attack an adversary
Directed energy
The electronic warfare operation that uses directed energy (DE) of anti-radiation weapons to attack personnel, facilities, or equipment is known as __________ __________
Electronic Attack - EA
The electronic warfare operation focused on protecting personnel, facilities, and equipment from adversary’s employment of electronic warfare is _________ _________
Electronic Protection - EP
The collection of electromagnetic data used for making timely decisions involving electronic warfare operations is __________ ___________ __________
Electronic Warfare Support - ES
__________ systems are employed to control, manage, and monitor large complex systems
Supervisory Control and Data Acquisition - SCADA
Why are SCADA systems a concern for cyber warriors?
A cyber terrorist with the proper knowledge and equipment can attack our networks and cause damages. Things at risk are public and private institutions in the sectors of agriculture, food, water, public health, emergency services, government, etc.
Tactical Data Link (TADL) systems were developed in conjunction with digital computers to permit Joint and Coalition forces to exchange information across a ____________ interface
Digital
Tactical Data Link (TADL) systems are immune from cyberspace attack. (T/F)
False!
__________ is composed of hundreds of thousands of interconnected computers, servers, routers, switches and fiber optic cables that allow our critical infrastructures to work
Cyberspace
How can superior cyber capabilities be used to target an adversary’s decision cycle?
Cyber combat operations can disrupt, degrade, or deny the adversary’s ability to collect or display information, command forces or even take action against friendly forces
List the three national objectives to secure cyberspace
- Prevent cyber attacks against American critical infrastructures:
- Reduce national vulnerability to cyber attacks:
- Minimize damage and recovery time from attacks that do occur
The Ops capability of using the domain includes _________________ and _________________
Cyberspace Attack and Force Enhancement
Cyberspace effects gained from directed energy include (list 5)
- sensor disruption
- data manipulation
- decision support degradation
- command and control disruption
- weapon system degradation
Force enhancement operations provide warfighters global _________ ___________
Situational Awareness
What counter operations are utilized to ensure the cyberspace capability of controlling the domain?
Offensive Counter-Operations - OCO
Defensive Counter-Operations - DCO
Cyberspace defense includes measures to preserve, protect, recover and reconstitute friendly cyberspace capabilities before, during and after a __________ __________
Hostile attack
Cyberspace ____________ operations ensure friendly freedom of action in cyberspace while denying that same freedom to our adversaries
Offensive Counter-Operations - OCO
Cyberspace Civil Support Operations will also support the defense industrial base in protecting __________ ____________
Sensitive information
What are the four steps involved in the defense against covert activity by an adversary?
- Monitoring networks and systems
- Detecting intrusions and other activities
- Reacting to intrusions and other activities
- Counter attack