Board Flashcards
Solar Cycle
11 year cycle which has a 4 year rise and 7 year decline
Van Allen Radiation Belts
2 concentric, donut shaped regions of stable, trapped charged particles that exist because the geomagnetic field near the earth is strong and field lines are closed
Atmospheric Drag
Affects low orbiting objects, less than 1000 km. Energy deposited in the earth’s upper atmosphere by charged particle bombardment heats the atmosphere, causing it to expand outward over a period of time.
Geosynchronous Orbit
Satellite with an average altitude of approximately 19,300 nautical miles. Satellite rotates once around earth in as long as it takes for earth to rotate around once
FSM
Fleet SIPR Messaging System. Point to point connection between ship and NOC. Faster, more reliable record message traffic delivery to ships.
MUA
Master Update Authority. NCTAMS PAC. The single point for directory updates.
What is RI
Routing Indicators. GENSER RI’s, Begin with the letter R and are seven characters in length
What is OSRI
Originating Station Routing Indicator. Ships derive by using the first 4 letters of the routing indicator of the Fleet NARC assigned to the servicing NCTAMS/NCTS system to which they will transmit, suffixed by FRI assigned to the fleet/mobile unit
What is NARC
*
FRI
Fleet Routing Indicator. Three letter designator assigned to the fleet/mobile unit
FL 1
Start of Message and Sequence Number
FL 2
Routing Indicator
FL 4
Security Label
FL 5
DTG
FL 6
Originator
FL 7
Action Address
FL 8
Info Address
FL 9
Exempt Address
FL 11
Break
FL 12
Text
FL 13
Break
FL 14
Confirmation
FL 15
End of message validation
ZBZ
Corrupt
ZUJ
Stand by
ZEV
Acknowledged
ZUG
Negative
ZUE
Affirmative
ZES
Incomplete
What are the unique four letter designators that identify broadcasts
PMUL - NCTAMS PAC
LMUL - NCTAMS LANT
IMUL - NCTAMS PAC (ALTERNATE)
-First letter identifies naval communication area and second letter identify single or multiple channel broadcast.
BCA
Broadcast Control Authority. Central hub where all message traffic sent to or received by submarines and shore stations gets disseminated.
BKS
Broadcast Keying Stations. Introduces message or facsimile traffic into the Fleet Broadcast Network by generating a key stream of broadcast-bound information to the BCS for specific channel allocation before being forwarded to the BRS for broadcast transmission.
BCS
Provides all the technical aspects of affecting a Fleet Broadcast, which include assembling key streams received from the various broadcast keying stations into specific broadcast channels and delivering a composite key stream to the Broadcast Radiating Station for transmission
ORM
Operation Risk Management. Decision making tool used to minimize risk
ORM Steps
Identifying Hazards Assessing Hazards Making Risk Decisions Implementing Controls Supervising
Instruction that governs safety and mishap reporting
OPNAVINST 5102.D
Navy & Marine Corp Mishap & Safety Investigation, Reporting, & Record keeping manual
Hazard severity and the 4 categories
Assessment of the expected consequence, defined by degree of injury or occupational illness that could occur
- Category I - may cause death or loss of asset or grave damage
- Category II - severe injury, or property damage
- Category III - minor injury or property damage
- Category IV - minimal threat to personnel safety or property
Mishap Probability and subcategories
Assessment of the likelihood that given exposure to a hazard an accident will result
- Sub-Category A - Like to occur immediately
- Sub-Category B - Probably will occur in time
- Sub-Category C - May occur in time
- Sub-Category D - Unlikely to occur
RAC
Risk Assessment Code. Structured process to identify and assess hazards
- Critical Risk
- Serious Risk
- Moderate Risk
- Minor Risk
- Negligible Risk
How long do SITREPs have to be kept
5 years
3 objectives of first aid
Save lives, prevent further injury, prevent infection
Methods of controlling bleeding
Direct pressure, pressure point, tourniquet
Methods of clearing an obstructed airway
- Standing abdominal thrust
- Reclining abdominal thrust
- Standing chest thrust
- Reclining abdominal thrust
HERO
Hazards of Electromagnetic Radiation to Ordnance
HERP
Hazards of Electromagnetic Radiation to Personnel
HERF
Hazards of Electromagnetic Radiation to Fuels
Types of PPE
Respirators, Hand protection, Foot protection, Eye protection, Face protection, Skin/Body protection, Hearing protection
Naval Doctrine
WIPLOC
- Naval Warfare
- Naval Intelligence
- Naval Planning
- Naval Logistics
- Naval Operations
- Naval Command and Control
Seven Principles of Naval Logistics
FEARSSS Responsiveness Simplicity Flexibility Economy Attainability Sustainability Survivability
First navy ship named after an enlisted man
Osmond Ingram
DD 255
First enlisted man killed in WWI
Navy Birthday
13 October 1775
Three classes of naval vessels that existed an inception of the navy
Ship of the line
Frigates
Sloops of war
Hand Salute origin
The hand salute was done because most palms were dirty from handling lines. It was hands down as it was it was considered insulting to present a dirty palm
Battle Coral Sea
Aircraft passed each other in the clouds in the worlds first carrier versus carrier battle
Voyage of the Great White Fleet
Left Hampton Roads, Virginia, for a round the world cruise to show the flag and demonstrate the strength of the U.S. Navy
Battle of Normandy
Largest amphibious operation in history
Midway
Turning point of the Pacific war
Guadalcanal
After three days of bitter fighting, the Japanese naval forces retreated and US Marines were able to secure the island of guadalcanal
Battle of Leyte Gulf
Final blow to the Japanese navy on October 23, 1944
Mercury 3
Alan B Shepard
Gemini 3
John W Young
Apollo 11
Neil Armstrong
Apollo 17
Eugene Cernan and Ronald Evens
STS-1
All navy crew
On-the-roof-gang
A total of 176 enlisted radio operators were specially trained at a unique school located on the roof of the old Navy Dept building
Purple code
Japanese Cipher Machine. Code named purple because of the binders used by Japan
USS Liberty
Mistakenly attacked by Israeli forces in “six day war”
USS Pueblo
While off Wonsan,North Korea, Pueblo was attacked by local forces and seized
Landing at Inchon
Secured by Marines in less than 24 hours
Hainan Island EP-3 Incident
A mid-air collision between a USN EP-3 ARIES II signals surveillance aircraft and a People’s Liberation Army Navy J-Bll interceptor fighter jet resulted in an international dispute between the US and China
USS Stark
Two Iraqi missiles struck the Side. 37 sailors were killed
State the qualities that characterize the Navy/Marine Corps team as instruments to support national policies
Readiness, Flexibility, Self sustainability, Mobility
Levels of war
Tactical, operational, strategic
National Security Act of 1947
Created the CIA. Serves as the primary civilian intelligence gathering organization in the government
RADM Hopper
Worked on the Mark I and Mark II electromechanical computing machine
First computer
ABC was the first computer in 1937
John Walker
Convicted of selling classified information to the Soviets. Reason we have TPI today
Oldest Intelligence Organization
General Order 292 established the Office of Intelligence in the Bureau of Navigation
When was ONI established and by who
Established in 1880s by LT Mason
First CIO/DNI
Chief Information Officer/Director of National Intelligence.
John Negroponte on April 21, 2005
Two departments combined to form ONI
Department Library and Office of Intelligence
OPCON and ADCON
Operational Control - commander in charge of the overall operation of forces
Administrative Control - Commander in charge of the individual unit’s administrative needs
FLTCOM
Fleet Commander. Overall responsible for the operations in the Fleet in their AOR
TYCOM
Type Commander. Responsible for the operation of their specific platform, such as surface, air, sub, expeditionary
PACOM
Pacific Command. Camp Smith, HI.
EUCOM
European Command. Stuttgart, Germany
JFCOM
Joint Forces Command. Norfolk and Suffolk, VA
SOUTHCOM
Southern Command. Miami, FL
CENTCOM
Central Command. Tampa, FL
NORTHCOM
Northern Command, Paterson AFB, CO
SOCOM
Special Operations Command. MacDill AFB, FL
TRANSCOM
Transportation Command. Scott AFB, IL
STRATCOM
Strategic Command. Offutt AFB, NE
AFRICOM
Africa Command. Stuttgart, Germany
CYBERCOM
Created in 2009. Naval Network Warfare Command was recognized to fill the role
2nd Fleet
Atlantic Ocean
3rd Fleet
Pacific Ocean, East Pac
4th Fleet
Africa and South America
5th Fleet
Central Command AOR waters
6th Fleet
Med, North Atlantic
7th Fleet
Western Pacific and Indian Oceans
10th Fleet
Cyber Command
TF
Task Force. A temporary grouping of units, under one commander formed for the purpose of carrying out a specific operation or mission.
TG
Task Group. A component of a naval task force organized by the commander of a task force or higher authority
TU
Task Unit. A component of a naval task group organized by the commander of a task group or higher authority
TE
Task Element. A component of a naval task unit organized by the commander of a task unit or higher authority
AG
Aerographer’s Mates. Navy’s meteorological and oceanographic experts
CTI
Linguists.
CTM
Maintenance technicians
CTN
Monitor, identify, collect and analyze information, provide data for digital network products
CTR
Crypto Technicians Collections
Operate state of the art computer systems to conduct information operations, and collect analyze and exploit signals of interest to report worldwide threats
CTT
Electronic Intelligence
Operate electronic sensors and computer systems to collect, analyze, and disseminate Electronic Intelligence
IS
Intelligence Specialists. Analyze intelligence data
IT
Perform core and specialty functions of Communications Operations, message processing, network administration and security
DISA
Defense Information Systems Agency. Engineers and provides command and control capabilities and enterprise infrastructure to assure a global net-centric enterprise
NCDOC
Navy Cyber Defense Operations Command.
Over see entire navy network
NSA
National Security Agency. Provide for the signals intelligence mission of the US
Secretary of the Navy
Ray Mabus #75
Commander in Chief
President Obama #44
Secretary of Defense
Mr. Hagel. #24
CNO
ADM Greenert #30
MCPON
MC Stevens #13
ODCR
Officer Distribution Control Report
Command Master Chief
Total enlisted must be 250 or greater
AMD
Activity Manpower Document
-Total force manpower requirements
Evaluation report
Enlisted E-1 to E-9
Fitness report
All officers
Page 2
Dependant Infor, SGLI, emergency information
Page 4
Qualifications, education, training
Page 13
Administrative remarks
OPREP-3 PINACLE
Used to notify the National Command Authority. Events that could result in local, national, or international public reaction
OPREP-3 NAVY BLUE
Used to provide the CNO and other appropriate commands with information concerning incidents of military, political or press interest which are of high Navy, vice national interest
OPREP-3 NAVY BLUE UNIT SITREP
Used to provide higher authority or other potentially interested senior with notification of an incident not meeting oprep-3 special interests
SGLI
Servicemans Group Life Insurance
Officer accession programs for enlisted personnel
STA-21, LDO/CWO, MECP, OCS, Flying Warrant Officer
Purpose of 3M/PMS System
Maintenance and Material Management/Planned Maintenance System. Provides efficient and uniform methods of conducting and recording preventative and corrective maintenance
DPAS
Defense Property Accounting System. Used to track physical accountability of personal property
DLR Program
Depot Level Repairable. Repairable items for which the condemnation should be made at the depot level
NRFI DLR
Not Ready For Issue Depot Level Repairable
- Turn-in - requires turn-in to a repair facility
- RIP- Remain in Place, repairable components that cannot be removed until receipt of a replacement item
MAM
Maintenance Assistance Module.
-Parts used for isolating faults within an avionics system or test set
NSN
National Stock Number. Has 13 digits
APL
Allowance Parts List.
AEL
Allowance Equipage List.
-Durable items that are not consumed in use and are essential to the ships mission
NC
Not Carried
NIS
Not In Stock
DD Form 200
Survey Form
CHRIMP
Consolidated Hazardous Material Reutilization and Inventory Management Program.
-Serves as a fundamental element of the Navy’s lifecycle control and management of hazardous material
DRMS
Defense Reutilization Marketing Service.
-Provides services in the reuse, transfer, donation, sale or disposal of excess property
ServMart
A self service store operated by an ashore supply activity. It provides a ready supply of relativity low cost items frequently required by customers in the area
OPTAR
Operating Target. The estimate of the amount of money that will be required by an operating unit to perform assigned tasks
Red Cross
Immediate Precedence may be assigned. Also called an AMCROSS.
ADNS
Automated Digital Networking System.
-Primary function is to connect Navy shipboard networks to other ship and shore networks for transfering IP data of various classification levels
CUDIXS
UHF SatCom
- Up to 60 subscribers
- Narrative message traffic
INMARSAT
-Used as a last means
-International Maritime Satellite
-
GINGERBREAD
Intruder on the line
EEFI
Essential Elements of Friendly Information.
-IIdentify specific items of information which if acquired by an adversary would degrade the security of military operations
BEADWINDOW
Real-time procedure which brings to the immediate attention of circuit operators that EEFI disclosure has or may have occurred
River City
- Used to secure all communications off the ship.
- 4 different levels
- Level 1 is the most restrictive and level 4 is the least restrictive
Routine
R
6 hours
Priority
P
3 hours
Immediate
O
30 minutes
Flash
Z
10 minutes
CRITIC
W
3 minutes
OPTASK COMMS
The means by which the Navy and Allied navies distribute afloat communications plans.
-Used to build your com plan
COMSPOT
Submitted by all ships and shore facilities any time communication outages or degradations are encountered
CASREP
Submitted once troubleshooting has exceeded 48 hours
OTAT
Over the Air Transfer.
OTAR
Over The Air Rekey
TEMPEST
Code name given to the investigation, study, and control of compromising emanation from telecommunications and automated information systems
Purpose of EMCON
Emissions Control is the control of all electromagnetic and acoustic radiations, including communications, radar, EW, and sonar
ASW
Anti Submarine Warfare
SUW
Anti Surface Warfare
IW
Information Warfare
AW
Air Warfare
STW
Strike Warfare
NSW
Special Warfare
Blue Team
Defend/Analyze/Training
Red Team
Attack
JDISS
Joint Deployable Intelligence Support System
-Provides a family of hardware and software capabilities that allow connectivity and interoperability with intelligence systems supporting forces
Frequency Spectrum
E V V L M High 3mhz - 30mhz Very high 30mhz - 300mhz Ultra high 300mhz - 3ghz Super high 3ghz - 30ghz Extremly High 30ghz -300ghz
FCC-100
Multiplexer
-Used for SHF, voice, pots
128k channels
Aggregate
Combined signals/frequencies
Frequency
Number of cycles per unit of time, expressed in hertz
Wavelength
Distance in space occupied by one cycle of a radio wave
Ducting
Trapping of an RF wave between two layers of the earth atmosphere or between atmospheric layer and earth
Refraction
Occurs when the wave travels through two different mediums and bends toward or away from the normal
Multiplexing
Simultaneous transmission of a number of intelligible signals in either or both directions using only one RF carrier
-Two methods: Time-Division and Frequency-Division
Modulation/Demodulation
The ability to impress intelligence upon a transmission medium, such as a radio wave
Bandwidth
Frequency range occupied by a modulated carrier wave
Keying
Carrier is shifted between two differing frequencies by opening and closing a key
Radio Waves
Form of radiant energy that can neither be seen nor felt or an electromagnetic wave generated by a transmitter
- Ground wave
- Sky wave
- Space wave
Azimuth Angle
Angular measurement in the horizontal plane in a clockwise direction
Elevation Angle
Angle between the horizontal plane and the line of sight
AM
Amplitude modulation - refers to any method of varying the amplitude of an electromagnetic carrier frequency in accordance with the intelligence to be transmitted by the carrier frequency
FM
Frequency Modulation - the instantaneous frequency of the radio frequency wave is varied in accordance with the modulating signal
Air Search
300 miles in 360 degree circle
Operational Electronic Intelligence
Concerned with operationally relevant information such as location, movement, employment, tactics, and activity of foreign non-communications emitters and the associated weapons systems
Technical Electronic Intelligence
Concerned with the technical aspects of foreign non-communications emitters such as signal characteristics, modes, functions, associations, capabilities, limitations, vulnerabilities, and technology levels.
Half Duplex
One way flow of information at one time, but can go either way, just not at the same time
Full Duplex
Simultaneous communications in both directions
Simplex
Communications in only one direction
NCDOC
Navy Computer Defense Operations Command.
-Coordinate monitor and oversee the defense of Navy computer networks and systems and to be responsible for accomplishing computer network defense missions as assigned by Navy Cyber Forces Command
GNOC
Global Network Operations Center
-Watch center for NETWARCOM. Direct operations and security of the Navy’s portion of the Global Information Grid.
Purpose of FLTNOC
Provide a number of critical IP services to the Fleet.
UARNOC
Hampton Roads, VA
PRNOC
Waiahaiwa, HI
ECRNOC
Naples, Italy
IORNOC
Manama, Bahrain
Purpose of CAS
Collaboration at Sea
-Set of tools that allow replication of information. Allows users to share knowledge and information around the world using minimum bandwidth for sound decision making
JCA
Joint Service Imagery Processing
-Client server based architecture with web like browsing features and capabilities for fleet imagery subscribers that is scalable up to 8mbps
HSGR
High Speed Global Ring
- OC3 or OC12
- Terrestrial connectivity between shore communications stations
EHF FOT
EHF Follow On Terminal
- 512k to T1 speed
- Provides IP Services
LDR
Low Data Rate, No voice
MDR
Medium Data Rate
EHF TIP
EHF TDMA Interface Processor
- Provides ethernet connection between ADNS and MDR terminal
- Includes phone services
CWSP
Commercial Wideband Satellite Program
-Provides world wide full duplex data rates to the fleet using a family of COTS/NDI satcom terminals and services
DSCS
Defense Satellite Communication System
- Military satellite constellation place in geosynchronous orbit to provide high-volume, secure voice and data communications
- Also provides SHF
- Anti-jam
DS-0
64k
T-1
1.544mbps
E-1
2.048 mbps
OC-3
155.52 mbs
Purpose of Iridium
Provide satellite phone services to mobile units down on all other means of connectivity
ANWSC-3 v6
LOS UHF transceiver
- 225 to 400 mhz
- used for voice, data, and teletype
AN/WSC-3 v11
Havequick Transceiver
- 225 to 400 mhz
- Frequency Hopping
- Anti-jamming
AN/USC 61C / DMR
Digital Modular Radio
- Software defined radio
- Frequencies ranging from 2 mhz to 2 ghz
- HF, VHF, UHF, and SATCOM
DAMA
Demand Assigned Multiple Access
-Access scheme in which a SATCOM channel is assigned for multiple access through the DAMA control system in accordance with demand
DAMA operation modes
AC- Automatic Control, allows communications slots within the waveform to by dynamically assigned to terminals requiring access to the slots
DC - Distributed Control, a terminal’s access to a communications slot is pre-assigned
APTS
Afloat Personal Telecommunications Systems
-“Sailor Phones”
KAM/SAM
Maintenance Manuals
- 3 classes, depot, full, and limited
- depot and full are only issued to crypto repair facilities
- limited are available to limited maintenance technicians
KAO
equipment operating instructions and is provided during the initial issue of the equipment
LMM
unclassified manuals replacing limited maintenance KAMs
Contractor Account
Account begins with “87”
- governed by OPNAVISNT 2221.5C
- repair and return transfers have a maximum of 90 days
- all other transfers have a maximum duration of 1 year
Local CRF or maintenance facility transfers
transfers less than 180 days do not require NCMS approval. Use a hand receipt
CRF locations
San Diego, Norfolk, and Japan
Loans to contractors governed by what
OPNAVY 2221.5C
Authorized shipping methods for KOK
DCS, Defense Courier Service
Authorized shipping methods for CCI
DCS FedEx Registered Mail Hand Carry AMC
Mission of A&A teams
conduct periodic training visits, training to all DON account personnel,
Publications that detail inspections and periodic visit requirements
EKMS 1B Art 320-330
EKMS 3C Chapter 2
KP operating guide
EKMS 704C
Primary Function of Key Manager
Manage assigned key, aid short title profiles, maintain their attributes and distribution requirements and coordinate ordering/generation of electronic key
Responsibility of a Controlling Authority
Responsible for directing the creation, distribution, and maintenance of the key from “birth to death”
What is required for reissue of electronic key after kp failure
Manual destruction report must be submitted to NCMS and processed
KP rekey
Annually
KG Rules
USKAD BU71260
Used to produce locally generated key
KP changeover
3 months
Types of incidents
Physical, Cryptographic, Personnel
Non-reportable PDS
- missing signatures
- material not listed on account inventory
- late destruction
- failing to perform kp rekey
Reportable PDS
- Premature use of keying material
- Inadvertent destruction
- Chainging password parameters on LMD
NCMS COMSEC publications
EKMS 1B
EKMS 2
EKMS 3C
EKMS 5
How do you transfer and receive COMSEC from another service
CNO can authorize
-must have justification
MRC
Master Reference Catalog
- Located on Tier 1 and NSA SIPR site
- Lists all equipment and key information by short title
Where are the retention periods for EKMS documentation located
EKMS 1B Annex T
What types of SF-153s require 3 signatures
Destruction, Relief of accountability, possession reports, inventories, and conversions
SF 700
Security Container Information
SF 701
Activity Security Checklist
SF 702
Security Container Check Sheet
SF 703
TS Cover Sheet
SF 704
S cover sheet
COR
Central Office of Records
IT
In Transit
PI
Pending Investigation
IS
In Stock
RL
Relief of accountability
CAD
Common Account Data
- RA controlled fields can be changed by RA’s
- Account managers can change other information
Tier O account
begins with “88”
Type “0”
Semi Annual or IRST
ALC 1
Physical material continuously accountable to the COR by register or serial number
ALC 2
Physical Material continuously accountable to the COR by quantity
ALC 4
Physical material locally accountable by quantity
ALC 6
Electronic material continuously accountable to the COR by register
ALC 7
Electronic material locally accountable by quantity
Transaction Type 1
Destruction Report
Transaction Type 9
Possession Report
Transaction Type 11
Relief from Accountability Report
Transaction Type 13
Transfer Report Initiating
Transaction Type 14
Transfer Report Receipt All
Transaction Type 15
Transfer Report Receipt Exception
Transaction Type 16
Transfer Report Receipt Individual
Transaction Type 17
Inventory Reconciliation Status
Transaction Type 18
Request Inventory
Transaction Type 1-99
Pending Investigation
Host/Client
User workstation
Application Server
Hosts an application for users to use
Hub
Dumb switch
Switch
Forwards information based on MAC address. OSI layer 2
Router
forwards packets between networks
OSI layer 3
WAP
Wireless Application Protocol.
-Mobile devices such as phones and PDA
Proxy Server
Secondary way to get to another location. Acts as an intermediary
Firewall
Helps to eliminate undesired access
Backup
Stores copy of data
-Full, Differential, Incremental, Partial
Repeater
Receives a signal and cleans it and regenerates it to so it can be sent to its destination
Bus Topology
All are connected to a single cable backbone
Star
Central hub
Ring
Circle
Mesh
all nodes are connected to one another
LAN
Local Area Network.
WAN
Wide Area Network
MAN
Metropolitan Area Network
GAN
Global Area Network
OSI Model
Application Presentation Session Transport Network Data Link Physical
TCP/IP Model
"A TIN" Application Transport Internet Network Access
Difference between IPv4 and IPv6
4 has 32 bits and 6 has 128 bits
NIPRNET
Unclassified but sensitive Internet Protocol Router Network
SIPRNET
Secret IP Router Network
JWICS
Joint Worldwide Intelligence Communications System
DoDN
GIG
DISN
Defense Information System Network
NMCI
Navy Marine Corp Intranet
ONENET
Overseas Network
IT21
Shipboard network, such as OneNet or NMCI
-Being replaced by CAINES
Machine Language
Binary
Assembly Language
Scripting
C
High-Level Language
Java
C++
Virus
Malicious code that attaches to files
Worm
Self replicating
Trojan
Looks as if the program works correctly, but has malware attached
Phishing
Criminally fraudulent
Network Enumeration
Lists all equipment and ports and connections
-Whats up Gold
Buffer Overflow
Program writes data beyond the buffer space allocated in memory
SQL Injection
Convinces the application to run SQL code that was not intended
PKI
Is something you have and something you know
DNS
Domain Name System
The name resolution system that translates alphabetic domain names into numeric ip addresses
OPSEC
Operational Security
OPSEC Steps
5 steps
- Identify critical information
- Threat assessment
- Vulnerability analysis
- Risk assessment
- Measures/Countermeasures
WRA
Web Risk Assessment.
Self assessments to determine whether potential critical information is on a commands web site
Critical Information
Information about friendly activities, intentions, capabilities, or limitations an adversary seeks
NMOC
Naval Meteorology and Oceanography Command
GOES
Geostationary Operational Environmental Satellite
-Weather forecasting
POES
Polar Operational Environmental Satellite
-14.1 times around the earth a day
DMSP
Defense Meteorological Satellite Program
TRMM
Tropical Rainfall Measuring Mission
Ambient air
outdoor air in which humans and other organisms live and breathe
Tropical Depression
Winds 33 knots of less
Tropical Storm
winds 34-63 knots
Hurricane/typhoon
winds greater than 63 knots
Ocean Eddies
Independent circulations or rings of cold or warm water
- Cold eddies are counter clockwise
- Warm eddies are clockwise rotation
Small Craft Advisory
Winds of 18-33 knots
Gale
Winds of 34-47 knots
Storm
Winds of 48 knots or greater
Local wind advisory
18-33 knots or gusts 25 knots or greater
Cyclone COR 5
Destructive winds in 96 hours
Cyclone COR 4
Destructive winds in 72 hours
Cyclone COR 3
Destructive winds in 48 hours
Cyclone COR 2
Destructive winds in 24 hours
Cyclone COR 1
Destructive winds in 12 hours
Premise Router
Perimeter router
OSSR
Outer Security Screening Router
ISSR
Inner Security Screening Router
VSCAN
Virus scanner scans inbound and outbound email and attachments for viruses
DNSMail Server
SMTP store and forwarding services
Fleet Router
Router at NCTAMS of NCTS in your AOR
IT21 Tier 1
24/7 help desk watch station
IT21 Tier 2
System Administrators
IT21 Tier 3
Fleet Systems Engineering Team
IT21 Tier 4
SPAWAR
Port 20
FTP
Port 21
FTP
Port 22
SSH
Port 23
Telnet
Port 25
SMTP
Port 53
DNS
Port 80
HTTP
Port 110
POP
Port 443
HTTPS
IEEE
Organization that develops new communication and network standards
-RFC - Request For Comment
Routing
Process of selecting paths in a network along which to send network traffic
CANES
Consolidated Afloat Networks and Enterprise Services
-Replacing IT21
Spillage
Data placed on on information system low than the classification of the data
Procedures for correcting spillage
Contact and report to security manager and IAM
SAAR-N
System Authorization Access Request - Navy
CTR
Contract Technical Representative
-Shelia Mehr
NREMS
Navy Regional Enterprise Messaging System
Strong Password requirements
14 characters, 2 upper, 2 lower, 2 number, and 2 special characters
Certification
Process you have to go through to be accrediated
Accrediation
Good for 3 years
-NCDOC can shutdown if command fails
SSAA
System Security Authorization Agreement
-Agreement between two networks to keep both of their standards at the same level
ATO
Authorization To Operate
-Good for 3 years
IATO
Interim Authorization to Operate
-Good for 6 months
Five attributes of IA
- Confidentiality - keeping secret as secret and TS as TS
- Integrity - Ensuring that nothing was changed, use Encryption
- Availability - Making resures available
- Non-repudiation - Proves sender really sent the email, uses PKI
- Authentication - established validity of an originator, such as a pin
9 categories of computer incidents
- Root level intrusion
- User level intrusion
- Denial of service
- Malicious logic
- Reconaissance
- Non-compliance activity
- explain anomoly
- unsuccessful activety
- Investigating
IAVA
Information Assurance Vulnerability Alert
- Sent out by NCDOC
- Changes must be completed immediately
IAVB
Information Assurance Vulnerability Bulletin
-Medium Risk
CTO
Computer Tasking Order
-Immediate order by regional commander
Vulnerability and threat
Vulnerability is a weakness in the system, while a threat tries to exploit the vulnerability
Responsibilities of an IAM
the 5 attributes of IA on our network
JFTOC
Joint Fleet Telecommunication Operations Center.
-NCTAMS has a 24/7 watch officer
TIP
TDMA Interface Processor
-Time Division Multiple Access
SAR-GAR
Satellite Access Request-Gateway Access Request
GCIB
Global Communications Information Bulletin
-GCIB 7
ASI
Authorized Service Interruption
AESOP
Afloat Electromagnetic Spectrum Operation Program
-Frequency planning for radar and weapon systems as well as the process of generating communication plans
CCS
Command and Control Ship
-CCS is in charge of establishing TIP for all ships in that battle group
5 Steps of Intelligence
- Planning and Direction
- Collection
- Processing
- Production
- Dissemination
Categories of Intelligence
Strategic, Operational, Tactical
HUMINT
Human Intelligence
-gathering information from human sources
OSINT
Open Source Intelligence
-News media
MASINT
Measurement and Signature Intelligence
-Radar signatures
SIGINT
Signals Intelligence
-intercepted signals
COMINT
Communications Intelligence
-messages or voice information
FISINT
Foreign Instrumentation Signals Intelligence
-
ELINT
Electronic Intelligence
-gathering intelligence by electronic sensors
IRINT
Infrared Intelligence
-
ACINT
Acoustic Intelligence
-acousting phenomena
Mission of NCMS
Manages Communications Security Material for the DON. PKI. Training Team
Specific NCMS functions
- Publishes COMSEC policy
- CMIO. Comsec Material Issuing Office
CMIO
Comsec Material Issuing Office
-receives, stores, and ships ekms material
CMCS
Comsec Material Control System
-comsec material is that material used to protect us government transmissions, communications and the processing of classified or sensitive unclassified information