IT STUDY GUIDE Flashcards
SHF DSCS
SUPER HIGH FREQUENCY DEFENSE SATELLITE COMMUNICATIONS SYSTEM
Primary means of receiving/transmitting email and internet traffic while out at sea. Provides tactical commanders and war fighters with improved C4ISR support as well as enhanced communications interoperability with other U.S. forces operating in a Joint tactical environment.
CBSP
COMMERCIAL BROADBAND SATELLITE PROGRAM
Another means of receiving IP services while out to sea.
GBS
GLOBAL BROADCAST SYSTEM
Primarily a broadcast service that augments and interfaces with other communications systems (i.e. ADNS). GBS leverages commercial satellite broadcast technology to deliver large imagery and data files that would overloads typical tactical network capacity.
ADNS
AUTOMATED DIGITAL NETWORKING SYSTEM
Primary function, to connect navy shipboard networks to other ship and shore networks for transferring internet protocol (IP) data of various classification levels. Reagan receives radio frequency services fro SHF DSCS, EHF, CBSP and GBS.
CUDIXS
COMMON USER DIGITAL INFORMATION EXCHANGE SUBSYSTEM
Only means of sending TOP SECRET messages
FSM
FLEET SIPRNET MESSAGING
Point to point connection between the ship and the NOC and is the primary means of receiving message traffic on board the RRN
DAMA
DEMAND ASSIGNED MULTIPLE ACCESS
UHF multiplexing systems, increased bandwidth and availability. Reagan outfitted with two Digital Modular Radio’s each providing 32 separate UHF SATCOM circuits.
OSRI
ORIGINATING STATION ROUTING INDICATOR
RHOVJQI
ELF
EXTREMELY LOW FREQUENCY
<3 KHz
VLF
VERY LOW FREQUENCY
3-30 Hz
LF
LOW FREQUENCY
30-300 KHz
MF
MEDIUM FREQUENCY
300 KHz- 3MHz
HF
HIGH FREQUENCY
3-30 MHz
VHF
VERY HIGH FREQUENCY
30-300 MHz
UHF
ULTRA HIGH FREQUENCY
300 MHz- 3 GHz
SHF
SUPER HIGH FREQUENCY
3-30 GHz
EHF
EXTREMELY HIGH FREQUENCY
30- 300 GHz
COMMUNICATIONS WATCH OFFICER
Operationally responsible for all incoming and outgoing traffic and day to day operation of the communications center.
BEAD WINDOW
Real time procedure which brings to the immediate attention of circuit operators the fact that an Essential Elements of Friendly Information (EEFI) disclosure has occurred.
OPTASK COMMS
Message is means used by which the united states navy and allied navies distribute afloat communications plans.
TEMPEST
Code name given to the investigation, study, and control of comprising emanations from telecommunication and automated information processing systems.
TPI
TWO PERSON INTEGRITY
Applied to COMSEC material: TOP SECRET keying material marked or designate CRYPTO; fill devices or other physical media storing unencrypted TOP SECRET key.
NCTAMS
NAVAL COMPUTER AN TELECOMMUNICATIONS AREA MASTER STATION
Operate and maintain responsive information transfer systems that provide real time C4I information support to the fleet.
NCTAMS MASTER STATIONS x2
NCTAMS LANT: NORFOLK, VA
NCTAMS PAC: WAHIAWA, HI
FLTNOC
FLEET NETWORK OPERATIONS CENTERS
IT-21 provide number of critical internet Protocol(IP) services to the fleet (both deployed and pier side) and act as regional gateways to the defense information systems network (DISN) IP networks in each of their respective AOR
4x DESIGNATED FLTNOC SITES
ECRNOC: European Central Region Network Operations Center NCTS Naples Italy
IORNOC: Indian Ocean Region Network Operations Center NCTS Bahrain
PRNOC: Pacific Region Network Operations Center NCTAMS PAC
UARNOC: Unified Atlantic Region NCTAMS LANT
GCCS-M
GLOBAL COMMAND AND CONTROL SYSTEM-MARITIME
Provides maritime commanders at all echelons with a single, integrated, and scalable command and control system. GCCS-M fuses, correlates, filter, maintains, and displays location and attribute information on friendly, hostile, and neutral land, sea, and air forces.
DCGS-N
DISTRIBUTED COMMON GROUND SYSTEM-NAVY
Provides navy’s primary intelligence, surveillance, reconnaissance, and targeting (ISR&T) support capability.
CENTRIXS
COMBINED ENTERPRISE REGIONAL INFORMATION EXCHANGE SYSTEM
Global data network enterprise for U.S. and partner forces to share classified operational and intelligence information, region to region, for combined planning, unity of effort, and decision superiority in peacekeeping and contingency operations.
CENTRIXS ENCLAVES x 4
CNFC: COMBINED NAVAL FORCES CENTCOM
CMFP: COOPERATIVE MARITIME FORCES PACIFIC
CENTRIX-K: KOREA
CENTIRX-J: JAPAN
NIAPS
NAVY INFORMATION APPLICATION PRODUCT SUITE
Delivers maintenance, logistics, administrative, training and management application to users at sea.
Designed to maximize the use of limited bandwidth by providing afloat units with access to applications while disconnected from the internet.
NIAPS APPLICATION
NKO AFLOAT
DISTANCE SUPPORT
FEDLOG
NTCSS
NAVAL TACTICAL COMMAND SUPPORT SYSTEM
Provides full range of standardized mission support ADP hardware and software to support management of logistics information, personnel, material management, equipment maintenance, and finances required to maintain and operate ships, subs, and aircraft.
NTCSS APPLICATIONS
RSUPPLY
OMMS-NG
R-ADM
NALCOMIS
NAVAL AVIATION LOGISTICS COMMAND MANAGEMENT INFORMATION SYSTEM
automated Information system that provides aviation maintenance and material management with timely, accurate, and complete information on which to base daily decisions.
ROUTERS
Physical devices that join multiple networks together.
3 layer gateway device: meaning that it connects 2 or more networks.
Routers operate at the network layer of the OSI model
NETWORK SWITCH
Hardware device that joins multiple computers together within one local area network (LAN)
Operates at level 2 of the OSI model(data link layer)
2 TYPES OF SWITCHES ON BOARD
back bone switch
edge switch
BACKBONE SWITCH
Connects multiple edge switches together and are the backbone of the network, all traffic travels through these switches.
EDGE SWITCHES
Connect computers together and connect to backbone switch to provide access to the network.
VLAN
VIRTUAL LOCAL AREA NETWORK
Logical group of workstations, servers and network devices that appear to be on the same LAN despite their geographical distribution.
COMMON UDP/TCP PORTS
20/21 23 25 80 443
PORTS
20/21
File transfer Protocol (FTP)
20(DATA)
21(CONTROL)
PORTS
23
TELNET
PORTS
25
Simple Mail Transfer Protocol
PORTS
80
World wide web or HTTP
PORTS
443
HTTPS
IPv4
address space is 32bit field, can support up to 4.3 billion IP addresses.
address consists of 4x 8bit byes (32bits)
IPv6
128bit Addresses.
ACTIVE DIRECTORY
used to create, manage, and edit objects on the network (I.e. user/computer accounts)
confirms identity of any user trying to log on to a domain and lets users access resources (data,, applications) anywhere on the ship
WUGs
WEB USER GROUPS
enabled when the ship is using a satellite link for off ship connectivity.
TMG
THREAT MANAGEMENT GATEWAY
network security and protection solution. Acts as an internet gateway and is a proxy between our network and the internet.
Firewall which can inspect network traffic and filter out malware, attempts to exploit security vulnerabilities and content that does no match a predefined security policy.
DOMAIN CONTROLLERS
onboard run active directory, dynamic host configuration protocol and domain name system .
2x domain controllers per each network (nipr, sipr, centrixs, and sic) DC1/DC2
DHCP
DYNAMIC HOST CONFIGURATION PROTOCOL
Provides IP addresses to client computers.
Allows a computer to join a network without having a pre configured IP address.
DNS
DOMAIN NAME SYSTEM
A system for converting computer hostnames an domain names into IP addresses on the internet or on local networks.
INFORMATION ASSURANCE NECS
2790/2791
INFORMATION SYSTEMS ADMINISTRATOR
BASIC IT NEC
2779-NEC
INFORMATION SYSTEMS SECURITY MANAGER
2780-NEC
NETWORK SECURITY VULNERABILITY-TECHNICIAN
2781-NEC
ADVANCED NETWORK ANALYST
FIREWALL
designed to block unauthorized IP access while permitting authorized communications.
Primary method for keeping a computer secure fro intruders.
DICTIONARY ATTACK
Technique used for defeating a cipher or authentication mechanisms by trying to determine its decryption key or passphrase using a dictionary
BRUTE FORCE ATTACK
Systematic, exhaustive testing of all possible methods that can be used to break a security system.