Networking Flashcards
Purpose of CNO
Encompasses CNA, CND, CNE
CNA
Computer network attack
CND
Computer network defense
CNE
Computer network exploitation
Infocon
Defense posture and response system for DOD info systems
Infocon 5
Normal readiness procedures
Infocon 4
Increased military vigilance procedures
Infocon 3
Enhanced readiness procedures
Infocon 2
Greater readiness procedures
Infocon 1
Maximum readiness procedures
NCDOC
Navy cyber defense operations command - cyber security service provider , tracks and mitigates all viruses for the navy
FLTNOC
Provides connectivity afloat
TNOSC
Regional detachment for FLTNOCs , provide same service as FLTNOC
NCTS
Provides connectivity for shore units
5 services provided by FLTNOCs
IP services, email, message traffic, VTC, voice comms
N2N operations
NOC to NOC cutover
Authority for firewall policies
IAM ( information Assurance Manager )
Instruction for computer network incident responses
CJCSM 6510
CAS
Web based application to post mission essential info
Application of NIAPS
Esoms, sked 3.2, CTA, fedlog, FSM
Nipr
Access to unclassified information (world wide web)
Sipr
Secret information (interlink, CAS)
Jwics
Top secret information
Centrix enclaves
Japan - US and Japan
Korea - US and Korea
CMFP - combines maritime forces, pacific
CNFC - coalition naval forces CENTCOM
RadMerc
Classes and declasses information allowing users to transfer data between NIPR, SIPR, and JWICS.
Capabilities of GCCS-M
Comms 1 - controls input and output of all tracks
Comms 2 - backup of comms 1
Intel - intel apps
Websvr- connection to apps
Purpose of ASI
Coordinates downtime / maintenance window
Firewall log
Records info from packets that pass through or drop
Router log
On and off ship information
Server log
List of activities it performs
HTTP
Protocol for communication
HTTPS
Secure communications
File server
Holds and distributes files
Mail server
Email reception and forwarding
DNS server
Translate host names to IP addresses
Web server
Holds and delivers web pages
Print server
Manages directory and all print devices on the network
VLAN
Private network on switch port
RAID
Data redundancy
Ping
Signal to test connectivity
Trace route
Ping showing routers in router
IPCONFIG
List TCP/IP config
Telnet
Access computer remotely
Class A IP
1.x.x.x - 127.x.x.x
Class B Ip
127-191.x.x.x
Class C IP
192-223.x.x.x
Class D IP
224-254.x.x.x
How does RADMERC interface with GCCSM
Sanitizes information
Purpose of MIRC chat
Used on SIPR for ship to ship / ship to shore live chat
Loopback
Reroutes packets back to its source without intentional processing
Default gateway
Network point that acts as an entrance to another network
Private IP address
Cannot be used or accessed on public internet only local networks
APIPA
Automatic private internet protocol addressing - automatic self configuration of IPs
Domain name service
Provides translation from DNS to IP
Active directory
Repository for all windows components
Exchange server
Mail server
Outlook web access
Access to local email while at remote location
Port 20
FTP
Port 21
FTP
Port 22
SSH
Port 23
Telnet
Port 25
SMTP Mail
Port S3
DNS
Port 80
Http
Port 110
Mail post office protocol POP3
Port 443
Secure HTTPS
Application
software program that runs on your computer
Operating system
set of system software programs that regulate the way applications use computer hardware
Virus
malicious code
Worm
self replicates
Trojan
disguised malicious program
Backdoor
surreptitiously introduced into a computer system
Phishing
disguised as trustworthy entity to gain sensitive information
Network Enumeration
scans networks for vulnerabilities
Buffer overflow
program writes more info in the buffer then can fit in memory
SQL injection
accepts user input placed into SQL statement, doesn’t filter out dangerous characters
Dictionary attack
entering every word in the dictionary as a password
Privilege Escalation
gain access to a resource that would be protected
Brute force attack
Trying every possible code / password until correct one is found
JWICS
Joint worldwide intelligence communications system - online network designed for TS/SCI
DoDN (GIG)
all DOD networks comprise of the GIG (global info Grid)
DISN
Defense information systems network
NMCI
Conus based internet contract / service
ONENET
oconus based internet contract / service
Machine language
instructions executed by a computer’s CPU
Assembly Language
low level language for computer programing
Ring
Data goes around ring till info is found
Mesh
interconnects every device on network (expensive)
LAN
local area network
WAN
wide area network
MAN
metropolitan area network
GAN
Global area network (around the world)
OSI layer 7
Application
OSI layer 6
Presentation
OSI layer 5
Session
OSI layer 4
Transport
OSI layer 3
Network
OSI Layer 2
Data Link
OSI layer 1
Physical
TCP/ IP Model
Application, Transport, Internet, Network interface
Integrity
assurance info is not modified by unauthorized parties
Availability
Assurance of timely, reliable access to data
Non-Repudiation
Assurance that the sender’s data has proof of delivery / receiver has proof of sender’s ID
Authentication
assurance of ID of sender / receiver
Computer incidents (9)
Root level intrusion, User level intrusion Unsuccessful activity attempt, Denial of service, Non- Compliance activity, Reconnaissance Malicious logic, Investigating, Explained anomaly
Dod WWW security policy
appropriate use of the web to provide public info to a global audience
IAVA
information assurance vulnerability report -addresses severe network vulnerabilities
IAVB
information assurance vulnerability bulletin - new vulnerabilities that do not pose immediate risk
IAVT
information assurance vulnerability Technical advisories - low risk vulnerabilities
CTO
computer tasking order
NTD
navy telecommunications directive
service pack
periodically released update to software
vulnerability assessment
identify weakness in a network
what does the IAM do
responsible for ensuring all cybersecurity components are completed
Host
system or node
Application server
manages services and applications
Hub layer 1
connects segments of a LAN