Test 4 Flashcards
Discuss the relationship between wavelength and frequency.
- Wavelength and frequency are inversely related (f=c/lambda)
- What are the types of modulation and define them.
- Amplitude Modulation (AM) – carrier signal changes in amplitude
- Frequency Modulation (FM) – carrier signal changes in frequency
- Phase Modulation (PM) – carrier signal changes in phase
Compare multiplexing vs. multiaccess.
- Multiplexing - the process of combining two or more signals in the form of a single complex signal over a shared channel (# of signals)
- Multiaccess – the usage of a common communications resource by different users distributed at different locations (# of users)
What are the three fundamental requirements necessary to jam?
- Frequency
- Power
- Access
- Describe the impacts of each user with uplink and downlink SATCOM jamming.
- Downlink
- Affects the local area only (LOS)
- At the terrestrial receiver
- Uplink
- Large area effects (BLOS)
- All users in the downlink footprint
- At the satellite
State the advantages of tactical data links.
- Rapid dissemination of tactical information
- Creates the ability to share SA which leads to synergy
- Access to multisensor, multiplatform air and ground picture
- Visual depiction of threats/friendlies while enroute/on tank/marshal
- 360 degree SA in the battle
List the six characteristics of TDLs.
- Message standards
- Media
- Protocol
- Security
- Electronic protection
- Functionality
ID the hardware components/terminals of TDLs.
- JTIDS or MIDS terminals are required for LINK16
Describe the hardware requirement for TDL interoperability
- Gateway
Illustrate NIPRNet Architecture.
- Public internet
- DoD gateway
- Air Force gateway
- Air Force base boundary
- NIPRNet host level
What are the three parameters required to enter an established LINK16 network.
- Initial data load (IDL)
- Crypto
- Time sync
Illustrate SIPRNet Architecture.
- DoD SIPRNet
- Air Force gateway
- Air Force base boundary
- SIPRNet host level
Describe air gap considerations.
- Improperly moving data across and air gap creates a ‘virtual cable’
- Close CD burning sessions, write protect floppy disks
- Air gapped networks/computers are not visible to enterprise cyberspace defenders
- Air gap network/computer operators are responsible for their security procedures
- Must use secure websites to retrieve planning data
- Use HTTPS, PKI, password protect and when possible use SIPRNet
- Identify ‘mission only’ NIPRNet computers and restrict use to mission related work only
- What computer is used to write mission data onto CD; the same computer used to check Facebook?
List common adversary threat activities.
- Scanning and reconnaissance
- Spear phishing
- Web redirects and malicious web pages
- Malware (why we can’t use thumbdrives)
- Automated operations
- Interactive operators
- Hardware and firmware attacks
- Insider
List the four actions in cyberspace per JP 3-12.
- Cyberspace ISR
- Cyberspace operational preparation of the environment (OPE)
- Cyberspace attack
- Cyberspace defense
Match the AF cyberspace weapon systems to the corresponding mission area.
- C2 for DODIN Ops, DCO, and OCO
- Cyberspace command and control mission system (C3MS)
- DODIN Ops
- Cyberspace security and control system (CSCS)
- Air Force Intranet control (AFINC)
- DCO
- Cyberspace vulnerability assessment/Hunter (CVA/Hunter)
- Cyberspace defense analysis (CDA)
- Air Force cyberspace defense (ACD)
- OCO
- Network attack system (NAS)
What must be accomplished to close the link (link budgeting)?
Total gains must overcome total losses so that the signal to noise ratio is sufficient
Characteristics of a TDL (Listed and Described)
- Message Standards
i. Consists of rules, procedures, standard formats, data element defs - Media
i. Must account for entire data path - Protocols
i. Simplex
ii. Half Duplex
iii. Full Duples - Security
i. Encryption (Link 11 does not encrypt full message) - Electronic protection
i. EDAC – Does not require full data, can fill in the blanks - Functionally
i. Relay vs Data Forwarders
1. Relay – Retransmission / repromulgation on the same link network
2. Forwarding – Translation and promulgation from one link to a different link network or interface