Unit 12: Cyber 101 Flashcards

1
Q

5 Cyberspace Characteristics

A
  1. Scope of existence - cyberspace exists across the air, land, maritime, and space domains
  2. Non-continous domain - Protocols, firewalls, encryption, etc. isolate networks from each other
  3. Heterogenous domain - made up of many different types of networks with many different functions
  4. Volatile and Fast - segments continuously change and operations occur very fast
  5. Contains logical and physical maneuver space - logical consist of IP addresses/protocols, physical consist of frequencies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cyberspace superiority

A

The degree of advantage possessed by one force over another that permits the conduct of ops in cyberspace without prohibitive interference by the opposing force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Counter-cyber

A

Integrates offensive and defensive operations to maintain superiority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Offensive Counter Cyber (OCC)

A

Offensive operations to deny , degrade, etc an adversary’s ability to use cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Defensive Counter Cyber (DCC)

A

Defensive measures designed to detect, identify, etc enemy forces attempting to penetrate attack through cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Title 18

A

Law enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Title 50

A

Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Title 10

A

Wartime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cyberspace Control

A

Construct defining measures:

  • Authority to approve offensive actions
  • Conduct proportionate cyber actions
  • Ensure tactical/operational integration and deconfliction
  • Arbitrate conflicting cyber actions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cross-Domain Operations

A

Capabilities to leverage achieve effects in other domains:

  • Disruption of adversary integrated air defense
  • Control of floodgates to disrupt enemy movements
  • Control of power grids to disrupt operations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Supervisory Control and Data Acquisition (SCADA)

A

Employed to control, manage large complex systems such as industrial systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Operational Considerations

A
  1. Ensure friendly freedom of action in cyberspace
  2. Countering the adversary’s malicious use of cyberspace (kinetic/non-kinetic means)
  3. Gaining access to systems that enable cyberspace ops
  4. Achieving effects in support of the Joint Force Commander’s (JFC) objectives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyberspace objectives

A

3 key strategic objectives:

  1. Establishing the domain - NetOps
  2. Controlling the domain - Counter cyber
  3. Using the domain - includes all airmen, military, civilian, and contractor personnel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Joint Publication 3-13

A

Defines Information Operations (IO) as the integrated employment of Electronic Warfare, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

JP 1-02

A

Defines Information Assurance (IA) shields and preserves information and information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Air Force Doctrine Document (AFDD) 2-5

A

Defines Network Warfare Operations (NW Ops) as the integrated planning, etc of military capabilities to achieve the desired effects

17
Q

Defense Information Systems Agency (DISA)

A

Lead agency in developing and implementing the GIG

18
Q

Global Information Grid (GIG)

A

Includes all owned and leased communications and computing systems and services to achieve information superiority

19
Q

GIG Components (7)

A
  1. Warrior - Tactical comm/tip of the spear
  2. Global applications - GCCS, TBMCS
  3. Computing - Enterprise hardware, DECCs
  4. Communications - Mix of DoD and commercial comm
  5. Network Ops - End to end management of networks
  6. Information Management (IM) - Provisions relevant info to the right person at the right time in a usable format for SA and decision making
  7. Foundation - doctrine, policy, compliance, etc
20
Q

National Security Strategies

A

National Security Strategy (NSS) - id’s national security concerns

National Defense Strategy (NDS) - derived from NSS and the baseline document for the NMS

National Military Strategy (NMS) - define strategic guidance for preparing for and conducting ops

21
Q

C2 Relationships

A
  1. Support
  2. Combatant Command (COCOM)
  3. Operational Control (OPCON)
  4. Tactical Control (TACON)
  5. Administrative Control (ADCON)