Unit 3a Flashcards
AF’s primary combined software/server tool for handling task of mass-produced software patches and other updates on base network and respective Network Operations Security Center (NOSC)
Microsoft Systems Center Configuration Manager (SCCM)
AF uses this to track user requests and network related issues
Incident Management Systems
Uses event correlation and smoothing technique to provide network analysis diagnosing failures on routers, hosts, interfaces, and switched networks
System Management Automated Report Tracking System (SMARTS) InCharge
Local Area Network (LAN) management solution (LMS) simplifying administration, configuration, monitoring, and troubleshooting of Cisco-based networks
CiscoWorks
Provides system administrators with central, easy-to-use console to view critical server and application resources across the enterprise
AppManager
LAN Management System providing suite of tools to manage network resources and provide a unified view of fault, performance, availability, traffic, and configuration information
SolarWinds
functional in nature and defined as system software used to perform basic functions in direct support standalone computer or network
Utilities
Used to locate and identify network hosts to confirm connectivity
Ping
Queries domain name service (DNS) data from DNS server
Nslookup
Diagnostic tool for displaying path and measuring transit delays of packets across an IP network
Traceroute
Displays current TCP/IP network configuration
Ipconfig
Primary weapon system for planning, managing and executing air battle, feeding real-time, decision-quality information to users from Joint Forces Air Component Commander (JFACC) and staff at Air Operations Center (AOC) to pilots, navigators, and weapons control officers on battlefield
Theater Battle Management Core System (TBMCS)
Weapon system providing real time command and control capability from AOC down to Wing-level units
TBMCS-Unit Level (TBMCS-UL)
Provides “big picture” elements such as bases, areas of responsibility (AOR), and total mission
TBMCS-Force Level (TBMCS-FL)
Nation’s premier system for command and control of joint and coalition forces as well as identifying resources of our adversaries
Global Command and Control System-Joint (GCCS-J)
Allows commanders to be constantly aware of where their troops and valuable assets are on battlefield (aircraft, vehicles, ships, etc)
Blue Force Tracker
Provides Joint Warfighter with ability to identify, validate, and source force requirements, and requests time phased movement of forces to theater of interest
Joint Operation Planning Execution System (JOPES)
Goal to provide data and data manipulation capability to AF planners and commanders in order to conduct feasibility and capability analysis
Deliberate and Crisis Action Planning Execution Segment (DCAPES)
Supports electronic collaboration and publishing on NIPRNet and SIPRNet
Microsoft SharePoint
Mass communication systems on military bases worldwide
Installation Warning System
Virtual ‘‘conference room’’
Defense Collaboration Services (DCS)
An adverse event threatening some element of computer security, loss of data confidentiality, disruption of data or system integrity, or disruption or denial of availability
Computer Security Incident
Used by I-NOSC & base-level NCCs to counteract computer security threats
Information Protection Tools
Software used to prevent, detect and remove malicious computer viruses
Antivirus Software
Telework policies are in place at Federal and DoD levels mandating organizations facilitate remote workers to maximum extent possible
Remote Access Policies
Remote users connecting to DoD core network to perform any system administration duties
Administrative Access
Remote users who will be using network services or accessing, downloading, or uploading data
End-User Access
Remote users who are viewing content or sending e-mail
Limited (General) Access
Remote customer uses endpoint to connect to network-attached host computer located on home organization’s network
Remote Desktop Control
Remote endpoint connects to network and becomes another node on network
Remote Node
Connections use Virtual Private Network (VPN) to create encrypted ‘‘tunnel’’ into DoD network
Remote Communications Methods
Refers to Internet access telecommunications signaling methods used for high-speed Internet connections
Broadband
Most critical part of remote access solution is creating centralized point of access and authentication close to network edge
Remote Access Architecture