• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
Computer Network Attack (CNA)
Actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves. Also called CNA. See also computer network defense; computer network exploitation; computer network operations. (JP 3-13)
Computer Network Defense (CND)
Actions taken to protect, monitor, analyze, detect, and respond to unauthorized activity within the Department of Defense information systems and computer networks. Also called CND. See also computer network attack; computer network exploitation; computer network operations. (JP 6-0)
Computer Network Exploitation(CNE)
Enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or networks. Also called CNE. See also computer network attack; computer network defense; computer network operations. (JP 6-0)
Computer Network Operations (CNO)
Comprised of computer network attack, computer network defense, and related computer network exploitation enabling operations. Also called CNO. See also computer network attack; computer network defense; computer network exploitation. (JP 3-13)
Cyber-Electronics (C-E) in Full Spectrum Operations
is a comprehensive operational concept that includes the integrated use of Cyberspace Operations (CNO & NETOPS), Electronic Warfare (EW), Electromagnetic Spectrum Operations (EMSO), and Space Superiority (SS) capabilities and actions in order to achieve effects in and through cyberspace and across the broader EMS.
Cyberspace
A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. (CJCS CM-0363-08)
Cyberspace Operations
The employment of cyber capabilities where the primary purpose is to achieve military objectives or effects in or through cyberspace. Such operations include computer network operations and activities to operate and defend the Global Information Grid. (CJCS CM-0527-08)
Electromagnetic Spectrum Operations (EMSO)
incorporates spectrum management, frequency assignments, policy implementation, and host nation coordination that enables the efficient use of the electromagnetic spectrum battlespace for combat operations.
Information Operations
The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and operations security, in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own. Also called IO. See also computer network operations; electronic warfare; military deception; operations security; psychological operations. (JP 3-13)
NETOPS
The modern communications system allows the interconnection (networking) of geographically separated forces, which permits network enabled operations. Network enabled operations are military operations that exploit state-of-the-art information and networking technology to integrate widely dispersed human decision makers, situational and targeting sensors, and forces and weapons into a highly adaptive, comprehensive system. Network enabled operations exploits the combat power derived from the robust networking of well informed, geographically dispersed forces. A networked force can increase combat power, achieving greater speed of command decisions and increasing the lethality, survivability, and responsiveness of the force. The JFC is responsible for ensuring radio frequency (RF) deconfliction occurs via the EWCC and frequency management offices in order to minimize EMI.
NETWAR
The employment of Computer Network Operations (CNO) with the intent of denying adversaries the effective use of their computers, information systems, and networks, while ensuring the effective use of our own computers, information systems, and networks.
Space Superiority
The degree of dominance in space of one force over another that permits the conduct of operations by the former and its related land, sea, air, space, and special operations forces at a given time and place without prohibitive interference by the opposing force. See also space. (JP 3-14)
Network Transport
The Space Control definition is definitely related to the Space Superiority definition. I think it would be good for Space Control to specify this relationship. Upon reading, it appears that space control represents the actions taken to attain Space Superiority. It might also be better defined as Space Control Operations or Space Superiority Operations.
Knowledge Management (KM)
The art of creating, organizing, applying, and transferring knowledge to facilitate situational understanding and decision making. Knowledge management supports improving organizational learning, innovation, and performance. Knowledge management processes ensure that knowledge products and services are relevant, accurate, timely, and useable to commanders and decision makers. (FM 3-0)
Global Information Grid
The globally interconnected, end-to-end set of information capabilities, associated processes and personnel for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel. The Global Information Grid includes owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services and National Security Systems.