Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
35 Cards in this Set
- Front
- Back
What are the employment of cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace?
|
Cyberspace operations (CO)
|
|
What publication discusses military operations in and through cyberspace; explains the Joint Staff (JS), combatant command (CCMD), United States Strategic Command (USSTRATCOM), United States Cyber Command (USCYBERCOM), functional and Service component relationships and responsibilities; and establishes a framework for the employment of cyberspace forces and capabilities?
|
Joint Pub 3-12
|
|
What, while a global domain within the information environment, is one of five interdependent domains, the others being the physical domains of air, land, maritime, and space?
|
Cyberspace
|
|
What domain provides a key global connectivity option for Cyberspace Operations (CO)?
|
Space
|
|
Cyberspace can be described in terms of how many layers?
|
Three
|
|
What layer of cyberspace is comprised of the geographic component and the physical network components?
|
Phyical network
|
|
What component of the physical network layer is the location in land, air, sea, or space where elements of the network reside?
|
Geographic
|
|
What component of the physical network layer is comprised of the hardware, systems software, and infrastructure (wired, wireless, cabled links, EMS links, satellite, and optical) that supports the network and the physical connectors (wires, cables, radio frequency, routers, switches, servers, and computers)?
|
Physical network
|
|
What is a primary target for signals intelligence (SIGINT), including computer network exploitation (CNE), measurement and signature intelligence, open source intelligence, and human intelligence?
|
Physical network layer
|
|
What is the first point of reference for determining jurisdiction and application of authorities?
|
Physical network layer
|
|
What is also the primary layer for geospatial intelligence, which can also contribute useful targeting data in cyberspace?
|
Physical network layer
|
|
What is the layer of cyberspace that consists of those elements of the network that are related to one another in a way that is abstracted from the physical network, i.e., the form or relationships are not tied to an individual, specific path, or node?
|
Logical network
|
|
In what layer of cyberspace would you classify a network of servers that shares one URL?
|
Logical network
|
|
What layer represents yet a higher level of abstraction of the logical network in cyberspace; it uses the rules that apply in the logical network layer to develop a digital representation of an individual or entity identity in cyberspace; consists of the people actually on the network?
|
Cyber-persona
|
|
What is a globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel?
|
DoD Information Network (DODIN)
|
|
What replaced Global Information Grid (GIG) terminology?
|
Department of Defense Information Network (DODIN)
|
|
What is a composite of the conditions, circumstances, and influences that affect the employment of capabilities and bear on the decisions of the commander?
|
Operational environment (OE)
|
|
What is the aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on information?
|
Information environment
|
|
What environment is broken down into the physical, informational, and cognitive dimensions?
|
Information environment
|
|
What dimension of the information environment is composed of command and control (C2) systems, key decision makers, and supporting infrastructure that enable individuals and organizations to conduct operations?
|
Physical dimension
|
|
What dimension of the information environment do key decision makers fall under, it is the dimension where physical platforms and the communications networks that connect them reside?
|
Physical dimension
|
|
What dimension of the information environment is the place where information is collected, processed, stored, disseminated, and protected; it is the dimension where the C2 of modern military forces is exercised and where the commander’s intent is conveyed?
|
Informational dimension
|
|
What dimension of the information environment encompasses the minds of those who transmit, receive, and respond to or act on information; in this dimension people think, perceive, visualize, understand, and decide?
|
Cognitive dimension
|
|
What are concerned with using cyberspace capabilities to create effects which support operations across the physical domains and cyberspace?
|
Cyberspace operations
|
|
What is concerned with the integrated employment of information-related capabilities during military operations, in concert with other lines of operation (LOOs), to influence, disrupt, corrupt, or usurp the decision making of adversaries and potential adversaries while protecting our own?
|
Information operations
|
|
Cyberspace operations (CO) are enabled by what DoD network?
|
DODIN
|
|
What type of threat is potentially the most dangerous because of access to resources, personnel, and time that may not be available to other actors?
|
Nation State
|
|
What is a device, computer program, or technique, including any combination of software, firmware, or hardware, designed to create an effect in or through cyberspace?
|
Cyberspace capability
|
|
What type of threats are formal and informal organizations that are not bound by national borders; use cyberspace to raise funds, communicate with target audiences and each other, recruit, plan operations, destabilize confidence in governments, and conduct direct terrorist actions within cyberspace?
|
Transnational actor
|
|
What type of threats steal information for their own use or, in turn, to sell to raise capital, or may be used as surrogates by nation states or transnational actors to conduct attacks or espionage through CO
|
Criminal organization threat
|
|
What is the most challenging aspect of Cyberspace Operations (CO)
|
Attribution
|
|
What are created through the integration of cyberspace capabilities with air, land, maritime, and space capabilities?
|
Cyberspace effects
|
|
Who does DoD support in leading interagency efforts to identify and mitigate cyberspace vulnerabilities in the nation’s critical infrastructure?
|
DHS
|
|
To increase protection of Defense Industrial Base (DIB) networks, the DoD launched what?
|
DIB Cybersecurity and Information Assurance Program
|
|
What serves as DOD’s operational focal point for voluntary cyberspace information sharing and incident reporting program?
|
DoD Cyber Crime Center
|