• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/112

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

112 Cards in this Set

  • Front
  • Back
3-M
Maintenance Material & Management

This system provides maintenance and material managers throughout the Navy with a process for planning, acquiring, organizing, directing, controlling and evaluating the manpower and material resources used to support maintenance.
PMS
Planned Maintenance System

A standardized method for planning, scheduling, and accomplishing preventive maintenance by ship’s force.
Explain how DPAS is used to track equipment
Defense Property Accountability System

A fully web enabled system which tracks the lifecycle of an asset from receipt to disposition.
Discuss the purpose of the MOV program.
A request from a supply source to a requisitioner/control office to validate that outstanding requisitions are still required.
Discuss the DLR program.
Depot Level Repair Program.

DLR manages high level items which can not be repaired nor reused.
Remain In Place (RIP)
Although the part may be degraded, it is required to remain in use until the new item arrives
NRFI
Not Ready For Issue
MAM
Maintenance Assist Module

Replaceable assemblies (modules) needed to perform an approved maintenance plan which calls for identifying the fault of failed module through progressive and/or selective module substitution.
Bulkhead mounted spares
Spares that are kept in the work center due to size or cost resulting on the parent department head to be responsible for upkeep on them
CASREP
Used in the event of an equipment malfunction or deficiency which cannot be corrected within 48 hours, reduces unit’s ability to perform a primary mission, secondary mission, or a training commands ability to perform it’s mission.
CASREP categories:
I. Used only at training commands: A casualty exists but does not cause a break in training.

II. A deficiency exists in mission essential equipment which causes a minor degradation in any primary mission.

III. A deficiency exists in mission essential equipment which causes a major degredation but not loss of a primary mission.

IV. A deficiency exists in mission essential equipment that is worse than category 3, and causes a loss of at least one primary mission.
NSN
National Stock Number

A 13 digit number assigned by the Defense Logistic’s Agency to identify an item of material in the supply distribution system.
COG
Cognizance

A two character symbol that designates the stores account in which a type of material is carried and the responsible inventory control point.
APL
Allowance Parts List

It lists all the repair parts installed on the equipment/component to which it applies
AEL
Allowance Equipage List

Contains the onboard allowance of equipage and supplies to support the ship’s mission.
NC
Not Carried

Material for which there is no storeroom allowance
NIS
Not In Stock

Material normally stocked in the storeroom but is temporarily exhausted.
SIM
Selected Item Maintenance

Inventory control system by which maximum attention is given to those items experiencing high rate of usage.
CHRIMP
Consolidated Hazardous Material Reutilization and Inventory Management Program

A successful method to achieve life-cycle control and management of Hazardous Material (HM) and Hazardous Waste (HW).
DRMS
Defense Reutilization and Marketing Service

Department of Defense agency dedicated to the disposition of excess and surplus military equipment and supplies.
ServMART
A warehouse designed store which carries NSN items to be bought with a government purchase card.
OPTAR
Operating Target is an estimate of the amount of money that will be required by an operating unit to perform tasks and functions assigned
Normal Power
Standard power supplied for normal daily usage.
Emergency Power
Secondary power source provided only to vital equipment/systems in the event of a casualty.
Uninterrupted Power
Minimal battery power provided to a electronic equipment in order to properly power down the system.
Identify the directives that govern personnel security
NAVSUP to DoD DIR 5105.21.M-1

SECNAV M-5510.36

ICD 704
Classification categories and the colors codes used to identify each one.
Top Secret - exceptionally grave damage (ORANGE)

Secret - serious damage (RED)

Confidential - expected to cause damage (BLUE)

Unclassified -
information generally available to anyone. (GREEN)
State the type of investigation and how often it is updated for access for the classification levels.
Top Secret: Single Scope Background Investigation (SSBI)- Every 5 years

Secret: National Agency Check with Local Agency and Credit Checks (NACLC) – Every 10 Years

Confidential: National Agency Check with Local Agency and Credit Checks (NACLC) – Every 15 years
SAER
Security Access Eligibility Report

Used to report to DoNCAF any information which might affect an individual’s continued eligibility for access to SCI.
Events that should be reported to the SSO
Foreign citizenship or foreign monetary interests.

Sexual behavior that is criminal or reflects a lack of judgment of discretion.

Unexplained affluence or excessive indebtedness.

Alcohol abuse.

Illegal or improper drug use/involvement.

Apparent mental or emotional disorder(s).

Criminal conduct.
Who has overall authority of and controls access to a SCIF
CO
State when safe combinations should be changed.
When lock is first installed/used

When compromised or believed to be compromised

Whenever deemed necessary
FDO
Foreign Disclosure Office

Anything related to official interaction with foreigners.
State the purpose of DCS
The Defense Courier Service
Establishes, staffs, operates, and maintains an international network of couriers and courier stations for expeditious, cost effective, and secure transmission of qualified classified documents and material.
Transporting via DCS
Double wrapped with prescribed opaque material.

Properly marked classification and address.

The minimum size is an 8” X 11” flat envelope.

Single items will not normally exceed 150 pounds.

All seams will be reinforced with the prescribed
tape-gummed Kraft paper tape.
Transporting classified material via hand carry:
Use a classified material cover sheet, file folder, or other covering to prevent inadvertent disclosure when hand carrying classified information within the command.

Double-wrap the classified information when hand carrying outside the command.
State the responsibilities of the TSCO
Top Secret Control Officer

Maintains a system of accountability to record the receipt, reproduction, transfer, transmission, downgrading, declassification and destruction of command Top Secret information
State the THREATCON recognition and Force Protection Levels
THREATCON/FP Alpha – General readiness.

THREATCON/FP Bravo – Somewhat predictable threat. Increased security measures. Can be maintained for weeks or months.

THREATCON/FP Charlie – Known Terrorist threat made. Can be maintained for short periods.

THREATCON/FP Delta – Specific target known and declared, or terrorist event has occurred. Can only be maintained for a limited time.
RAM
Random Antiterrorism Measures

Consists of the random implementation of higher FPCON measures in consideration of the local terrorist capabilities.
EAP
Emergency Action Plan

A plan for the protection of classified information in case of a natural disaster or civil disturbance.
State the purpose of Emergency Destruction procedures
Prevent un-cleared personnel from access to classified material in case of emergency such as fire, natural disaster, civil disturbance, terrorist activities, or enemy attack.
Who can give the order to initiate Emergency Destruction plan
The highest ranking person on station.
Explain in what order and how, material is destroyed during Emergency Destruction.
Priority One – All cryptographic equipment and documents.

Priority Two – Sensitive intelligence materials and all TOP SECRET collateral.

Priority Three – Less sensitive administrative SCI material and collateral classified material not included above.

Any reasonable means available. Burning, shredding, smashing degaussing, magnets, jettison, etc.
SCI
Sensitive Compartmented Information

Classified information concerning or derived from intelligence sources, methods, or analytical processes and required to handled within formal access control systems
List items prohibited in the Secret Compartmented Information Facility (SCIF).
Personally owned photographic, video, and audio recording equipment.

Personally owned computers and associated media.
Define the difference between a security violation and a practice dangerous to security.
Security Violation is a compromise of classified information to persons not authorized to receive it.
Deliberate or accidental exposure of SCI resulting from loss, theft, or capture
-Must be reported immediately.

Practice Dangerous to Security is a failure to comply with security regulations causing a potential compromise of classified information.
Not required to be reported
Explain vault recertification and recurring inspections.
SCI security officials will conduct self-inspections of their SCIFs at least annually.

Inspections may occur at any, announced or unannounced
Explain the DoD escort policy
Non-SCI indoctrinated personnel entering a SCIF must be continuously escorted by indoctrinated employee who is familiar with the security procedures of that SCIF
Sanitizing Equipment
A two-step process that includes removing data from the media and removing all classified labels, markings, and activity logs.
Sanitizing spaces
is removing all classified material from view (placing in vaults, drawers, etc) so as to not be visible to un-cleared personnel.
ICDs
Intelligence Community Directives

The principle means by which the DNI provides guidance, policy, and direction to the Intelligence Community.
List the duties and responsibilities of the SSO.
Responsible for maintaining the security of SCI material and providing advice to the CO or OIC on the related matters of the SSO program.
Identify who can be a Command Security Manager (CSM).
Must be an officer or civilian employee (GS-11 or higher), a US Citizen, and completed an SSBI.
State the duties and responsibilities of the CSM
-Responsible for administration of the Commands information and personnel security programs.

-Maintains liaison with SSO IRT investigations, SCI access, eligibility evaluation, policy and procedure changes.

-Ensures security threats, compromises, and other violations are reported, recorded, and investigated when necessary.
JPAS
Joint Personnel Adjudication System

The official personnel security clearance database management system for the Department of Defense.
DONCAF
Department of the Navy Central Adjudication Facility

Responsible for determining who within the Department of the Navy is eligible to hold a security clearance
How long a Commanding Officer can administratively suspend access before DONCAF revokes a clearance.
90 Days
State the levels of INFOCON and what each signifies.
INFOCON 5 - a situation where there is no apparent hostile activity against computer networks.

INFOCON 4 - an increased risk of attack.

INFOCON 3 - A risk has been identified.

INFOCON 2 - an attack has taken place but the Computer Network Defense system is not at its highest alertness

INFOCON 1 - attacks are taking place and the Computer Network Defense system is at maximum alertness
Discuss the security rules and procedures for magnetic and electronic media.
All such devices bearing classified information must be conspicuously marked with the highest level of classification stored on the device
Explain why the U.S. Navy only uses “.mil” email addresses on government systems.
DoD has exclusive use of the “mil” domain. Provides for increased security.
Define Information Assurance
Information Operations that protect and defend data and
Information Systems (IS) by ensuring their availability,
integrity, authentication, confidentiality, and non-
repudiation.
Certification & Accreditation
Certification – Comprehensive evaluation of the technical and non-technical security features of an information system and other safeguards, made in support of the accreditation process.

Accreditation – Formal declaration by the DAA that an information system is approved to operate.
DAA
Designated Approving Authority

The official with the authority to formally assume responsibility for operating a system at an acceptable level of risk.
System Security Authorization Agreement
A living document that represents the formal agreement between the Designated Approving Authority, the Certification Authority, the Program Manager, and the user representative
ATO
Authorization To Operate

The official management decision issued by a DAA to authorize operation of an information system and to explicitly accept the residual risk.
Discuss security procedures involved when performing cross-domain transfers.
The media to be used in the process must be new or an approved transfer disk that has been virus checked.

Transfer information onto the media.

Perform scanning of the media for viruses.
Confidentiality
Assurance that information is not disclosed to unauthorized persons, processes, or devices.
Integrity
Assurance that information is not modified by unauthorized parties or in an unauthorized manner
Availability
Assurance of timely, reliable access to data and information systems by authorized users
Non-repudiation
Assurance that the sender of data is provided with proof of delivery and the recipient is provided with proof of the identity
Authentication
Assurance of the identity of a message sender or receiver
List and define 9 categories of computer incidents.
Malicious Logic
Unsuccessful Activity Attempt
Denial of Service
Root Level Intrusion
User Level Intrusion
Non-Compliance Activity
Reconnaissance
Investigating
Explained Anomaly
Describe the DoN World Wide Web Security Policy.
All DON Web sites must have a clearly articulated purpose, approved by the commander, and supporting the command’s/activity’s core competency mission.
IAVA
IA Vulnerability Alerts

An announcement of a high risk computer software, or operating system, vulnerability in the form of an alert.
IAVB
IA Vulnerability Bulletins

An announcement of a medium risk computer software, or operating system, vulnerability in the form of a bulletin.
IAVT
IA Vulnerability Technical
Address new vulnerabilities that are generally categorized as low risk to DON systems.
CTO
Communications Tasking Orders

A DoD-wide instruction that promulgates mandatory changes in standing instructions on how communications are handled.
NTD
Navy Telecommunications Directive

A widely disseminated Naval Message giving an order or direction about a certain IT function that needs to be complied with.
Define vulnerability assessment.
Systematic examination of an information system or product to determine the adequacy of security measures
Explain the difference between vulnerability and threat.
Vulnerability -- the weakness in an information system

Threat -- any circumstance or event with the potential to adversely impact organizational operations
State the duties and responsibilities of the IAM.
Information Assurance Manager

Responsible for the information assurance program within a command
Switches
Multiport devices that improve network efficiency
Router
A device that connects two or more networks and allows packets to be transmitted and received between them
Proxy Server
A type of server that makes a single Internet connection and services requests on behalf of many users.
VPN
Virtual Private Network

A private network connection that occurs through a public network.
OSI Model
Application (HTTP - Telnet)
Presentation (JPEG)
Session (Connection between devices)
Transport (TCP - UDP)
Network (Routers)
Datalink (Switches)
Physical (Cable/Hub)

(All People Seem To Need Data Processing)
TCP/IP Model
Application (File & Print)
Transport (Connection Oriented)
Internet (Connectionless)
Network Access (MAC address)
IPv4 and IPv6
IPv4 uses 32 bits (4.3 billion address)

IPv6 uses 128 bits (2^128 addresses)
NIPRNET
Non-secure Internet Protocol Router

It is used to exchange sensitive but unclassified information between internal users
SIPRNET
Secure Internet Protocol Router Network

Secret level network that supports the DOD community, Law enforcement agencies, Dept of Homeland Security and other Secret level entities.
JWICS
Joint Worldwide Intelligence Communications System

Operated by the Defense Intelligence Agency (DIA) as a secure global network designed to meet the requirements for TS/SCI multimedia intelligence communications worldwide.
DoDN (GIG)
Global Information Grid (GIG) defined as a Globally interconnected end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to the Warfighter, policy makers, and support personnel.
DISN
Defense Information Systems Network

The DOD enterprise network for providing data, video, and voice services
NMCI
Navy/Marine Corps Intranet

a DON program where information Technology services have been outsourced to an outside contractor. Deployed throughout the Navy and Marine Corps.
ONE-NET
Overseas Navy Enterprise Network is a Navy-wide initiative to install a common and secure IT infrastructure to OCONUS Navy locations
IT-21
An information transfer strategy that provides Network Connectivity capable of Voice, Data and Video for afloat units. It provides access to NIPRNET, SIPRNET and JWICS, and supports all tactical and non-tactical mission areas.
Machine Language
The “natural language” of a particular computer, defined by the computer’s hardware design
Assembly Language
Strings of numbers that computers could directly understand, programmers began using English-like abbreviations to represent elementary operations.
High-Level Language
developed in which single statements could be written to accomplish substantial tasks. The translator programs that convert high-level language programs into machine language are called compilers. (C, C++, Python)
Virus
Malicious code written with an intention to damage the user’s computer.

They need the movement of a file to infect other computers
Worm
A malicious software application that is structured to spread through computer networks.

These applications are self-propagating.
Trojan
A program that seems to be useful or harmless but in fact contains hidden code embedded to take advantage of or damage a computer
Backdoor
A gap in the security of a computer system that’s purposely left open to permit access.
Phishing
The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity.
Buffer Overflow
A situation where a program writes data beyond the buffer space allocated in memory. This can result in other valid memory being overwritten.
SQL Injection
SQL injection is an attack in which malicioius code is inserted into strings that are later passed to an instance of SQL Server for parsing and execution
Dictionary Attack
A method of breaking into a password-protected computer by systematically entering every word in the dictionary.
Privilege Escalation
The act of exploiting a bug or design flaw in a software application to gain access to resources which normally would have been protected from an application or user.
Brute Force Attack
A technique used to break an encryption or authentication system by trying all possibilities.
Social Engineering
The practice of tricking a user into giving, or giving access, to sensitive information, thereby bypassing most or all protection.
PKI
Public Key Infrastructure

A two-key encryption system wherein messages are encrypted with a private key and decrypted with a public key
DNS
Domain Name System

Used to map host names with IP addresses.