Army's portion of DODIN
what is DODIN-A?
Organization, mission/business process, and information system
What are the 3 tiers of the cybersecurity program multi-tiered organization-wide risk management?
physical incident, cryptographic incident, and personnel incident
what are 3 categories of reportable COMSEC incidents?
Happens at the speed of light
How fast do radio waves travel?
Limiting factor for a direct wave
what is line of sight?
Publication that has overall policies and procedures for army warranty program
What is AR 700-139?
categorize system, select security controls, implement security controls, assess security controls, authorize system, monitor security controls
What are the 6 steps of the Risk Management Framework (RMF)?
What are the 4 types of incident reports?
Two principal paths of radio waves
What are ground waves and sky waves? Direct requires LOS
1.6-29.9999 MHz, 30-300 MHz, and 300-3000 MHz
what is high frequency, very high frequency, and ultra high frequency
Program in AR 750-1 endorsed and fully funded effort to inspect and evaluate select C5ISR systems for depot repair or overhaul
what is C5ISR life-cycle analysis team (CLAT)?
Responsible for ensuring that all wireless local area network (WLAN) and portable electronic device (PED) technologies adhere, at minimum, to the requirements outlined in AR 25-2 and DA PAM 25.2.9
What is an authorizing official (AO)
symmetric and asymmetric. TEKs, KEK, and transport key encryption key.
What are the two types of keys and what are the 3 functions? (traffic encryption key and key processor key)
The combination of one complete positive and negative alternation of an alternating wave
what is a cycle?
468/frequency=length in ft
what is doublet antenna formula?
Data support, telephone support, CNR, COMSEC, Cyber security, inter-network connectivity, restoration of services, and information management
What are the 8 areas of responsibility in the S6 staff section?
Denies interception and exploitation of classified, and in some instances unclassified, information by containing compromising emanations within the facility where information is being processed
What is TEMPEST?
unit specific instructions, routine destruction instructions, controlled cryptographic item management instructions, deployment instructions, emergency plan instructions, continuity of operations plan, and imformation technology contingency plan
what should the unit COMSEC SOP include?
Solar winds, sunspots, solar flares, coronal mass ejections
What atmospheric conditions can affect communications?
Three different radiation patterns of antennas
what is omnidirectional, bidirectional and unidirectional?
The configuration standards for DOD IA and IA-enabled devices/systems, contain technical guidance to ""lock down" information systems/software that might otherwise be vulnerable to a malicious computer attack
What are STIGs?
an occurrence that results in actual or potential jeopardy to the confidentiality, integrity, or availability of an information system or the information the system processes, stores or transmits; or constitutes a violation or imminent threat of violation of security policies, security procedures or acceptable use policies
What is an IT incident?
Loss of accountability, improper destruction, possible tampering, failure to preform key processor changeover, found on installation, unsecured or unauthorized access, improper storage of COMSEC material or equipment, unauthorized use of key material, loss of COMSEC material, or loss of two-person integrity
What do reportable COMSEC incidents include?
layers of the ionosphere that disappear at night
what are D, E and F1 and F2 combine?
Frequency band primarily used by FM radios, frequency band ideal for long distance comms BLOS, and frequency band ideal for short distance comms LOS
What is VHF, HF, and VHF?