ACE & IT Fundamentals

0.0(0)
studied byStudied by 20 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/84

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

85 Terms

1
New cards

What is Agile Combat Employment?

A proactive and reactive operational scheme of maneuver executed within threat timelines to increase survivability while generating combat power.

2
New cards

Key Elements of ACE

  1. Expeditionary and Multi-capable Airmen

  2. Tailored Force Packages

  3. Resilient Distributed Logistics

  4. Assured and Interoperable C2

3
New cards

Expeditionary and Multi-Capable Airmen

Airmen accomplishing tasks outside their core AFSC. Personnel are trained as a cross-functional team to meet and provide combat support to aviation force elements.

4
New cards

Tailored Force Packages

Tailoring deployment lines for emerging missions. Forces packages need to be flexible in regard to what, who, and how forces are deployed.

5
New cards

Resilient/Distributed Logistics

Pull and push system that maximizes distributed mission effectiveness.

6
New cards

Assured and Interoperable C2

Centralized command, distributed control, and decentralized execution. Translating C2 into action at the speed of and scale of relevance.

7
New cards

Agile Combat Functions

  1. Posture and Preparation

  2. Movement and Maneuver

  3. Sustainment

  4. Protection

  5. Information

  6. C2

  7. Fires

  8. Intel

8
New cards

Posture and Preparation

Plans, Agreements, and prepositioned equipment that array sustainable forces with effective reach

9
New cards

Movement and maneuver

Direct and execute proactive and reactive dispersal within CCMD timelines of acceptable risk.

10
New cards

Sustainment

Generate, project, and sustain combat power for required mission profiles from dispersed operating locations

11
New cards

Protection

Organic/relocatable airbase defense at forward locations with joint/coalition integration

12
New cards

Information

Integrate and synchronize the full range of information capabilities into ACE CONEMPs

13
New cards

C2

Assured C2 of dispersed forces despite kinetic and non-kinetic attacks

14
New cards

Fires

Synchronize and mass all-domain fires with dispersed locations

15
New cards

Intelligence

Sense, assess, and communicate threats to dispersed locations for defense of joint/coalition forces and to support mission generation.

16
New cards

The Air Force’s Dependence on the Cyber Domain

Most Air Force weapons and support systems were designed to operate within a cyberspace environment and that environment is a domain contested by a maneuvering adversary.

17
New cards

Operating System (OS)

Most important software that runs on a computer.

Manages memory, process, and the hardware that supports it.

18
New cards

Graphic User Interface (GUI)

Provides a point and click interface where you’re using a mouse and/or a touch screen to interact with a computer.

(example: Microsoft Windows)

19
New cards

Command Line Interface (CLI)

Depends on commands and code being entered into a shell that interacts with the computer

(Example: Linux)

20
New cards

Microsoft Windows

  • Most popular Operating System for desktops

  • Uses a GUI

  • Registry uses New Technology File System (NTFS)

    • Registry uses keys and values (HKEY)

21
New cards

Dynamic Link Library (DLL)

A collection of small programs that larger programs can load when needed to complete specific tasks. This file contains instructions that help the larger program handle what may not be a core function of the original program

22
New cards

Types of DLL files

Static Link

Dynamic Link

23
New cards

MAC OS

Second most used OS

Based off of Unix

More secure than Windows

24
New cards

Linux/Unix

Derived from Unix

Uses a Command-Line Interface instead of a GUI

Free and open source

More popular as the OS for embedded systems

25
New cards

Physical Address

Address unique to the network interface card in the computer. Is hardwired into the physical computer by the manufacturer.

(Example: A Media Access Control or MAC Address

26
New cards

Logical address

Address assigned by the computer or network device itself enabling it to communicate with other computer/network devices.

Example - IP Address

27
New cards

Private vs Public IP

  • One address is internal to the local area network (LAN)

    • The other address is unique to a specific network and reachable on the internet. Can be used to identify and document malicious activity.

28
New cards

Router

Sits at the edge of a local area network, and connects them to the internet. Smart enough to direct your information to other (this thing) on the internet efficiently)

Some are capable of deep packet inspection

29
New cards

Deep Packet Inspection

Type of data processing that insects in detail the data being sent over a network, and usually takes action by blocking, re-routing, or logging it accordingly.

30
New cards

Switch

Connects multiple devices on the same network. Like computers, printers, and servers.

31
New cards

Firewall

A network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.

32
New cards

Proxy server

A _________’s primary responsibility is to act as an intermediary for the client making a request outside of their organization

33
New cards

Content Filtering

Administrative control of user internet activity

34
New cards

Whitelist

Allows specific websites and denies all others

35
New cards

Blacklist

Allows all websites and denies specific websites

36
New cards

Caching Proxy

Implemented for improved network performance and the reduction of bandwidth usage.

37
New cards

Anonymizing Proxy

Obfuscates activity of the user making it difficult to track nefarious behavior. Many are open to the public and free to use.

38
New cards

Tunneling Proxy

Utilized to bypass content filtering proxy servers or other security appliances

39
New cards

Hostile proxy

Open to the public and used to eavesdrop on any user utilizing the proxy server

40
New cards

Cloud Systems (or Cloud Computing)

Services and applications that use remote servers to store and manage data, and deliver content and services over the internet.

41
New cards

Key Aspects of Cloud Architecture

  • Virtualization

    • Physical hardware is divided in multiple virtual machines

  • Resource Pooling

    • The ability to dynamically allocate computing resources across multiple users based on demand

  • Scalability

    • The capacity to easily scale up or down computing resources as needed without significant infrastructure changes

  • Elasticity

    • The ability to rapidly provision and release resources based on real-time requirements

42
New cards

Types of clouds

Public, Private, and Hybrid

43
New cards

Important Considerations for Cloud Computing

Data Ownership - A provider manages the infrastructure. The data stored on the ____ usually belongs to the consumer.

Compliance and Security - Providers are responsible for maintaining the security of their _____ infrastructure. But the consumer is still responsible for securing their data and applications

44
New cards

Packet

A basic unit of information that is transferred across a network

45
New cards

Port 22

Secure Shell (SSH)

  • Primary method used to remotely manage network devices

46
New cards

Port 80

Hypertext Transfer Protocol (HTTP)

  • Used by web browsers (so you can visit websites)

47
New cards

Port 443

HTTP over SSL/TLS (HTTPS)

  • Used in conjunction with HTTP to provide the same service, but doing it using a secure encryption with either SSL or TLS

48
New cards

Packet Capture (PCAP)

A networking practice involving the interception of data packets traveling over a network

49
New cards

Access Control List (ACL)

A list of rules that control access to a system’s resources, such as a computer or network

50
New cards

Industrial Control System/Supervisory Control and Data Acquisition (ICS/SCADA)

Highly distributed systems used to control geographically disperse assets often scattered over thousands of square miles, where centralized data acquisition and control are critical to system operation.

  • Computers that control critical infrastructure

    • Water distribution and wastewater collection systems

    • Power grids

    • Railway transportation systems

    • HVAC

    • Traffic control

51
New cards

Why are ICS/SCADA systems so vulnerable?

  • Risk of the component being so unique that an update/patch may disrupt its operational behavior

  • Component is too costly to fix or replace

  • Component is too difficult to physically access

52
New cards

Human Machine Interface (HMI)

A software and hardware that allows human operators to monitor the state of a process under control, modify control settings to change the control objective, and manually override automatic control operations in the event of an emergency.

53
New cards

Data Historian

Centralized database for logging all process information within an ICS.

54
New cards

Engineering Workstation

A high-end, very reliable computing platform designed for configuration maintenance and diagnostics of the control system applications and other control system equipment.

55
New cards

Control server

Hosts the Distributed Control System (DCS) or PLC supervisory control software that communicates with lower-level control devices. Accesses subordinate control modules over an ICS network.

56
New cards

Master Terminal Unit

The device that acts as the master in a SCADA system.

57
New cards

Programmable Logic Controller (PLC)

A small industrial computer originally designed to perform the logic and functions executed by electrical hardware (relayed, switches, and mechanical timer/counters).

58
New cards

Intelligence Electronic Device (IED)

A “Smart” sensor/actuator containing the intelligence required to acquire data, communicate to other devices and perform local processing and control.

59
New cards

Remote Terminal Unit (RTU)

A special purpose data acquisition and control unit designed to support SCADA remote stations.

60
New cards

Encryption

The conversion of plaintext to cipher text. A method of obscuring and obfuscating data so that only authorized individuals or systems can interpret it.

61
New cards

Symmetric Encryption

A method of encryption in which both the sender and receiver use the same encryption key.

62
New cards

Asymmetric Encryption

Uses two different but mathematically related keys for encryption and decryption.

The two keys are the public key and the private key.

63
New cards

Brute Force

Trying every possible combination of keys to break an encryption

64
New cards

Cryptanalysis

Method of attacking the characteristics of an encryption algorithm.

65
New cards

Quantum computers

Biggest threat to asymmetric encryption

66
New cards

Hashing

A mathematical process that turns data into a unique, unreadable string of characters to protect sensitive information.

67
New cards

Purpose of hashing

  • Data Integrity - Data cannot be tampered with or accessed

  • Password security

  • Digital signatures

  • File management

    • Detecting threats

68
New cards

Vulnerabilities

Unintended flaws found in software programs or operating systems.

  • Can be the result of improper computer or security configurations and programming errors.

  • If left unaddressed: Can create security holes that adversaries can exploit

69
New cards

Zero Day (0-Day)

A vulnerability or exploit in a software that the manufacturer is unaware of. Requires the creation of a security patch to mitigate.

  • There are an infinite number

  • Require significant costs, time, and expertise to develop

    • Advanced adversaries make their own versions

70
New cards

Vulnerability Scanner

Assesses computers, computer systems, networks, or applications for known weaknesses.

71
New cards

Credentialed scan

When valid credentials are given to the scanner in order to have administrative rights on the targets. Allows for a complete scan of the entire system.

72
New cards

Non-credentialed scan

A scan performed without any credentials given and allows an assessment to be performed from the perspective of a cyber attacker.

73
New cards

Demilitarized Zone (DMZ)

A physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted, usually larger, network such as the Internet.

74
New cards

Network Segmentation

A network security technique that divides a network into smaller, distinct sub-networks that enable network teams to compartmentalize the sub-networks and deliver unique security controls and services to each sub-network.

  • Minimizes the impact of cyber intruder by slowing their ability to affect larger parts of a network

75
New cards

Intrusion Detection System (IDS) vs Intrusion Prevention System (IPS)

  • One is a passive device that ALERTS an analyst that something noteworthy has happened on the network.

    • Alerts an analyst

  • The other is an active solution that automatically responds to activity deemed nefarious.

    • Blocks cyber adversary from taking action and then alerts analyst.

76
New cards

Signatured-based IDS/IPS

Tools that identify threats based their known attack methods (aka signatures). Then the tool either notifies a user, or blocks access to the threat actor.

  • Helpful but flawed due to its focus on pre-defined signatures (similar to anti-virus signatures needing updates)

77
New cards

Anomaly (or behavioral) Based IDS

Tool that alerts cyber analysts whenever something outside of normal behavior is detected regardless of whether or not signatures for the behavior exist.

  • Powerful but can generate false positives

78
New cards

Security Information and Event Management (SIEM)

A data aggregation, search, and report system that pulls all of the different kind of logs together and allows the incident responders to visualize and access all the data in a readable format in one location.

79
New cards

SIEM Log Sources

  • Perimeter device logs

  • Windows event logs

  • Endpoint logs

  • Application logs

  • Proxy logs

  • Internet of Things (IoT) logs

  • Firewall Logs

  • Key Server Logs

  • IDS and Antivirus Logs

  • Web Server Logs

80
New cards

Secure Enclave

A computing environment under the control of a single authority with personnel and physical security measures.

81
New cards

Methods of wireless communication

Wi-Fi, Cellular, Bluetooth, Microwave, Infrared, Satellite

82
New cards

Radio Frequency (RF) Signal

A wireless electromagnetic signal used as a form of communication.

83
New cards

Wi-Fi

Used for wireless internet connectivity. Uses 2.4GHZ, 5 GHz, and 6 GHz frequencies.

84
New cards

Defense-in-Depth

The concept that ensures there are defensive security strategies at each layer.

85
New cards

Defense-in-depth layers

Physical

Network Boundary

Internal Network

Host

Application

Data