Technical Training - Systems Operations Apprentice Course Block I (PDF)

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Summary

This document is a study guide for a technical training course on systems operations for apprentices. It covers various topics, including introduction, career field overview, and information technology fundamentals.

Full Transcript

STUDY GUIDE (SG) E3AQR1D731B00BC-I TECHNICAL TRAINING Systems Operations Apprentice Course Block I Introduction to Systems Operations...

STUDY GUIDE (SG) E3AQR1D731B00BC-I TECHNICAL TRAINING Systems Operations Apprentice Course Block I Introduction to Systems Operations June 2024 Foreign Disclosure: The information in this course is not restricted and may be disclosed to international students. Refer to the foreign disclosure memorandum in the security annex for further information. 81 TRAINING GROUP 336 TRAINING SQUADRON Keesler AFB, MS OPR: 336 TRS/TRR Supersedes: All previous versions DESIGNED FOR AETC COURSE USE NOT INTENDED FOR USE ON THE JOB THIS PUBLICATION CONTAINS COPYRIGHT MATERIAL 1 SYSTEMS OPERATIONS SPECIALIST SG E3AQR1D731B00BC-I Keesler Air Force Base, Mississippi INTRODUCTION TO SYSTEMS OPERATIONS DESCRIPTION: In this block, we cover five essential units. Unit 1 introduces students to the course and its objectives. Unit 2 focuses on the basics of the Systems Operations Career Field, including key terminology. Unit 3 delves into information technology systems fundamentals, covering topics like Programming Languages, Graphical User Interfaces, Cross Domain Data Solutions, Memory Structure, and more. Unit 4 explores various AF Cyber Weapons Systems. Finally, Unit 5 addresses networked systems, authentication methods, and addressing protocols. TABLE OF CONTENTS Unit 1. Orientation............................................................................................................................3 Unit 2. Career Field Overview.........................................................................................................4 Unit 3. Information Technology Fundamentals.............................................................................18 Unit 4. AF Cyber Weapon Systems............................................................................................... 39 Unit 5. Network Systems.......................................................................................................... ….49 Appendix A. IP Addressing Calculation Aids...........................................................................…..82 Appendix B. Acronyms............................................................................................................. ….83 Appendix C. Bibliography........................................................................................................ ….89 Microsoft Trademarks and Screenshots are used with permission from Microsoft. Supersedes: All previous versions 2 SG E3AQR1D731B00BC-I Module 1-1. Orientation OBJECTIVE 1a. Course Orientation and Introduction - Course Overview and Administration - Proficiency Advancement - Emergency Management - Training Environment Safety - Student Feedback Program - Effective Study Techniques - Fixed vs. Growth Mindset - Community College of the Air Force Benefits and Credits - Instructional Material Types and Uses - Training Material and Resource Conservation - Air Force Fraud, Waste, and Abuse Prevention and Detection - Sexual Harassment and Assault Reporting, Professional and Unprofessional Relationships, Trainee Abuse and Hazing, and Academic Integrity Reference Module 1-1 Orientation Slides for your orientation and introduction. 3 SG E3AQR1D731B00BC-I Module 1-2. Career Field Structure and Progression OBJECTIVE 2a. Identify basic facts and terms about the 1D7X1B Systems Operations Career Field. - Career Field Structure - Progression with the AFSC - Duties of the AFSC CAREER FIELD STRUCTURE The Air Force (AF) develops people specialized in hundreds of different skills to accomplish its mission. The AF uses Air Force Specialty Codes (AFSC) to assign and track personnel based on their skills and knowledge. The AFSC is an alphanumeric code consisting of five characters describing the various jobs in the AF. This section is designed to identify each character within your AFSC and its relationship to the AF Mission. CAREER GROUP (1D7X1B) The 1st character is called the Career Group. It identifies the AFSC in terms of its relationship to the AF Mission. The Career Group is divided into the following categories: 1. Operations 2. Maintenance & Logistics 3. Support 4. Medical & Dental 5. Legal & Chaplain 6. Finance & Contracting 7. Special Investigations Note: There are two categories considered special duty assignments (8 & 9). When assigned to those special duty assignments (typically via PCS orders from AFPC), you are considered “on loan” to that AFSC full-time. Once the duration of the special duty assignment is completed, you return to your AFSC. Examples of these special duty assignment include Recruiter, First Sergeant, Military Training Instructors (MTI), and Embassy Duty. The career group number reflects the specialty’s direct impact on the Air Force mission. Currently, you are undergoing training in the “1” career group, which designates an operations specialty. Other career fields that are designated under operations include Air Traffic Control, Command and Control Operations, Weather, Intelligence and many more. CAREER FIELD (1D7X1B) The combination of the AFSC’s 1st and 2nd character is called the Career Field (1D). The field indicates a functional grouping of personnel who share similar knowledge and skills. Within a career field, various specialties collaborate to accomplish the overall mission. 4 SG E3AQR1D731B00BC-I We are classified as Cyberspace Defense. Our job is to perform tasks as Systems Operations specialist for the AF and other Department of Defense (DoD) agencies. CAREER FIELD SUBDIVISION (1D7X1B) The AFSC’s combination of 1st thru 3rd characters is called the Career Field Subdivision (1D7). The career field subdivision identifies a grouping of personnel with related work requirements and qualifications. Systems Operations falls under the Cyberspace Defense career field subdivision. SKILL LEVEL (1D7X1B) The AFSC’s 4th character identifies a member’s obtained Skill Level. It specifies the specific degree of experience an individual must obtains within the particular AFSC. Achieving the next skill level is NOT an automatic process. Each level is earned based on experience, training, and rank. The skill levels are comprised of odd numbers 1, 3, 5, 7 and 9. The requirements of each skill level will be discussed below. 1D711B (1-Skill Level - Helper) Considered a Helper. This was received after the completion of Basic Military Training (BMT). 1D731B (3-Skill Level - Apprentice) Airmen are awarded 3-skill level (Apprentice) upon completion of formal technical training. The 3-skill level identifies an Airman who has obtained basic knowledge within an AFSC through completion of an initial skills course (aka tech school). An apprentice performs work activities and tasks with supervision. The rank requirement is Airman. 1D751B (5-Skill Level - Journeyman) After arrival at your duty location, you will be enrolled into a 5-skill level (Technician) upgrade certification training. This training is a combination of On- The-Job-Training (OJT), task certification, and completing the applicable Certification and Career Development Course (CDC); all under the supervision of an assigned trainer from your organization. The mandatory time requirement for OJT is a minimum of twelve months (nine months for re- trainees). Specific AF Job Qualification Standards (AFJQSs) and AF Qualification Training Packages (AFQTPs) and applicable 5- level Computer Based Training (CBT) are also required. When an airman’s trainer certifies that they’re certified to perform all tasks related to the assignment and verifies the completion of the CDC, they are upgraded to the 5-skill level. When this certification training is completed, the individual will be considered “certified” to perform their job with minimal supervision. Rank requirement is Airman First Class or Senior Airman. 5 SG E3AQR1D731B00BC-I 1D771B (7-Skill Level - Craftsman) The next skill level advancement will be accomplished upon achieving the rank of Staff Sergeant. At this time, Airmen will receive their 7-skill level (Craftsman) training and 12 months OJT. Within this skill level, you may expect to fill various supervisory positions to include shift leader, section Non-Commissioned Officer in Charge (NCOIC), Flight Superintendent and various other staff positions. Additional requirements may include: 1D791B (9-Skill Level - Superintendent) Airmen are awarded their 9-skill level (Superintendent) when promoted to Senior Master Sergeant. The 9-skill level identifies Airmen who through experience, training, and performance have shown a high degree of managerial and supervisory ability to fill positions requiring broad general knowledge. Airman at this level will fulfill superintendent positions, planning, coordinating, implementing and directing a wider scope of work activities and functions. Figure 1-1 details some additional requirements for each skill level within the AFSC. Skill Level Title Standard Progression Requirements 1 Helper - Graduate Basic Military Training School 3 Apprentice - Graduate Technical Training School 5 Journeyman - Complete the 5-level Career Development Course (CDC) and Computer Based Training (CBT) if available - Complete specific Air Force Job Qualification Standard (AFJQS(s))/Air Force Qualification Training Package (AFQTP(s)) for equipment at assigned location by duty position 7 Craftsman - Sew on Staff Sergeant (SSgt) - Complete 12 months OJT - Complete 6 months OJT for re-trainees - Complete 7-level Training and CBT, if available - Complete E6CW3DX7X 01AA Cyberspace Career Advancement Courses - Complete AFQTP 3DXXX-232A, Communications and Information Work Center Supervisor’s Handbook. - Complete specific AFJQSs/AFQTPs for equipment at assigned location and duty position. 9 Superintendent - Sew on Senior Master Sergeant (SMSgt) - Complete E6ACW3DX9X 00AA, Cyberspace Superintendent Course - Complete specific AFJQSs/AFQTPs for equipment at assigned location and duty position. Figure 1-1. Skill Level Efficiency 6 SG E3AQR1D731B00BC-I SPECIALTY (1D7X1B) The AFSC’s 5th character is used to identify the specific specialty. The 1D7 specialties included in the Cyberspace Defense career fields are: - 1D7X1 - Cyber Defense Operations - 1D7X2 - Spectrum Defense Operations - 1D7X3 - Cable and Antennae Defense Operations SPECIALTY SHREDOUTS (1D7X1B) The AFSC’s 6th character is used to identify positions associated with a particular type of equipment within a single specialty. Note that not all AFSCs have a 6th character. The Cyber Defense Operations shredouts include: - 1D7X1A – Network Operations - 1D7X1B – Systems Operations specialist - 1D7X1D – Cybersecurity Technicians - 1D7X1E – Technical Support Specialist - 1D7X1K – Knowledge Management Specialist - 1D7X1R – RF Operations - 1D7X1Z – Software Development Specialist The Spectrum Defense Operations shredouts include: - 1D7X2F – Spectrum Operations The Cable and Antenna Defense Operations shredouts include: - 1D7X3C – Cable and Antenna Operations PROGRESSION WITHIN THE AFSC Career progression is a constant process from one skill level to the next; remember it is not guaranteed. The scope of responsibility, technical knowledge and supervision will increase as you progress in each skill level. Today’s trainers, certifiers, and supervisors work together with strict guidance to determine when an individual is ready for advancement to the next higher skill level. Restrictions are placed on whether or not individuals can advance in skill level commensurate with their rank (example: Cross-training). Figure 1-2 summarizes career progression, rank, and personnel allocations. When applicable the avenue utilized for promotion eligibility is the Weighted Airman’s Promotion System (WAPS). 7 SG E3AQR1D731B00BC-I Figure 1-2. Career Path Chart WEIGHTED AIRMAN’S PROMOTION SYSTEM (WAPS) WAPS is an AF system for selecting Airman for rank promotion to Staff Sergeant (E-5) and Technical Sergeant (E-6). It was first implemented in 1969 and is still in use today. This system is comprised of four factors measuring an Airman’s potential for promotion to the next grade. Note: Master Sergeant (E-7) and above are also “boarded.” WAPS Factors: - Specialty Knowledge Test (SKT) – Measures specific job information - Promotion Fitness Examination (PFE) – Measures general military knowledge in a specific grade level - Enlisted Performance Brief (EPB) – Measures Airman’s past job performance and promotion potential. - Military Decorations and Awards – Points for earning various decorations or awards 8 SG E3AQR1D731B00BC-I One of the benefits of WAPS is it provides AF enlisted personnel in mid-level pay grades the opportunity to be promoted. Promotion to higher pay grades is based on a system of promotion factors, weights and points. Airmen eligible for promotion can review their Data Verification Record and WAPS score notice on the Virtual MPF after each promotion cycle. This allows them to self-evaluate their potential for promotion and assess what actions need to be accomplished to increase their potential for promotion in the future. An individual is eligible for promotion based on Time-in-Service (TIS), Time-in-Grade (TIG) and Skill Level. WAPS points come into play upon the recommendation for promotion by the member’s Commander. Airmen are evaluated based on the various factors; each is worth promotion points (the total promotion points are called “WAPS Points”). Specialty Knowledge Test (SKT) - up to 100 points Culminates with a 100-question test about individual jobs in the AF. Questions on the SKT are taken from the Career Development Course (CDC). Promotion Fitness Examination (PFE) – up to 100 points 100 question test about AF general supervisory subjects such as enlisted military history, AF doctrine, Expeditionary Forces, Joint Forces, standards of conduct, legal issues, military customs, courtesies, protocols, leadership, training, education, dress and appearance, etc. The questions are taken from the AF Handbook 1 (it replaced the Professional Development Guide). Enlisted Performance Brief (EPB) - up to 250 points An evaluation of the performance of an enlisted member both on and off duty. It provides meaningful feedback to individuals on what is expected of them, advice on how well they are meeting those expectations and how to improve those expectations. You may be awarded up to 250 points over a total of your last three eligible EPB’s. If you have only one EPB it will be awarded a 100% value. If you have two your most recent EPB will be awarded a 60% value and the previous a 40% value. If you have three, your most recent EPB will be awarded a 50% value, the previous a 30% value, and the last a 20% value. Military Decoration and Awards – up to 25 points Just like in our sister Services, AF members receive promotion points if they are awarded certain military decorations. The number of points is based on the type of decoration awarded. To be promoted, each of these factors are objectively scored and weighted in relation to its importance. The total scores and weights are used to rank Airmen for promotion within a given promotion cycle. The actual numbers promoted as well as an individual’s promotion number (i.e., sequential number indicating approximately when the member “pins”) is based on Congressional mandated manning for each of the Services as well as needs of the Air Force. 9 SG E3AQR1D731B00BC-I STANDARD PROGRESSION REQUIREMENTS Adequate training is essential to the timely progression of personnel from Apprentice to Superintendent’s skill levels. Qualification training is initiated anytime an individual is assigned duties they are not currently qualified to perform. The below listed training, which can be taken concurrently, will allow you to obtain the necessary qualifications. On-The-Job Training (OJT) Provided to inexperienced employees supervised at the work site during the initial stages of employment. Computer-Based Training (CBT) Receiving instructions/knowledge through special training courses hosted on a computer system. Learning Programs Previously known as Career Development Course (CDC), are published instruction providing information to satisfy the career knowledge component of OJT. They are developed from references identified in the Career Field Education and Training Plan (CFETP) containing information on basic principles, techniques and procedures common to a specific AFSC. Air Force Job Qualification Standard (AFJQS) Comprehensive task list describing a particular job type or duty position. Supervisors use the AFJQS to document task qualification. The tasks on AFJQSs are common to all persons serving in the described duty position. Air Force Qualification Training Package (AFQTP) Instructional course designed for use at the unit to qualify or aid qualification in a duty position, program or on a piece of equipment. It may be printed, computer- based or some other audiovisual media. CAREER FIELD EDUCATION AND TRAINING PLAN (CFETP) The AF Specialty (AFS) is managed by the AF Career Field Managers (AFCFM). The AFCFMs are representatives appointed by the HQ USAF Deputy Chief of Staff. The CFMs ensure assigned AF specialties are trained to meet the challenges of today and tomorrow. The AF Career Field Managers are responsible for creating the Career Field Education and Training Plan (CFETP). This plan standardizes the AFSC’s skill level training requirements and establishes the framework for managing the career field education and training. The AF places great emphasis on career field training. The CFETP is a comprehensive core training document identifying life-cycle training, education requirements, support resources and minimum core task requirements for an AFSC. This plan is essentially a training “road map” for 10 SG E3AQR1D731B00BC-I the career field. It provides personnel a clear career path to success and makes career field training identifiable, measurable and budget defensible. The CFETP document contains three sections: an introduction and two primary parts. The introduction consists of a preface to provide a general overview and explanation of the abbreviations and terms to standardized terms and definitions used within the career field. The two main parts are: Part I: Provides information necessary for overall management of the specialty A. Explains how everyone will use the plan. B. Identifies career field progression information, duties, responsibilities, training strategies and career field path. C. Associates each level with specialty qualifications (knowledge, education, experience, training, and other). D. Indicates resource constraints (e.g., funds, manpower, equipment, facilities). E. Identifies transitional training guide requirements for SSgt through MSgt. Part 2: Includes the following: A. Identifies the Specialty Training Standard (STS) including duties, tasks and Training References (TRs) supporting training. There are different types of Air Education Training Command (AETC) conducted training. This portion of the document will specify the core tasks, identify the minimum qualification and wartime tasks which are accelerated in wartime environment. The proficiency codes identify the level of training based on performance, knowledge and/or subject knowledge levels. Based on the AFSC skill level, the proficiency code is written to provide the knowledge and skills indicated by the skill level and proficiency code. Note: it is a combination of STS and Proficiency Codes course developers use in creating the Course Objectives (and deciding whether the course block is closed out using a test or progress check). B. Contains the Course Objectives List (COL) the training standards supervisor will utilize to determine if Airmen have satisfied training requirements. C. Identifies available support materials (e.g., Qualification Training Package developed to support proficiency training). D. Identifies the training course index supervisors can use to determine resources available to support training. Included here are both mandatory and optional courses. 11 SG E3AQR1D731B00BC-I E. Identifies MAJCOM-unique training requirements supervisors can use to determine additional training required for the associated qualification needs. At unit level, supervisors and trainers will use the Part II to identify, plan and conduct training commensurate with the overall goals. This career path helps Airmen not only determine when they are promotion eligible, but also when they can apply for training dates or specific duty positions within their AF Specialty (AFS). DUTIES OF THE AFSC As specialists in the 1D7X1B Systems Operations career field, your duties and responsibilities will vary depending on your skill level, the organizational unit you are assigned to, or the deployed location you are at. CORE COMPENTENCIES The core competencies of the 1D7X1B career field include: - Server operating systems - System and User Accounts Services - Contingency Operations - Strategic and Budget Planning - System/Database administration - Project management - Cloud Computing - Network Security 1D7X1B RESPONSIBILITIES Along with this, we are responsible for supporting the identification, reconnaissance and exploitation of vulnerabilities while enhancing capabilities within the cyber environments. As Systems Operations Apprentice, Journeyman and Craftsman your duties and responsibilities will vary depending on your assignment. Some of those responsibilities are listed below. System and User Accounts Services Responsible for managing system accounts. System Account Management (SAM) is standardizing user privileges and system settings using automated deployment tools like group policy objects (GPO) and remote management. Responsibilities include coordinating and implementing System Service Level Agreements (SSLA) as well as Memorandum of Understanding (MOU) for DoD systems. In conjunction with managing directory services, tasks include assigning dynamic IP addresses, manage Domain Name Server (DNS), Storage Area Network (SAN) and electronic messaging. A key component is managing secure authentication methods using Public Key Infrastructure (PKI) technologies and procedures to safeguard classified and unclassified message traffic via electronic mail 12 SG E3AQR1D731B00BC-I systems. System and user accounts are in a database environment therefore database operations and investigation is vital. Database operations and investigation consists of categorizing, isolating and resolving system problems. It also comprises database optimization in addition to performing proactive and reactive troubleshooting. As part of database operations, fault isolation tools are used to validate, isolate, correct faults and verify service restoration. The function includes adhering to scheduled maintenance as well as working outages. Security A key responsibility is to implement security policies (system and information safeguards). This is done by maintaining and implementing security fixes, updates, operating system (OS) patches and antivirus software. The Defense Information Systems Agency (DISA) will direct Information Assurance Vulnerability Assessments (IAVA) corrective efforts to mitigate security weaknesses found in programs and systems. We assist in responding to the resulting Command, Control, Communications, and Computers (C4) Notices to Airmen (C4 NOTAM) sent by the AF Network Operations (AFNETOPs) hierarchy (Ref. Figure 1-3). Figure 1-3. AFNETOPS Command & Control Structure 13 SG E3AQR1D731B00BC-I Contingency Operations Information Warfare Operations supports (under strict and controlled parameters) the development of Test, Tactics, Techniques and Procedures (TTPs) in both defensive and offensive missions on the AF and DoD computer networks. The purpose of information warfare is to exploit an enemy’s information systems and while defending ours against hostile operations. Operations will identify and analyze targets as well as exploits of the adversary’s network operations and systems based on rules of engagements (ROEs). The ROEs ensure the appropriate military capability is applied prudently and reflect collateral limitations restricting the use of force far beyond what is required by the Law of Armed Conflict (LOAC). Info Warfare Ops also develops and implements local restoral and contingency operations plans in case of emergency either by natural causes or human derived. Vital to contingency operations is the management and support of the Command, Control, Communication and Computer (C4) systems. This includes the requirement the documentation, as well as the server systems life cycle management status, are current and warrantied. Strategic and Budget Planning Strategic Budget Planning manages, supervises, and performs planning and implementation activities for the network. This includes purchasing equipment or software and managing the project’s installation. The project management aspect ensures architecture, configuration and integration conformity across the network (i.e., CITS). This may either fortify an established network or help establish a new infrastructure. If selected to participate during the infrastructure development, Cyber Operators will participate as a team member on facility design, military construction and planning. This entails evaluating and monitoring comprehensive plans and civil engineering projects based on customer submitted work requests. They may also be directed to conduct reviews as well as establish and continually check project implementation milestones from inception until completion. Cyber Operators may also be called upon to evaluate contracts for communications support, not only during wartime but also during contingency and exercise plans, to determine their impact on manpower, equipment and systems. 14 SG E3AQR1D731B00BC-I 1D7X1B DUTIES Establishing teams to enforce and perform the organization’s mission is very important. Some of the teams Cyber Operators may find themselves on as well as their associated duties are listed below: Mission Defense Teams MDTs are the result of the Cyber Squadron Initiative, which is a plan to move communications squadrons away from information Technology (IT) service toward a mission set that involves the cyberspace side of their wing’s operational mission. The MDT is responsible for mission assurance at the base-level and focuses on defensive cyber operations of Air Force weapons systems. Directory Services Directory Services provides basic authentication and accessibility to clients in a domain and provides other domain services, such as access control, security policies and settings, and software updates. Technicians that operate within Directory Services may find themselves managing Active Directory, Directory Resource Administrator (DRA) and domain controllers. The area of responsibility for those that manage DS is quite vast. These technicians could manage everything from GPOs, various accounts within AD (user, computer, etc.) to DNS, DHCP, and a variety of other domain specific tasks. Boundary Protection Boundary technicians/shop are those that allow, denies, redirects, and logs traffic traversing base firewalls and proxies. Boundary technicians are also in charge of setting up Access Control Lists (ACLs). The main focus of this job/team is to allow traffic to flow in and out of a specific boundary while also keeping that traffic and network safe. Infrastructure Employs defensive security policies on networking components physically and virtually from the AF gateway service delivery point to the base boundaries. Infrastructure teams employ policies implementing the use of networking devices and techniques used to detect, prevent, and respond to threats traversing through cyberspace. These teams manage routers, switches, IP addresses, and other things on a networking level. Storage and Virtualization Manage virtual environments within datacenters. These technicians are the virtual environment admins, create virtual machines (servers and clients), and perform the tasks of backups, recovery 15 SG E3AQR1D731B00BC-I and archiving. These teams will also be in charge of managing SANs that are housing the virtual environment, VMs, or data. This allows each server to access shared storage as if it were a drive directly attached to the server. The components most often seen within the AF networks/systems are VMware VSphere, vCenter, ESXI, and Hyper-V. Vulnerability Management These technicians/teams improve security posture of the AFIN. They conduct rapid, positive ID and notification to mitigate network and information system vulnerabilities. Vulnerability Management denies adversary access to friendly terrain. Like Directory Services, the scope or responsibility for Vulnerability Management is large. These teams will often have oversight over scanning, patching, and other security features. The components found will most likely be HBSS, ACAS, SCCM, and a few others. These teams may also find themselves installing STIGs and Patches locally or remotely. Monitoring Provides situational awareness to all components, systems and network devices, of that which it monitors. These teams do exactly what you’d expect, they proactively monitor/observe the network, servers, and devices for degradation of any kind. This team configures network management applications to receive real-time alerts and provide situation updates to the operator. A technician from monitoring may find themselves working with SolarWinds and Application Manager. Information Assurance This team constantly ensures the security posture of the AF network enabling confidentiality, integrity, availability, non-repudiation and authentication. They also are responsible for the certification and accreditation of the networks. Standard/Evaluation Team This team ensures operational training, and operators meet all AF and unit standards. They accomplish standardizations and evaluations, identifying deficiencies in training, processes and procedures. Crew Operations This team is responsible for the managing daily operations and directions. Any tasking or cyber mission generated from the top that needs to be carried out on the AFIN, will funnel down to the crew operations team. The individuals on crew ops team, made up of multiple back shops (teams above) carry out and execute those tasked mission(s) on the AFIN. DEPTH-OF-KNOWLEDGE AREAS: There are other concepts closely tied to the systems operation career field. These include: 16 SG E3AQR1D731B00BC-I Defense in Depth The concept of Defense-in-Depth is an Information Assurance (IA) strategy in which multiple layers of defense are placed throughout an information system. It addresses security vulnerabilities in people, technology and operations for the duration of the systems life cycle. Defense-in-depth seeks to make system penetration difficult at every layer of access. Each layer of defense aims to protect the system so that if one mechanism fails, another layer is already in place to stop an attack. This approach mitigates the risk of a single point of failure within the system. Proactive Defense Proactive defense in cybersecurity refers to the approach of anticipating and mitigating potential threats before they can impact an organization's information systems. This approach contrasts with a reactive defense, which responds to threats and attacks after they occur. Network Standardization Creates and maintains standards and policies to protect networks, systems and databases reducing maintenance complexity, down-time, costs, and training requirements. Situational Awareness Maintaining proper situational awareness assists you in preparing for and recognizing a threat. Situational awareness is a decision maker’s mental model of an evolving situation. Having complete, accurate, and up-to-the-minute situational awareness is considered essential for those who are responsible for being in control of complex, dynamic systems and/or high-risk situations. Lacking proper situational awareness has consistently been identified as one of the primary factors in accidents attributed to human error. By having situational awareness, you can identify threats and take countermeasures against them before the integrity of your system is compromised. OBJECTIVE SUMMARY As a Systems Operator, it is necessary to understand our AFSC and how it relates to the AF Mission. We also need to understand how to progress within our career field. The largest influence on our career progression is fulfilling the duties and responsibilities assigned to us in our AFSC. 17 SG E3AQR1D731B00BC-I Module 1-3. Information Technology Systems Fundamentals OBJECTIVE 3a. Identify basic facts and terms associated with fundamentals of information technology systems. - Programming Languages - Service Oriented Architecture (SOA) - Databases - Interfaces - Cross Domain Data Solutions (CDS) - Memory Structure - Interrupt Requests (IRQ) - Drivers - Complementary Metal-Oxide-Semiconductor (CMOS) - Basic Input/Output System (BIOS) / Unified Extensible Firmware Interface (UEFI) PROGRAMMING LAUNGUAGES Before we can discuss the software languages used to program with, we must first define what a program is. A program is a set of instructions designed and written to perform a specific task within a computer system. The instructions, specifications and performance requirements are considered the source code or micro-code of the programs. Programming languages, on the other hand, serve as tools for describing, measuring, and expressing processes or algorithms, encompassing both digital and non-digital data that computing machines handle. While programming languages serve various purposes, their fundamental objective lies in governing and regulating the behavior and performance of computing systems, as well as the outcomes they generate. PROGRAMMING LANGUAGE COMPONENTS There are two basic components of programming languages: syntax and semantics (Ref. Figure 1-4). Syntax and semantics are fundamental concepts in linguistics and programming languages. They represent two different aspects of communication and understanding languages, whether they are human languages or computer languages. Syntax The syntax is the way symbols, words and characters are formed within each programming language. It’s about the arrangement of words and phrases to create well-formed sentences in a particular language. In other words, syntax is concerned with what is grammatically correct in a sentence. Semantics Semantics deal with the meaning each set of characters convey when arranged in a particular way. While two pieces of code may have the same syntax, their semantics could be different if they perform different tasks. 18 SG E3AQR1D731B00BC-I Simple C++ Program Syntax: Simple COBOL Program Syntax: #include & DISPLAY "Good Morning". STOP using namespace std; int main() RUN { “cout

Use Quizgecko on...
Browser
Browser