Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

IW Test

TermDefinition
Operation Risk Management Decision making tool used at all levels to increase operational effectiveness
Five Steps of ORM (IAMIS) Identify hazard, Assess hazard, Make risk decisions, Implement controls, Supervise
Safety and Mishap Instruction OPNAVISNT 5102.1D
4 HAZARD Severity categories Category 1- May cause death Category 2- may cause severe injury, illness, or property damage Category 3- may cause minor injury Category 4- minimal threat
4 Subcategories of Mishap probability Sub-Cat A- likely to occur immediately Sub- Cat B- probably will occur in time Sub- Cat C- may occur in time Sub-cat D- unlikely to occur
RAC Definition expression of risk that combines the elements of hazard severity and mishap probability
5 RACs Critical Risk, Serious Risk, Moderate Risk, Minor Risk, Negligible Risk
Mishap Investigation Time Limit 8 hours
Mishap Reportable Items (4) Class A-$1 million or more Class B- $200,000 or more, less than $1 million Class C- $20,000 or more, less than $200,000 Class D- $2,000 or more, less than $20,000
HAZREP Purpose To discover a hazardous condition or experiencing a near- mishap to alert COMNAVSAFECEN and HQMC
Objectives of First Aid Save life, Prevent further injury, limit infection
Methods to control bleeding (3) Direct pressure, Pressure points, Constricting bands
11 Pressure Points Temporal, Facial, Neck, clavicle, brachial, hand, groin, thigh, knee, and ankle
Shock Symptoms Weak/rapid pulse, sweating, dilated pupils, pale
Shock Treatment Make victim as comfortable as possible, immobilize fracture, conserve body heat, remove wet clothing, elevate feet
Open Fracture bone protrudes from the skin
Closed Fracture Skin remains intact
Electrical shock victim procedures don't touch the victim's body, immediately turn off current, administer CPR
Methods to clear an obstructed airway Standing abdominal thrust, Reclining abdominal thrust, standing chest thrust, reclining chest thrust
Hypothermia Treatment Body gets to cold. Minimize heat loss
Frostbite affected body parts turns stiff and number. Place warm body part over affected area
Heat Stress Move person to cool location and apply cold compress
Heat Exhaustion Dizzy, weak, headache, loss of appetite, and nausea.
Heat Stroke Victim flushed, very dry, constricted pupils, and a rapid strong pulse. Move person to cool location
HERO Hazards of Electromagnetic radiation to Ordinance
HERP Hazards of Electromagnetic radiation to Personnel
HERF Hazards of Electromagnetic radiation to fuels
HAZMAT Hazardous Material
Risk of improperly labeled HAZMAT Mixture of chemicals could lead to fires
MSDS technical bulletins. Info on MSDS: identifies, hazardous ingredients, characteristics, physical hazards, reactivity, health hazards
Hearing Conservation Program Goal Prevent occupational hearing loss and assure auditory fitness for duty
Naval Doctrine Areas (6) Command and Control, Operations, Warfare, Logistics, Intelligence, and Planning
Naval Logistics Principles (7) (FEARSS) Flexibility, Economy, Attainability, Responsiveness, Simplicity, Sustainability, and Survivability
1st ship named after enlisted man USS Osmond Ingram. 1st sailor killed during WW1
Conditions that led to USN formation English Parliament " Taxation without Representation" October 13th 1775- purchased 2 vessels from French, birth of US navy
3 classes of ships at navy's inception ships-of-the-line, frigates, and sloops-of-war
Hand salute Originated from men armor raising their helmet visors
Saluting the Ensign US navy regulation 1007
Dipping the ensign merchant ships lower their national colors to half- mast
17 gun salute Admiral
15 gun salute Vice Admiral
13 gun salute Rear Admiral Upper Half
11 gun salute Rear Admiral lower half
Battle of Coral Sea 7-8 May 1942. First carrier battle: Lexington and Yorktown
Great White Fleet 16 DEC 1907. world cruise to show the flag
Battle of Normandy 06 JUN 1944. Largest amphibious operation in history
Midway 3-5 JUN 1942. Turning point of Pacific war. cracked Japanese navy's code.
Guadalcanal 13-15 NOV 1942. 5 Sullivan brothers killed.
Battle of Leyte Gulf 23 OCT 1944. Japanese navy final blow
Mercury 05 MAY 1961. First US manned space flight
Gemini 23 MAR 1965. First US two-man space mission CDR John Young
Apollo 2 16-24 JUL 1969. Armstrong, 1st lunar landing
Apollo 17 07-19 DEC 1972. 7th, final lunar landing
STS-1 12-14 APR 1981. 1st orbital test flight of space shuttle
On-the-roof-gang 01 OCT 1928. Navy crypto group.176 enlisted radio intercept operators
Purple code 1930s. Japanese cipher system used to communicate with major diplomatic posts
Battle of Midway Pacific war turning point. US broke Japanese naval code
Attack on USS Liberty 08 JUN 1967. 6 day war. largest loss of life from a single event in American crypto history
Capture of USS Pueblo 23 JAN 1968. Largest single loss of sensitive material
D- Day Landing Largest amphib op. in history
Inchon Landing 16-19 SEP 1950
Hainan Island EP-3 incident 01 APR 2007. US recon plane forced to land in peoples republic of china
Bletchley Park Enigma cypher broken
Navajo Code Talkers 1942-1945. Japanese never broke code
Attack on USS Stark 17 MAY 1987. Ship was hit by 2 EXOCET cruise missiles from Iraqi fighter aircraft.
EC-121 Shoot Down 15 APR 1969. American aerial recon worst loss
Qualities that characterize the Navy/Marine Corps team as instruments to support national policies Readiness, Flexibility, Self-Sustainability, and Mobility
Level of War (3) Strategic, Operational, Tactical
1947 National Security Act War Dept./ Navy Dept. merged into DoD creating CIA,DIA, AF, and NSC
Navy Core Values Adopted in 1992 in wake of Tailhoook sexual assault scandal
Sailor's Creed Written by " Blue Ribbon Recruit Training Panel" in 1993.
RADM Grace Hopper 1906-1992. co- inventor of COBOL and was known as "Grand Lady of Software"
1st computer Atanasoff- Berry Computer. Iowa State College
ARPANET 1958. President Eisenhower in response to USSR's launch of Sputnik 1972- 1st email
John Walker Espionage case single most damaging espionage case involving USN
Oldest intelligence organization ONI 1882
1st CIO/DNI 22 APR 2005. Director- John Nogroponte
2 departments that were combined to form ONI EO #292. 23 MAR 1882
USN Mission Maintain, train, and equip combat ready Naval forces capable of winning wars, deterring aggression and maintain freedom of seas
Difference between OPCON and ADCON OPCON- Operational Control: authority dealing with mission ADCON- Administrative control
COCOM, navy COCOM, FLTCOM, TYCOM Functions COCOM- Combatant command Navy COCOM- Atlantic Fleet, Naval Forces Europe, Pacific Fleet, Naval Forces Central Command FLTCOM- Fleet Commander TYCOM- Type Commander
Command Locations PACOM- Hawaii EUCOM- Germany JFCOM- Va SOUTHCOM- Florida CENTCOM- Tampa, florida NORTHCOM- Colorado Springs SOCOM- Tampa, Florida TRANSCOM- Illinois STRATCOM- Omaha,Nebraska AFRICOM- Germany USCYBERCOM- Meade, MD, Cyber Realms
Director of Naval intelligence CNO (N2) and N6 (computer network)
CNMOC Commander, oceanography command, Mississippi
NNWC Naval Network Warfare Command- Va Beach, VA
Commander, Reserve Space and Network Warfare Program sponsors the reserve Space Cadre and support Navy Space Team
Commander, USSTRATCOM Offut AFb Omaha, Ne
JSPOC Join Space Operations Center.
NOAA National Oceanic and Atmospheric Administration. NWS
NAVSOC Naval Satellite Operation Center
NAVYCYBERFOR Virginia Beach, Va
ONI Office of Naval Intelligence. Suitland, Md
Office of Oceanographer/ Navigator of the navy maximize America's sea power by applying relevant oceanographic knowledge across the full spectrum of warfare
3rd Fleet San Diego, Ca. international dateline to E. Pacific
4th Fleet Mayport, Fl. Caribbean and Central and South America
5th Fleet Manama, Bahrain. Arabian Gulf, Red Sea, Gulf of Oman, and parts of the North Indian Ocean.
6th fleet Naples, Italy. half of the Atlantic
7th fleet Yokosuka, Japan. Kuril Islands in the North to the Antarctic
10th Fleet Ft. Meade, Maryland. Cyber Realm
US Fleet Forces Norfolk, Va. N. Pole to just south of the tropic of cancer
TF Task Force
TG Task Group
TU Task Unit
TE Task Element
IDC RATEs AG, CTI, CTM, CTN,CTR, CTT, IS, IT
NCTAMS LANT Norfolk, Va. Operates C4I to support Atlantic Fleet
NCTAMS Locations NCTAMS Lant Det Hampton Roads NCTAMS Lant Det Lamoure NCTAMS Lant Det Brunswick NCTAMS Lant Det GTMO NCTAMS Lant Det Cutler NCTAMS Lant Det Rota, Spain NRTF Aquada, Puerto Rico NCTAMS PAC- Wahiawa, Hi
C4ISR Command, Control, Communications, Computers, and Intelligence Surveillance and Reconnaissance
DISA( Defense Information Support Agency) Mission Combat support agency that provides a global net- centric enterprise in direct support to joint- war fighters
NASIC Mission Naval Air and Space Intelligence Center
NCDOC Mission Suffolk, Va. Coordinate, monitor, and oversee the defense of Navy Computer networks and systems and establish CND for Joint Task Force.
ODNI Office of the Director of National Intelligence. Head of Intel community
DIA Defense Intelligence Agency: MASINT
NSA National Security Agency SIGINT
CIA Central Intelligence Agency HUMIT
NGA National Geospatial- Intelligence Agency. GEOINT
DHS Department of Homeland Security Assesses the scope of terrorist threats to US
FBI Federal Bureau of Investigation. Counter intel and counterterrorism in US
DEA Drug Enforcement Administration
DOE Department of Energy
DOS Department of State Performs intelligence analysis and procedures studies on a wide range of political and economic topics
DOT Department of Treasury Analyzes foreign intel. related to US economic policy
NASA National Aeronautic and Space Administration
NRO National Recon. Office
Military Branches USAF, USA, USMC, USN, USCG
Commander- in- chief President
Secretary of Defense policy advisor to the president
Secretary of the navy head of the department of the navy
Chief of Naval Operations highest ranking officer n the Navy
Fleet Commander in Charge Responsible for one of the numbered fleets
Type Commander Responsible for all ships of a specific type that makes up the fleet for that AOR
Master Chief Petty Officer of the Navy senior enlisted person in the navy
Fleet Master Chief serves as the senior enlisted advisor to the fleet
Force Master Chief principal advisor to commanding officers
Command Master Chief Principal enlisted advisor to the commanding officer and runs the ombudsman program
CCRI Command Cyber Readiness Inspection. Quick- look for conducting compliance validations for the COCOMs
NAVIDFOR's role in a CCRI Office of Designation Approving Authority (ODAA) for all cyber networks
Purpose and contents of EDVR section 6- DNEC management section 7- NEC billet and personnel inventory Section 8- list of individuals who are qualified in NECs 12 sections
ODCR Officer Distribution Control Report Monthly statement of officer manpower accounts
AMD Activity Manpower Document Qualitative and quantitative manpower and an official statement of organizational manning and billets authorized
Evaluation Report (E1-E6)- required by navy regulations
CHIEFEVALS (E7-E9) required by navy regulations
Fitness Report (O1-O10) Officer's fitness for service and their performance of duties
Concurrent Report Provide record of significant performance in an additional duty (ADDU) or TEMADD
Page 2 Dependency application/ emergency data
Page 4 Warfare Pins
SGLI life insurance
Page 13 Administrative Remarks
OPREP 3 Pinnacle National- level interest to the National Military Command Center (NMCC)
OPREP 3 Navy Blue Used to provide the CNO and other naval commanders notification of incidents those are of high navy
OPREP 3 Navy Unit SITREP Used to inform the operational commander or appropriate higher authority
IG Importance Inspector general conducts and supervises AUDITS!
Navy Correspondence Manual Purpose To prescribe uniform standards for management and preparation of correspondence.
Career Waypoints Program Long term force shaping tool that aids in leveling ratings over manned and undermanned
Officer Accession Programs USNA, NAPS, OCS, MECP, MSC IPP, LDO, CWO, STA-21
Defense Language Proficiency Test (DLPT) foreign language proficiency Required score: L2/R2
Educational Services Officer Coordination of officer and enlisted training and on duty education programs
US Navy's drug screening program (NSSP) Purpose Navy's Zero Tolerance policy Random Urinalysis
6 Programs of Brilliant on the Basics CDB, Ombudsman, Mentorship, Sponsorship, Indoctrination, Recognition Program
Public Affairs Officer Purpose Handles all media and public inquiries relating to the command and/ or its sailors
3M/PMS System Navy ships' Maintenance and Material Management (3-M) systems that will support in a manner that will ensure maximum equipment operational
Defense Property Accountability System (DPAS) used to track equipment Provides data to the DON Financial Statements
MOV Program Material Obligation Validation (MOV) represents that unfilled quantity of a requisition that is not immediately available for issue
DLRs Program Depot Level Repair- repairs that happen at a depot level AVDLRs- Aviation Depot Level Repairable Non-AVDLRs- DLRs under the management of the Naval Inventory Control Point
NRFI DLRs Procedures Turn in: not ready for issue (NRFI) repairable component that requires turn- on to a repair facility or designated overhaul point Remain in place-these items are repairable components that cannot be removed until receipt of a replacement item
Maintenance Assistance Module (MAMs) parts used for isolating faults within an avionics system or test set
Bulkhead mounted spares are material authorized for stowage in other departments
CASREP casualty report designed to support the CNO and Fleet commanders in management of assigned forces Initial, Update, Correct, and Cancel
NSN National Stock Number
COG Cognizance Symbol
APL Allowance Parts List
AEL Allowance Equipage List
NC Not Carried
NIS Not in stock
SIM Selected Item Management
DD Form 1348-6 requisition material that cannot be identified by a NSN
NAVCOMPT 2276 Contractual Procurement
NAVSUP 1250-2 Requisition is used for obtaining materials that do not have an NSN
SF 44 Designed for on the spot, over the counter purchases, limit of $2500, exception is aviation fuel
DD Form 1155 Designed to encourage faster delivery of materials or services from contractors
SF 1449 Solicitation/ Contract/ Order for Commercial Items
SF 30 Amendment of Solicitation/ Modification of Contract
DD Form 200 Survey form
SF 364 Report of Deficiency (ROD)
SF 386 Quality Deficiency Report (QDR)
CHRIMP Consolidated Hazardous Material Reutilization and Inventory Management Program- serves as a fundamental element of the navy's life-cycle control and management of HAZMAT
DRMO Defense Reutilization Marketing Office (DRMO)-
ServMart self- service store operated by an ashore supply activity
Government Commercial Purchase Card ( IMPAC) (VISA) Government purchase card with a micro purpose threshold of $3,000
OPTAAR Operating Target. estimate of the amount of money that will be required by a unit to perform its assigned tasks.
Normal Power Power for everyday use
Emergency Power backup power if normal power goes out
Uninterrupted UPS or battery back up. Provides emergency power when input power fails
Directives that govern personnel security Dod 5105.21-M-1 SECNAV M-5510.30 series DCID 6/4 and 6/9 JOINTDODISS
Top Secret Orange grave damage to National security
SECRET Red serious damage to national security
CONFIDENTIAL Blue cause damage to national security
UNCLASSIFIED Green no effect to national security
Need to Know Based on job description and/ or requirements, not just having the appropriate clearance.
Top Secret Investigation SSBI, good for 7 years with a reinvestigate every 5 years
Secret Investigation lasts entire career
Confidential Investigation Indefinite
SCI Must be read into related SCI caveats
Security Access Eligibility Report (SAER) used to identify an incident or any change in the eligibility to classified material,
Events reportable to SSO Foreign influence, Sexual behavior, unwillingness to comply with regulations, change in marital status, and mental status
Who has overall authority of and controls access to SCIF Special Security Officer (SSO)
SF 700 Security Container Information Used to maintain combos
SF 701 Activity Security Checklist- ensure space is secure
SF 702 Security Container Check Sheet- sign off log for opening and securing a container
SF 703 Top Secret Cover Sheet (orange) TS document coversheet
SF 704 Secret Coversheet (Red). secret document coversheet
SF 705 Confidential Coversheet (Blue)
SF 312 NDA- Non- Disclosure Agreement
SF 153 COMSEC material report- document receipt of all COMSEC material
When should safe combos be changed? When a combo lock is first installed or used Combo has been subject to compromise Other times deemed necessary by the CSA
FDO Foreign Disclosure Officer Processes all foreign visit requests to the command
DCS Defense Courier Service Transportation of sensitive classified material that cannot be transported through private or public means
Procedures for carrying hard copy classified material DCS- MUST BE DOUBLE WRAPPED Hand Carry- double wrapped with address label on both inner/outer wrapping
TSCO responsibilities Top Secret Control Officer- control and inventory of all collateral top secret material throughout the command
THREATCON and FPCON levels Normal No current terrorist activity
ALPHA small and general terrorist activity exists
BRAVO somewhat predictable terrorist threat
CHARLIE FPCON LEVELS Instance occurs or when intelligence reports that there is a terrorist activity imminent
DELTA FPCON LEVEL occurs only in the area that are most vulnerable to or have been attacked or when intelligence has reported that an attack has occurred or occurring
Random Anti-Terrorism Measure (RAM) Maximize effectiveness deterrence value, implemented without a set pattern
Emergency Action Plan (EAP) Plan for destroying classified material
Purpose of Emergency Destruction Procedures (EDP) Planning must consider natural disaster and hostile actions EDP's vary depending upon the commands mission and what COMSEC material they hold
Who can initiate the Emergency Destruction Commanding Officer Emergency Action Officer
How and in what order, material is destroyed during Emergency destruction Material that will cause more danger to national security will be destroyed first
SCI Sensitive Compartmented Information- requires special controls for restricted handling within compartmented intel systems
Items prohibited in a SCIF Anything that transmits, receives, records or stores data is NOT authorized in the SCIF without SSO approval
Difference between security violation and practices dangerous to security Practice dangerous to security (PDS)- incident that if not corrected could become a security violation Security Violation- an incident when classified info has been compromised either through negligence or deliberate action
SCIF security requirement Must have one controlled entry point and emergency exit Inspected every 2 years Installed alarm systems tied in with base police Completely closed space with no possibility of outside access
T-SCIF (temporary) Must have clearly defined physical perimeter barrier and continuous physical security safeguards Manned at all times or operations until no longer needed as SCIF
Vault recertification TOP SECRET- 6 months SECRET- 6 months CONFIDENTIAL- 9 months All other facilities- 9 months
Two- person integrity Must have at least two people in the SCIF at all times, to monitor one another's actions
DoD escort Policy Only command personnel
Procedures for sanitizing an area Removal of information from the media or equipment, take down anything classified
COMSEC Communications Security
INFOSEC Information Security
COMPUSEC Computer Security
PSP Personnel Security Program
ATFP Anti-terrorism/ Force protection
Purpose of ICD system DNI provides guidance, policy, and direction to the intelligence community
SSO Navy Overall SSO for the Navy. Training of SSO personnel throughout the navy
SSO Duties Investigates SCI security infractions Official access point for clearance fro SCI visitors Reviews all derogatory info from local supporting military law enforcement agencies
Who can be a CSM GS-11 or officer Be appointed by the CO Have an SSBI within the last 5 years
Command Security Manager (CSM) Responsible for storage and destruction of all classified information as well as establishing the EAP
Joint Personnel Adjudication System (JPAS) Purpose Holds security clearances
DoDCAF Responsibilities Adjudicate our clearance/ revokes them
How long can a CO suspend access before DoD revokes a clearance 90 days
INFOCON 5- normal readiness 4- increased military vigilance procedures 3- Enhanced readiness procedures 2- Greater readiness procedures 1- max. readiness procedures
Why does the navy only use ".mil" email addresses conduct DoD publicly, provides names only for IP addresses allocated to the DoD by the American Registry for Internet numbers
IA Program to protect and defend DoD information, info systems, and information networks
Certification evaluation of the technical and non- technical security features of an IS, mad as part of and in support of the accreditation process
Accreditation Official authorization granted by Designated Approving Authority (DAA) permitting the processing of information on an IS.
DAA official with authority to formally assume responsibility for operating a system at an acceptable level of risk
System Security Plan/ System Security Authorization Agreement Planned security tasks required to meet system or network security requirements
ATO Authority to operate: Declaration by the DAA that an IS is approved to operate in a particular security mode
IATO Interim Authority to Operate: May be issued when the requirement for full accreditation cannot be met
Configuration Management Procedures to assure the appropriate physical and technical protection of the backup and restoration hardware, firmware, and software
Low-to- high Connections Information being passed from low side will not have a confidentiality requirement
High-to-low Connections Must be sanitized of all classified information before being established on the low side
Risk Management Process that allows IT manager to balance the operational and economic costs of protective measures
5 attributes of IA Confidentiality, Integrity, Availability, non- repudiation, authentication
Root Level Intrusion (incident) unauthorized privileged access to a DoD system
User Level Intrusion (incident) Unauthorized non- privileged access to a DoD system
Unsuccessful Activity attempt Deliberate
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards