Knowledge

Information operations condition

Source 📝

102:
describes when an attack has taken place but the Computer Network Defense system is not at its highest alertness. Non-essential networks may be taken offline, and alternate methods of communication may be
60:
describes a situation where there is no apparent hostile activity against computer networks. Operational performance of all information systems is monitored, and password systems are used as a layer of
109:
describes when attacks are taking place and the Computer Network Defense system is at maximum alertness. Any compromised systems are isolated from the rest of the network.
199: 41:. It is a defense system based primarily on the status of information systems and is a method used by the military to defend against a computer network attack. 141:, the US government goes to INFOCON 2 when Francis Gibson has a massive cyber attack initiated upon the United States, nearly bringing it to war with China. 17: 237: 68: 253: 67:
describes an increased risk of attack. Increased monitoring of all network activities is mandated, and all
88:
describes when a risk has been identified. Security review on important systems is a priority, and the
230: 89: 217: 200:"Department of Defense (DOD) Information Operations Condition (INFOCON) System Procedures" 8: 155: 137: 49:
There are five levels of INFOCON, which recently changed to more closely correlate to
181: 79: 247: 78:
usage may be restricted to government sites only, and backing up files to
150: 197: 186: 170: 124: 75: 71: 37:) is a threat level system in the United States similar to that of 160: 93: 165: 113: 50: 175: 38: 27:
Defending against computer-based network attacks or threats
198:
Strategic Command Directive (SD) 527-1 (2006-01-27).
92:system's alertness is increased. All unclassified 245: 123:Symantec's ThreatCon service no longer exists. 114:Similar concepts in private-sector computing 74:must make sure their systems are secure. 236:CS1 maint: numeric names: authors list ( 118: 14: 246: 130: 24: 25: 265: 35:information operations condition 18:Information Operations Condition 44: 13: 1: 192: 96:connections are disconnected. 7: 144: 10: 270: 205:. DISA Policy and Guidance 254:Alert measurement systems 90:Computer Network Defense 127:has acquired Symantec. 225:Cite journal requires 69:Department of Defense 119:ThreatCon (Symantec) 53:levels. They are: 156:Attack (computing) 135:In the TV Series, 131:In popular culture 182:Threat (computer) 16:(Redirected from 261: 241: 234: 228: 223: 221: 213: 211: 210: 204: 21: 269: 268: 264: 263: 262: 260: 259: 258: 244: 243: 235: 226: 224: 215: 214: 208: 206: 202: 195: 147: 133: 121: 116: 80:removable media 47: 28: 23: 22: 15: 12: 11: 5: 267: 257: 256: 227:|journal= 194: 191: 190: 189: 184: 179: 173: 168: 163: 158: 153: 146: 143: 132: 129: 120: 117: 115: 112: 111: 110: 104: 97: 83: 62: 46: 43: 26: 9: 6: 4: 3: 2: 266: 255: 252: 251: 249: 242: 239: 232: 219: 201: 188: 185: 183: 180: 177: 174: 172: 169: 167: 164: 162: 159: 157: 154: 152: 149: 148: 142: 140: 139: 128: 126: 108: 105: 101: 98: 95: 91: 87: 84: 81: 77: 73: 70: 66: 63: 59: 56: 55: 54: 52: 42: 40: 36: 32: 19: 218:cite journal 207:. Retrieved 196: 136: 134: 122: 106: 103:implemented. 99: 85: 64: 57: 48: 34: 30: 29: 178:(THREATCON) 151:Alert state 61:protection. 45:Description 33:(short for 209:2009-09-27 193:References 107:INFOCON 1 100:INFOCON 2 86:INFOCON 3 82:is ideal. 72:end users 65:INFOCON 4 58:INFOCON 5 248:Category 187:WATCHCON 171:EMERGCON 145:See also 125:Broadcom 76:Internet 161:LERTCON 94:dial-up 31:INFOCON 166:DEFCON 138:Crisis 51:DEFCON 203:(PDF) 176:FPCON 39:FPCON 238:link 231:help 250:: 222:: 220:}} 216:{{ 240:) 233:) 229:( 212:. 20:)

Index

Information Operations Condition
FPCON
DEFCON
Department of Defense
end users
Internet
removable media
Computer Network Defense
dial-up
Broadcom
Crisis
Alert state
Attack (computing)
LERTCON
DEFCON
EMERGCON
FPCON
Threat (computer)
WATCHCON
"Department of Defense (DOD) Information Operations Condition (INFOCON) System Procedures"
cite journal
help
link
Category
Alert measurement systems

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.