91:
describes when an attack has taken place but the
Computer Network Defense system is not at its highest alertness. Non-essential networks may be taken offline, and alternate methods of communication may be
49:
describes a situation where there is no apparent hostile activity against computer networks. Operational performance of all information systems is monitored, and password systems are used as a layer of
98:
describes when attacks are taking place and the
Computer Network Defense system is at maximum alertness. Any compromised systems are isolated from the rest of the network.
226:
188:
30:. It is a defense system based primarily on the status of information systems and is a method used by the military to defend against a computer network attack.
130:, the US government goes to INFOCON 2 when Francis Gibson has a massive cyber attack initiated upon the United States, nearly bringing it to war with China.
57:
242:
78:
56:
describes an increased risk of attack. Increased monitoring of all network activities is mandated, and all
206:
77:
describes when a risk has been identified. Security review on important systems is a priority, and the
144:
126:
170:
219:
189:"Department of Defense (DOD) Information Operations Condition (INFOCON) System Procedures"
68:
38:
There are five levels of INFOCON, which recently changed to more closely correlate to
236:
139:
67:
usage may be restricted to government sites only, and backing up files to
175:
159:
113:
64:
60:
149:
82:
154:
39:
26:) is a threat level system in the United States similar to that of
164:
27:
16:
Defending against computer-based network attacks or threats
187:
Strategic
Command Directive (SD) 527-1 (2006-01-27).
81:system's alertness is increased. All unclassified
112:Symantec's ThreatCon service no longer exists.
8:
103:Similar concepts in private-sector computing
63:must make sure their systems are secure.
225:CS1 maint: numeric names: authors list (
215:
204:
7:
14:
24:information operations condition
1:
85:connections are disconnected.
259:
194:. DISA Policy and Guidance
243:Alert measurement systems
79:Computer Network Defense
116:has acquired Symantec.
214:Cite journal requires
58:Department of Defense
108:ThreatCon (Symantec)
42:levels. They are:
145:Attack (computing)
124:In the TV Series,
120:In popular culture
171:Threat (computer)
250:
230:
223:
217:
212:
210:
202:
200:
199:
193:
258:
257:
253:
252:
251:
249:
248:
247:
233:
232:
224:
213:
203:
197:
195:
191:
186:
184:
136:
122:
110:
105:
69:removable media
36:
17:
12:
11:
5:
256:
254:
246:
245:
235:
234:
216:|journal=
183:
180:
179:
178:
173:
168:
162:
157:
152:
147:
142:
135:
132:
121:
118:
109:
106:
104:
101:
100:
99:
93:
86:
72:
51:
35:
32:
15:
13:
10:
9:
6:
4:
3:
2:
255:
244:
241:
240:
238:
231:
228:
221:
208:
190:
181:
177:
174:
172:
169:
166:
163:
161:
158:
156:
153:
151:
148:
146:
143:
141:
138:
137:
133:
131:
129:
128:
119:
117:
115:
107:
102:
97:
94:
90:
87:
84:
80:
76:
73:
70:
66:
62:
59:
55:
52:
48:
45:
44:
43:
41:
33:
31:
29:
25:
21:
207:cite journal
196:. Retrieved
185:
125:
123:
111:
95:
92:implemented.
88:
74:
53:
46:
37:
23:
19:
18:
167:(THREATCON)
140:Alert state
50:protection.
34:Description
22:(short for
198:2009-09-27
182:References
96:INFOCON 1
89:INFOCON 2
75:INFOCON 3
71:is ideal.
61:end users
54:INFOCON 4
47:INFOCON 5
237:Category
176:WATCHCON
160:EMERGCON
134:See also
114:Broadcom
65:Internet
150:LERTCON
83:dial-up
20:INFOCON
155:DEFCON
127:Crisis
40:DEFCON
192:(PDF)
165:FPCON
28:FPCON
227:link
220:help
239::
211::
209:}}
205:{{
229:)
222:)
218:(
201:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.