Knowledge

Information operations condition

Source 📝

91:
describes when an attack has taken place but the Computer Network Defense system is not at its highest alertness. Non-essential networks may be taken offline, and alternate methods of communication may be
49:
describes a situation where there is no apparent hostile activity against computer networks. Operational performance of all information systems is monitored, and password systems are used as a layer of
98:
describes when attacks are taking place and the Computer Network Defense system is at maximum alertness. Any compromised systems are isolated from the rest of the network.
226: 188: 30:. It is a defense system based primarily on the status of information systems and is a method used by the military to defend against a computer network attack. 130:, the US government goes to INFOCON 2 when Francis Gibson has a massive cyber attack initiated upon the United States, nearly bringing it to war with China. 57: 242: 78: 56:
describes an increased risk of attack. Increased monitoring of all network activities is mandated, and all
206: 77:
describes when a risk has been identified. Security review on important systems is a priority, and the
144: 126: 170: 219: 189:"Department of Defense (DOD) Information Operations Condition (INFOCON) System Procedures" 68: 38:
There are five levels of INFOCON, which recently changed to more closely correlate to
236: 139: 67:
usage may be restricted to government sites only, and backing up files to
175: 159: 113: 64: 60: 149: 82: 154: 39: 26:) is a threat level system in the United States similar to that of 164: 27: 16:
Defending against computer-based network attacks or threats
187:
Strategic Command Directive (SD) 527-1 (2006-01-27).
81:system's alertness is increased. All unclassified 112:Symantec's ThreatCon service no longer exists. 8: 103:Similar concepts in private-sector computing 63:must make sure their systems are secure. 225:CS1 maint: numeric names: authors list ( 215: 204: 7: 14: 24:information operations condition 1: 85:connections are disconnected. 259: 194:. DISA Policy and Guidance 243:Alert measurement systems 79:Computer Network Defense 116:has acquired Symantec. 214:Cite journal requires 58:Department of Defense 108:ThreatCon (Symantec) 42:levels. They are: 145:Attack (computing) 124:In the TV Series, 120:In popular culture 171:Threat (computer) 250: 230: 223: 217: 212: 210: 202: 200: 199: 193: 258: 257: 253: 252: 251: 249: 248: 247: 233: 232: 224: 213: 203: 197: 195: 191: 186: 184: 136: 122: 110: 105: 69:removable media 36: 17: 12: 11: 5: 256: 254: 246: 245: 235: 234: 216:|journal= 183: 180: 179: 178: 173: 168: 162: 157: 152: 147: 142: 135: 132: 121: 118: 109: 106: 104: 101: 100: 99: 93: 86: 72: 51: 35: 32: 15: 13: 10: 9: 6: 4: 3: 2: 255: 244: 241: 240: 238: 231: 228: 221: 208: 190: 181: 177: 174: 172: 169: 166: 163: 161: 158: 156: 153: 151: 148: 146: 143: 141: 138: 137: 133: 131: 129: 128: 119: 117: 115: 107: 102: 97: 94: 90: 87: 84: 80: 76: 73: 70: 66: 62: 59: 55: 52: 48: 45: 44: 43: 41: 33: 31: 29: 25: 21: 207:cite journal 196:. Retrieved 185: 125: 123: 111: 95: 92:implemented. 88: 74: 53: 46: 37: 23: 19: 18: 167:(THREATCON) 140:Alert state 50:protection. 34:Description 22:(short for 198:2009-09-27 182:References 96:INFOCON 1 89:INFOCON 2 75:INFOCON 3 71:is ideal. 61:end users 54:INFOCON 4 47:INFOCON 5 237:Category 176:WATCHCON 160:EMERGCON 134:See also 114:Broadcom 65:Internet 150:LERTCON 83:dial-up 20:INFOCON 155:DEFCON 127:Crisis 40:DEFCON 192:(PDF) 165:FPCON 28:FPCON 227:link 220:help 239:: 211:: 209:}} 205:{{ 229:) 222:) 218:( 201:.

Index

FPCON
DEFCON
Department of Defense
end users
Internet
removable media
Computer Network Defense
dial-up
Broadcom
Crisis
Alert state
Attack (computing)
LERTCON
DEFCON
EMERGCON
FPCON
Threat (computer)
WATCHCON
"Department of Defense (DOD) Information Operations Condition (INFOCON) System Procedures"
cite journal
help
link
Category
Alert measurement systems

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.