Information Operations Condition

Information Operations Condition

Information Operations Condition (INFOCON) is a threat level system in the United States similar to that of FPCON. INFOCON is a defense system based primarily on the status of information systems and is a method used by the military to defend against a computer network attack.

Descriptions of INFOCONs

There are five levels of INFOCON, which recently changed to more closely correlate to DEFCON levels. They are:

*INFOCON 5 describes a situation where there is no apparent hostile activity against computer networks. Operational performance of all information systems is monitored, and password systems are used as a layer of protection.

*INFOCON 4 describes an increased risk of attack. Increased monitoring of all network activities is mandated, and all Department of Defense end users must make sure their systems are secure. Internet usage may be restricted to government sites only, and backing up files to removable media is ideal.

*INFOCON 3 describes when a risk has been identified. Security review on important systems is a priority, and the Computer Network Defense system's alertness is increased. All unclassified dial-up connections are disconnected.

*INFOCON 2 describes when an attack has taken place but the Computer Network Defense system is not at its highest alertness. Non-essential networks may be taken offline, and alternate methods of communication may be implemented.

*INFOCON 1 describes when attacks are taking place and the Computer Network Defense system is at maximum alertness. Any compromised systems are isolated from the rest of the network.

imilar concepts in private-sector computing

ThreatCon (Symantec)

In computer science, ThreatCon is a system used by computer security company Symantec in order to assess how dangerous a software or networking exploit is to the global internet and communications network. There are four levels of ThreatCon in this manner:

*Level 1/4 describes a situation where there are no threats of malicious coding or exploits that can affect the global network. The only precautions needed are basic security systems that can detect and remove simple bugs that are of no serious threat.

*Level 2/4 describes a situation where an exploit of moderate concern is apparent and exposed systems may be vulnerable. Updating security software with new virus definitions is a priority.

*Level 3/4 describes a situation where a known threat is either imminent or starting to affect the global network. Updating virus definitions and rules is a must, and increased monitoring is necessary as well, as well as reconfiguring security and firewall settings.

*Level 4/4 describes a situation where a known threat in the form of malicious coding or an exploit is currently underway and is heavily affecting the global network. Taking measures against a threat of this level will most likely affect and cause hardships for the global computing infrastructure.

ee also

* LERTCON
* DEFCON
* EMERGCON
* FPCON (THREATCON)
* WATCHCON
* Alert state

References

cite paper
author = Strategic Command Directive (SD) 527-1
title = Department of Defense (DOD) Information Operations Condition (INFOCON) System Procedures
publisher = Space and Naval Warfare (SPAWAR) Systems Center Charleston | date = 2006-01-27
url = https://infosec.navy.mil/pub/docs/documents/dod/dodd/stratcom_d527-011_infocon_20060127.pdf
format = PDF | accessdate=2006-11-23


Wikimedia Foundation. 2010.

Look at other dictionaries:

  • Operations order — An Operations Order, often abbreviated as OPORD, is an executable plan that directs a unit to conduct a military operation. An Operations Order will describe the situation facing the unit, the mission of the unit, and what activities the unit… …   Wikipedia

  • Condition-based maintenance — (CBM), shortly described, is maintenance when need arises. This maintenance is performed after one or more indicators show that equipment is going to fail or that equipment performance is deteriorating. Condition based maintenance was introduced… …   Wikipedia

  • Condition Red (comics) — Condition Red Publication information Publisher Wildstorm F …   Wikipedia

  • Information Technology Infrastructure Library — The Information Technology Infrastructure Library (I), is a set of good practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. In its current form (known as ITILv3 and ITIL 2011 edition), ITIL… …   Wikipedia

  • Information technology controls — In business and accounting, Information technology controls (or IT controls) are specific activities performed by persons or systems designed to ensure that business objectives are met. They are a subset of an enterprise s internal control. IT… …   Wikipedia

  • Condition de Murgenthal — Correction des eaux du Jura Localisation de la région : en rouge les canaux créés dans le cadre de la correction. La correction des eaux du Jura est une vaste entreprise d aménagements hydrauliques réalisée en Suisse dans la région des trois …   Wikipédia en Français

  • Force Protection Condition — In United States security, Force Protection Condition (FPCON for short) is a terrorist threat system overseen by the Department of Defense directive, and describes the amount of measures needed to be taken by security agencies in response to… …   Wikipedia

  • Théâtre d'opérations — Théâtre militaire Pour les articles homonymes, voir Théâtre (homonymie). Un théâtre militaire est, dans le jargon militaire, un lieu géographique délimité où se déroule un conflit armé qui implique au moins deux adversaires. Le terme n est pas… …   Wikipédia en Français

  • Théâtre des opérations — Théâtre militaire Pour les articles homonymes, voir Théâtre (homonymie). Un théâtre militaire est, dans le jargon militaire, un lieu géographique délimité où se déroule un conflit armé qui implique au moins deux adversaires. Le terme n est pas… …   Wikipédia en Français

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”