12.07.2015 Views

JP 1-02, DOD Dictionary of Military and Associated Terms - DMRTI ...

JP 1-02, DOD Dictionary of Military and Associated Terms - DMRTI ...

JP 1-02, DOD Dictionary of Military and Associated Terms - DMRTI ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

As Amended Through 15 March 2012component — 1. One <strong>of</strong> the subordinate organizations that constitute a joint force.Normally a joint force is organized with a combination <strong>of</strong> Service <strong>and</strong> functionalcomponents. (<strong>JP</strong> 1) 2. In logistics, a part or combination <strong>of</strong> parts having a specificfunction, which can be installed or replaced only as an entity. (<strong>JP</strong> 4-0) Also calledCOMP. See also functional component comm<strong>and</strong>; Service component comm<strong>and</strong>.component-owned container — A 20- or 40-foot International Organization forSt<strong>and</strong>ardization container procured <strong>and</strong> owned by a single Department <strong>of</strong> Defensecomponent. May be either on an individual unit property book or contained within acomponent pool (e.g., Marine Corps maritime pre-positioning force containers). Maybe temporarily assigned to the Department <strong>of</strong> Defense common-use container system.Also called Service-unique container. See also common-use container. (<strong>JP</strong> 4-09)composite warfare comm<strong>and</strong>er — An <strong>of</strong>ficer to whom the <strong>of</strong>ficer in tactical comm<strong>and</strong> <strong>of</strong>a naval task organization may delegate authority to conduct some or all <strong>of</strong> the <strong>of</strong>fensive<strong>and</strong> defensive functions <strong>of</strong> the force. Also called CWC. (<strong>JP</strong> 3-<strong>02</strong>)compromise — The known or suspected exposure <strong>of</strong> cl<strong>and</strong>estine personnel, installations, orother assets or <strong>of</strong> classified information or material, to an unauthorized person. (<strong>JP</strong> 2-01.2)compromised — A term applied to classified matter, knowledge <strong>of</strong> which has, in whole orin part, passed to an unauthorized person or persons, or which has been subject to risk<strong>of</strong> such passing. (<strong>JP</strong> 2-01.2)computer intrusion — An incident <strong>of</strong> unauthorized access to data or an automatedinformation system.computer intrusion detection — The process <strong>of</strong> identifying that a computer intrusion hasbeen attempted, is occurring, or has occurred.computer network attack — Actions taken through the use <strong>of</strong> computer networks todisrupt, deny, degrade, or destroy information resident in computers <strong>and</strong> computernetworks, or the computers <strong>and</strong> networks themselves. Also called CNA. See alsocomputer network defense; computer network exploitation; computer networkoperations. (<strong>JP</strong> 3-13)computer network defense — Actions taken to protect, monitor, analyze, detect, <strong>and</strong>respond to unauthorized activity within the Department <strong>of</strong> Defense information systems<strong>and</strong> computer networks. Also called CND. See also computer network attack;computer network exploitation; computer network operations. (<strong>JP</strong> 6-0)computer network exploitation — Enabling operations <strong>and</strong> intelligence collectioncapabilities conducted through the use <strong>of</strong> computer networks to gather data from targetor adversary automated information systems or networks. Also called CNE. See alsocomputer network attack; computer network defense; computer networkoperations. (<strong>JP</strong> 3-13)<strong>JP</strong> 1-<strong>02</strong> 65

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!