1.3-5 Information Security Flashcards
Physical Security
Storage Containers
At a minimum, any classified material shall be physically stored.
Secret - Continuous protection, inspected every 4 hours, or an intrusion detection system
Top Secret - Continuous protection, inspected every 2 hours, cypher lock
Information Security (INFOSEC)
System of policies, procedures, and requirements established to protect information.
Communications Security (COMSEC)
Protective measures taken to deny unauthorized persons information derived from telecommunications related to national security AND ensure the authenticity of such communications.
Operational Security (OPSEC)
Protect sensitive but unclassified information to ensure the success of a mission, operation, or activity.
Formal program that identifies and protects sensitive but unclassified information that ensures mission success.
Command Security Management
CO is responsible for the effective management of the Information Security Program (ISP) within the command
Security Manager
Principal advisor to the CO in all matters pertaining to classification, safeguarding, transmission and destruction of classified material
River City
Provides procedures to continuously control communication paths to/from ship/shore systems for the purpose of OPSEC and FPCON
Electronic Key Management System (EKMS)
Designed to automate the management of electronic key and other types of COMSEC material
EKMS Manager
Responsible for all actions associated with the receipt, handling, issue, safeguarding, accounting, and disposition of COMSEC material assigned to an EKMS account.
Reports to COMMO
Types of Cyber Incidents
Negligent Discharge of Cyber Material
Cross-Domain Violation
Cyber Event
Cyber Incident
Negligent Discharge of Cyber Material
Information released above the classification of the computer
Cross-Domain Violation
Connecting a computer to a network that is of a different classification
Cyber Event
Attempt to conduct malicious cyber attack at a command
Cyber Incident
Series of coordinated events designed to maliciously attack a command or the DoD
Unintentional Threats
Ignorance of users
Bad habits
Forgetting to update network security patches