17D. Information Access, Cyber Security, and Mobility Flashcards
Disclosure of Record
To Other Federal Gov Agencies/Individuals:
- Authorized for routine use
- or authorized by a Privacy Act exception
To Other DOD Offices:
- Authorized for “an official need to know”
Personally Identifiable Information (PII) Breach
- Unauthorized users have access to PII for an unauthorized purpose
AFI 33-332
Title - Air Force Privacy & Civil Liberties Program
- Provides info/procedures for safeguarding and reporting of PII breaches
Records Request
- Approved/denied by 20 workdays
- Denials receive notification of appeal rights
DoDM 5400.07-R_AFMAN 33-302
- Provides specific policy/procedure on Freedom of Information Act and guidance on disclosing records to the public
Cybersecurity
- Protection of electronic communication systems, including information contained therein, to ensure it’s integrity
Components:
- AF risk management framework
- IT controls/countermeasures
- Communications security
- TEMPEST (emissions security)
- AF Assessment and authorization
- Workforce improvement program
AFI 17-130
Title - Cybersecurity Program Management
- Describes risk management and cybersecurity as representations of dynamic, multi-disciplinary sets of challenges
System of Records Notices
- Must be published in federal register by 30 days
5 Functions of Air Force Cybersecurity Program
- Protect
- Respond
- Recover
3 Steps Involved in Protecting Information Systems
- Infection
- Detection
- Protection
Privacy Act of 1974
- Governs the collection, maintenance, use, and dissemination of personal information
- Provides individuals with a means to access and amend their records
Communications Security
Components:
- Transmission security - protects compromising emanations (formerly known as emissions security)
- Physical security - prevents access by unauthorized persons
- Cryptosecurity
TEMPEST
- Deny compromising emanations within an inspectable space
Privacy Act Statement
- Must be given when individuals are asked to provide personal information
Privacy Act System of Records
- Information is retrieved by the individuals name, number, or unique identifier
Cybersecurity Program Risk Management Strategy
- Ensures the confidentiality, integrity, and availability of all info owed/trusted by AF
Information Assurance Awareness (IAA)
- Required training prior to computer system access
DoD 5500.07-R
AFI 10-701
Title - Joint Ethics Regulation
Title - Operations Security
- Governs the use of federal government resources when accessing internet-based capabilities
Information Systems Security Officer
- Maintains documented approval authority and inventory info on all approved devices