17D. Information Access, Cyber Security, and Mobility Flashcards

1
Q

Disclosure of Record

A

To Other Federal Gov Agencies/Individuals:

  • Authorized for routine use
  • or authorized by a Privacy Act exception

To Other DOD Offices:
- Authorized for “an official need to know”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Personally Identifiable Information (PII) Breach

A
  • Unauthorized users have access to PII for an unauthorized purpose
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AFI 33-332

A

Title - Air Force Privacy & Civil Liberties Program

  • Provides info/procedures for safeguarding and reporting of PII breaches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Records Request

A
  • Approved/denied by 20 workdays

- Denials receive notification of appeal rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DoDM 5400.07-R_AFMAN 33-302

A
  • Provides specific policy/procedure on Freedom of Information Act and guidance on disclosing records to the public
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cybersecurity

A
  • Protection of electronic communication systems, including information contained therein, to ensure it’s integrity

Components:

  • AF risk management framework
  • IT controls/countermeasures
  • Communications security
  • TEMPEST (emissions security)
  • AF Assessment and authorization
  • Workforce improvement program
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AFI 17-130

A

Title - Cybersecurity Program Management

  • Describes risk management and cybersecurity as representations of dynamic, multi-disciplinary sets of challenges
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

System of Records Notices

A
  • Must be published in federal register by 30 days
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

5 Functions of Air Force Cybersecurity Program

A
  • Protect
  • Respond
  • Recover
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3 Steps Involved in Protecting Information Systems

A
  • Infection
  • Detection
  • Protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Privacy Act of 1974

A
  • Governs the collection, maintenance, use, and dissemination of personal information
  • Provides individuals with a means to access and amend their records
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Communications Security

A

Components:

  • Transmission security - protects compromising emanations (formerly known as emissions security)
  • Physical security - prevents access by unauthorized persons
  • Cryptosecurity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TEMPEST

A
  • Deny compromising emanations within an inspectable space
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Privacy Act Statement

A
  • Must be given when individuals are asked to provide personal information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Privacy Act System of Records

A
  • Information is retrieved by the individuals name, number, or unique identifier
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cybersecurity Program Risk Management Strategy

A
  • Ensures the confidentiality, integrity, and availability of all info owed/trusted by AF
17
Q

Information Assurance Awareness (IAA)

A
  • Required training prior to computer system access
18
Q

DoD 5500.07-R

AFI 10-701

A

Title - Joint Ethics Regulation
Title - Operations Security

  • Governs the use of federal government resources when accessing internet-based capabilities
19
Q

Information Systems Security Officer

A
  • Maintains documented approval authority and inventory info on all approved devices