3D1X1 Volume 3 Chap 2 Flashcards
What is symmetric systems and the advantages
It’s a secret key and has great speed but the key can be compromised during transmission
What is Asymmetric systems and advantages and what is public and private keys
They are two keys public and private but they used a lot of time to decrypt long message … Public key is used for encryption and private key is used for decryption
Authentication
Verifies your identity message origin and content
Certificates
Digitally signed data structures that bind the identity of the cert holder to a public key
Public key infrastructure (PKI)
A set of hardware, software, policies, and procedures used by CAs to create, manage, store, distribute, and revoke digital certificates
Repositories
Online facilities where CAs post certificates and certificate statues info
Secure socket later (SSL)
Internet protocol that allows protocols like http FTP and telnet
What is 3DES
Uses 3 algorithms … E individual keys
What is Skipjack
Symmetric encryption/decryption that users 80 bit key
What is AES and what did it replace
It replace DES as the government standard in 2002 because it uses 128 bit 192 bit and 256 bit key lengths
What is COMSEC
Deny unauthorized persons information derived from information systems of the U.S. Government related to national security and ensure the authenticity of these information systems
What form is used for COMSEC package and how many?
SF 153 COMSEC Material Report and 3 of these forms
What is SF 702?
Security container check sheet … Annotates opening and closing of the secure container
What is AF Form 1109?
Visitor register log which is used to record visitors into restricted areas
What is the security core of the STE
KOV-14 (Fortezza card)
What’s the difference between PSTN AND ISDN?
PSTN - is a standard telephone line
ISDN - is a high speed digital line capable of sending data at 128 Kpbs
What can be removed from the KIV-7 cryptographic device ?
Cryptographic ignition key (CIK) and prevents unauthorized access and protects all internally stored keys and has the highest classification level of the keying material
How many TACLANE ARE THERE?
TACLANE Classic
TACLANE -E100
KG-175D TACLANE micro
What is the KOI-18 general purpose tape reader
A hand held paper tape reader fill device for loading crypt keys into security devices. It can read 8 lever paper or polyester tape and is battery powered with no internal memory and loads different key lengths like 128 keys
Integrated maintenance day system (IMDS)
Used for tracking purposes and uses REMIS permits base level logistics data to be rolled up to the AF level
What is Asset inventory management (AIM)
Part of AFEMS and is used for tracking purposes
What is AFI 33-119
Guidance for messaging email accounts etc