7A Flashcards
___ ___ compliance ensures appropriate implementation of measures to protect all Air Force information system resources and information
Computer Security (COMPUSEC)
The focus of COMPUSEC is on end-point security and ports, protocols, and services management ___ ___ ___.
within the AF
The COMPUSEC objective is to employ countermeasures designed for the protection of __, ___ and ___ of United States government information processed by Air Force ISs.
confidentiality, integrity and availability
COMPUSEC includes all measures to ____ ISs and information against sabotage, tampering, denial of service, espionage, fraud, misappropriation, misuse, or release to unauthorized persons.
safeguard
Air Force Manual (AFMAN) ____, Computer Security (COMPUSEC) is the publication that implements the AF COMPUSEC program.
AFMAN 17-1301
COMPUSEC applies to __ __ ___ __ used to process, store, display, transmit, or protect AF information, regardless of classification or sensitivity, unless exempted through the risk management framework process.
all AF information technology
As an information technology professional, you work to achieve the fundamental goals of information security. Those fundamental goals are confidentiality, integrity, and availability— collectively termed
the __ ___ (not to be confused with the Central Intelligence Agency).
CIA Triad
One of the goals of information security is to ensure _____ such that only authorized persons can gain access to information and are able to read the information.
confidentiality
Which technologies keep information confidential?
- Access Control/Permissions
- Encryption
- Steganography
The following describes which technology that keeps information confidential?
Most network administrators secure information on the organization’s network by implementing permissions on the files and folders. This is known as building an access control list (ACL) on the files because the network administrator is controlling who can access the files. By setting permissions on the files and allowing only a specific group of users access to the files, you are helping to maintain confidentiality.
Access Control/Permissions
The following describes which technology that keeps information confidential?
____ data puts the information in an unreadable format until an authorized person decrypts the data, which places it back in a readable format.
Encryption
The following describes which technology that keeps information confidential?
___ is a method of hiding information, such as a text file, in a graphic file. The information is placed in the graphic file using a program, and a password is placed on the file. After sending the graphic to the intended receiver, the intended receiver would use the ___ application to read the information out of the file.
Steganography
Files can be encrypted at two levels—either encrypt the file in ___ or encrypt the file while it is in ____ from one location to another.
storage
transit
The concept of ___ ___ (not to be confused with personal integrity, or ethics) is to ensure that when data is sent from a source to a destination, the information received at the destination has not been altered in transit. ___ ___ also means that if you store a file on a storage drive and open it later, you can be certain that the data has not been altered while in storage.
data integrity
What four things fall under integrity?
- Hashing
- Digital Signature
- Digital Certificate
- Nonrepudiation