7E Flashcards
Communications Security (COMSEC) is Cyber Security discipline outlined in AFI ____, Cybersecurity Program Management.
AFI 17-130
The objective of the _____ program is to ensure the employment of measures and controls taken to deny unauthorized persons information derived from information systems of the United States Government related to national security and to ensure the authenticity of such information systems.
COMSEC
What does COMSEC stand for?
Communications Security
COMSEC protection results from applying security measures (i.e., cryptosecurity and transmission security) to communications and information systems generating, handling, storing, processing, or using classified or sensitive government or government-derived information, the loss of which could adversely affect the national security interest. It also includes applying ____ security measures to COMSEC information or materials.
physical
______ is the conversion of data into a form that cannot be easily understood by unauthorized people. Converts plain-text (unencrypted) to cipher-text (encrypted).
Encryption
______ is the restoration of encrypted data to its original plain text or other readily usable state. Converts cipher-text (encrypted) to plain-text (unencrypted).
Decryption
_____ is the use of coding systems to encrypt and decrypt information.
Cryptography
_____ is the science of trying to break a coding system so that the information can be revealed to an unauthorized user.
Cryptoanalysis
Due to a wide variety of vulnerabilities, COMSEC has been subdivided into manageable components:
- Cryptosecurity
- Transmission Security (TRANSEC)
- Physical Security
The following describes which COMSEC components?
____ is the protection that results from the proper use of cryptographic systems. ____ includes not only creating a highly secure encryption system, but also using it properly.
Cryptosecurity
The ____ component under COMSEC is Transmission Security (TRANSEC).
second
_______ results from all measures designed to protect intentional transmissions from interception and exploitation by means other than crypto analysis.
TRANSEC
What does TRANSEC stand for?
Transmission Security
You have been practicing physical security all your life. When you leave home, you lock the doors and windows. The same goes for your car. When an uninvited stranger appears at your
door, you do not let them in without finding out who they are or what they want. These are aspects of ___ ___.
physical security
In COMSEC, physical security takes on additional threats that must
be addressed. These issues include…?
- improper destruction of waste
- improper handling
- unauthorized viewing or possession of COMSEC material