block 11 part 3 crypto/COMSEC Flashcards
(40 cards)
what is COMSEC?
(communication security)
measures taken to deny unauthorized persons access to information (US GOV specific)
COMSEC protection results from applying security measures to communication and information systems generating, handling, storing, processing.
what is National Security Agency (NSA)?
prevents foreign adversaries from gaining classified national security information
Agency collects, processes, and disseminates intelligence information from foreign electronic signals for national foreign intelligence and
counterintelligence purposes and to support national and departmental operations.
what is Central Security Services (CSS)?
provides timely/accurate cryptologic support, knowledge, and assistance to the military cryptological community
CSS coordinates and develops policy and guidance on the SIGINT and IA
missions of NSA/CSS to ensure military integration
what is NIST (National Institute of Standards and Technologies)?
agency that promotes U.S. innovation/industrial competitiveness by advancing measurement
science, standards, and technology in ways that enhance economic security
approves techniques. Approved techs are asymmetric (public key) + symmetric (secret key)
CTG (cryptographic technology group) - work w/ cryptographic mechanisms like hashing algorithms, symmetric and asymmetric cryptographic techniques, key
management, authentication, and random number generation.
what is cryptographic security?
using cryptography to send messages/information that cannot be understood by enemies
cryptography (encryption) = (plain text) turned into (ciphertext) then back to original form by the person it was intended (cipher text - plain text) using a cryptographic algorithm and key (decryption)
relies on two components : an algorithm and crypto-key
what is a cryptographic key?
A parameter or numeric value used in conjunction with cryptographic algorithm that determines its operation
aka key variable
what is cryptanalysis?
science of deciphering a coded message without prior knowledge of the key
what is transmission security (transec)?
security control measures applied to prevent interception, disruption of reception, communications deception
deals with the security of
communication movement
deals with the transmission aspect of info/communications as opposed to the actual message/information
authorized TRANSEC methods include:
- implement radio signals
- change radio frequencies,
- cancel or alter communication patterns
- use frequency hopping systems
- use directional antennas
what is TEMPEST?
it’s aim is to limit
TEMPEST vulnerabilities are unintentionally emitted signals, or compromising emanations.
preventing compromise of emitted signals
technique - the RED/BLACK Separation concept.
what is key management infrastructure (KMI)?
(KOAM = KMI operating account manager)
usually wing level manager
- local point of contact for all matters COMSEC
- will adequately train and certify COMSEC Responsible Officers (CROs) to be responsible for smaller COMSEC sub-accounts that support a squadron or flight’s mission requirements
what does comsec responsible officer do? (CRO)
- administers physical security procedures for their responsible sub account(s),
- validating access to materials
- training/certifying all authorized COMSEC users
what are the 3 access requirements?
- the need to know (commander grants)
- proper security clearance
- proper identification
(need to be US citizen)
what are the 3 GSA (general services administration) security containers classifications ?
- top secret
approved class 5 container or class A vault)
TS material stored = alarmed areas + surveillance by armed guards - secret
(Class “B” vault (or Class “A” vault with TS)
can be equipped with a lock requiring a single combination. - confidential
stored in a secure room but can also be stored under the same safeguards as Top Secret or Secret COMSEC materials
any approved GSA container will have a Standard Form 702 (SF 702)
The SF 702 is used to record events such as who opened/closed the container, the time it was opened/closed, and who checked the container to ensure it was properly secured
what is two person integrity (TPI)?
required when dealing with Top Secret information and material.
TPI requires the presence of at least two authorized individuals who have both been briefed on TPI procedures and are capable of detecting incorrect or unauthorized security procedures concerning the
task being performed.
what is controlled cryptographic items (CCI)?
can be classified in one of two ways: keyed and unkeyed.
Keyed CCI will be protected at the highest classification of the key it contains.
Unkeyed CCI, are considered sensitive and should be stored in a secure place (such as a locked cabinet or locked desk).
what is the AF form 1109?
visitor register log
red or pink distinct badge
You would record the name, organization, and arrival and departure times of all individuals not named on the access list.
what is AFCOMSEC Form 16?
is used to record daily, shift, or local inventories of accountable
COMSEC material.
- used to record any discrepancies noted during inventory
four areas recorded: short title, quantity, edition, registry number
what are accounting legend codes (ALC)?
used to identify the level of accountability of a particular COMSEC
item. The main ALCs are ALC-1, 2, 4, and 6.
ALC-1 : requires continuous
accountability from cradle to grave (creation to destruction). ALC-1
material must be inventoried every day the storage container (vault,
safe, etc.) is opened. The inventory will include the Short Title,
Edition, Registry (Reg) Number, and Quantity.
ALC-2: are generally cryptographic equipment or instruments used within the equipment. Unlike ALC-1, they are inventoried by short title and
quantity rather than accounting control number.
ALC-4: are generally publications
of some type (AFKAG-1, AFKAG-2, AFKAGs 11-16, etc.). ALC-4
material does not require continuous accountability as does ALC-1,
and ALC-2, material. No inventory is required unless the local
COMSEC Manager directs it.
ALC-6 Reserved for Electronic Keys
what is standard 701 form?
end of day checks
what is standard form 153?
COMSEC Material Report is used to report Inventory changes, Transfers, Destruction, and Hand receipts.
conditions of destruction of comsec material
there must be at least 2 people present + both need to sign standard form 153.
destroyed ASAP after aids have served their purpose
two types of unapproved destructions are
- premature: destruction occurs when material is destroyed without proper authority or is destroyed before the supersession date.
- Inadvertent : destruction occurs when material is destroyed by
accident.
what are the 3 conditions of destruction?
- routine destruction
is performed when classified material no longer serves a useful purpose (working files should be destroyed every 30 days)
3 most common methods used for destruction are burning, crosscut shredding, and pulverizing/pulping
- precautionary destruction
performed any time there is imminent danger of classified material being compromised when attack by an enemy force is probable - emergency destruction
destruction is more urgent. In all probability, it would become necessary in the face of an enemy attack
what are emergency action plans (EAPs)?
a plan for instances when rapid response or preventive compromise might be required.
classified ALC-1 or ALC-2 material must develop and maintain a current EAP to protect material during emergencies
consist of task cards only and must be coordinated with the base COMSEC manager
The commander must give the senior
person in the area the authority to activate the plan in case conditions prevent contact with the commander.
what is Secure Internet Protocol Routing (SIPR)?
Signals identified as Red Data are information that contains unencrypted sensitive or classified plain text information