block 11 part 3 crypto/COMSEC Flashcards
what is COMSEC?
(communication security)
measures taken to deny unauthorized persons access to information (US GOV specific)
COMSEC protection results from applying security measures to communication and information systems generating, handling, storing, processing.
what is National Security Agency (NSA)?
prevents foreign adversaries from gaining classified national security information
Agency collects, processes, and disseminates intelligence information from foreign electronic signals for national foreign intelligence and
counterintelligence purposes and to support national and departmental operations.
what is Central Security Services (CSS)?
provides timely/accurate cryptologic support, knowledge, and assistance to the military cryptological community
CSS coordinates and develops policy and guidance on the SIGINT and IA
missions of NSA/CSS to ensure military integration
what is NIST (National Institute of Standards and Technologies)?
agency that promotes U.S. innovation/industrial competitiveness by advancing measurement
science, standards, and technology in ways that enhance economic security
approves techniques. Approved techs are asymmetric (public key) + symmetric (secret key)
CTG (cryptographic technology group) - work w/ cryptographic mechanisms like hashing algorithms, symmetric and asymmetric cryptographic techniques, key
management, authentication, and random number generation.
what is cryptographic security?
using cryptography to send messages/information that cannot be understood by enemies
cryptography (encryption) = (plain text) turned into (ciphertext) then back to original form by the person it was intended (cipher text - plain text) using a cryptographic algorithm and key (decryption)
relies on two components : an algorithm and crypto-key
what is a cryptographic key?
A parameter or numeric value used in conjunction with cryptographic algorithm that determines its operation
aka key variable
what is cryptanalysis?
science of deciphering a coded message without prior knowledge of the key
what is transmission security (transec)?
security control measures applied to prevent interception, disruption of reception, communications deception
deals with the security of
communication movement
deals with the transmission aspect of info/communications as opposed to the actual message/information
authorized TRANSEC methods include:
- implement radio signals
- change radio frequencies,
- cancel or alter communication patterns
- use frequency hopping systems
- use directional antennas
what is TEMPEST?
it’s aim is to limit
TEMPEST vulnerabilities are unintentionally emitted signals, or compromising emanations.
preventing compromise of emitted signals
technique - the RED/BLACK Separation concept.
what is key management infrastructure (KMI)?
(KOAM = KMI operating account manager)
usually wing level manager
- local point of contact for all matters COMSEC
- will adequately train and certify COMSEC Responsible Officers (CROs) to be responsible for smaller COMSEC sub-accounts that support a squadron or flight’s mission requirements
what does comsec responsible officer do? (CRO)
- administers physical security procedures for their responsible sub account(s),
- validating access to materials
- training/certifying all authorized COMSEC users
what are the 3 access requirements?
- the need to know (commander grants)
- proper security clearance
- proper identification
(need to be US citizen)
what are the 3 GSA (general services administration) security containers classifications ?
- top secret
approved class 5 container or class A vault)
TS material stored = alarmed areas + surveillance by armed guards - secret
(Class “B” vault (or Class “A” vault with TS)
can be equipped with a lock requiring a single combination. - confidential
stored in a secure room but can also be stored under the same safeguards as Top Secret or Secret COMSEC materials
any approved GSA container will have a Standard Form 702 (SF 702)
The SF 702 is used to record events such as who opened/closed the container, the time it was opened/closed, and who checked the container to ensure it was properly secured
what is two person integrity (TPI)?
required when dealing with Top Secret information and material.
TPI requires the presence of at least two authorized individuals who have both been briefed on TPI procedures and are capable of detecting incorrect or unauthorized security procedures concerning the
task being performed.
what is controlled cryptographic items (CCI)?
can be classified in one of two ways: keyed and unkeyed.
Keyed CCI will be protected at the highest classification of the key it contains.
Unkeyed CCI, are considered sensitive and should be stored in a secure place (such as a locked cabinet or locked desk).
what is the AF form 1109?
visitor register log
red or pink distinct badge
You would record the name, organization, and arrival and departure times of all individuals not named on the access list.