Block 8 Flashcards
Official information is broken down into what two categories?
Classified and Unclassified
This is information that is owned by, produced for or by, or is subject to the control of the United States government and supporting agencies
Official Information
What are the 3 levels of classified information?
Top secret
Secret
Confidential
This type of classified information could cause exceptionally grave damage to the national security of it were to fall into the wrong hands.
Top Secret
This is type of classified is any information and material that is expected to cause “damage” or Identifiable damage to national security of revealed to our enemies
Confidential
This is a classified type and can cause a serious level of damage to national security if revealed to our enemies
Secret
What are the 3 types of unclassified information ?
FOUO
Privacy Act (PA)
Critical Information (CI)
This falls under unclassified and is information that requires minimum safeguards to prevent widespread distribution to the public
Also referred to as sensitive but unclassified information (SBU)
FOUO
This is an example of unclassified and it is made in 1974
And some examples are DOB, Social security number, name , etc.
Privacy act (PA)
This falls under unclassified and it is any information providing clues in regard to US and friendly forces activities, capabilities, intentions , or limitations that an adversary might need to gain a military, diplomatic or technological advantage.
Critical Information (CI)
This refers to measures and controls taken to deny unauthorized persons information derived from information systems of the United States Government related to national security and to ensure the authenticity of such information systems.
COMSEC
What are the four sections under COMSEC?
Transec
Cryptosec
Emsec
Physical security
This is a component of COMSEC resulting from the application of measures designed to protect transmissions from interception and exploitation by means other than cryptanalysis or complex code breaking techniques used to review encrypted information.
Example:
Change radio frequencies
Implement radio silence
Use directional antennas
Transec
The component of COMSEC resulting from the provision and proper use of technically sound crypto systems is called what?
CRYPTOSEC
This subcategory of COMSEC determines protective measures that will deny unauthorized personnel access to classified and in some instances unclassified information and intelligence that might be derived from the interception and analysis of unintentionally emitted electrical signals from systems processing this information
EMSEC
This is another part of COMSEC that results from using all physical measures necessary to safeguard COMSEC material from access by unauthorized persons
Physical security
This is the transformation of plaintext into ciphertext and then recovering the plaintext data from its ciphertext form
Cryptography
Cryptography relies on what two basic components?
Algorithm and a Crypto-key
This is turning ordinary data plaintext into coded form Ciphertext.
Encryption
Turning ciphertext back into plaintext
Decryption
This is the mathematical function or formula used in encryption and decryption
Algorithm
This is also known as a key variable,is the parameter or numeric value used in encryption and decryption
Crypto-key
This is the act or science of deciphering a code or coded message without a prior knowledge of the key.
Cryptanalysis
Points in the program where people break the security provided.
Vulnerabilities
Actual or perceived actions that may cause harm to information or equipment
Threat
What are the two basic types of approved cryptographic systems?
Secret key and public-key systems