Block 8 Flashcards
Official information is broken down into what two categories?
Classified and Unclassified
This is information that is owned by, produced for or by, or is subject to the control of the United States government and supporting agencies
Official Information
What are the 3 levels of classified information?
Top secret
Secret
Confidential
This type of classified information could cause exceptionally grave damage to the national security of it were to fall into the wrong hands.
Top Secret
This is type of classified is any information and material that is expected to cause “damage” or Identifiable damage to national security of revealed to our enemies
Confidential
This is a classified type and can cause a serious level of damage to national security if revealed to our enemies
Secret
What are the 3 types of unclassified information ?
FOUO
Privacy Act (PA)
Critical Information (CI)
This falls under unclassified and is information that requires minimum safeguards to prevent widespread distribution to the public
Also referred to as sensitive but unclassified information (SBU)
FOUO
This is an example of unclassified and it is made in 1974
And some examples are DOB, Social security number, name , etc.
Privacy act (PA)
This falls under unclassified and it is any information providing clues in regard to US and friendly forces activities, capabilities, intentions , or limitations that an adversary might need to gain a military, diplomatic or technological advantage.
Critical Information (CI)
This refers to measures and controls taken to deny unauthorized persons information derived from information systems of the United States Government related to national security and to ensure the authenticity of such information systems.
COMSEC
What are the four sections under COMSEC?
Transec
Cryptosec
Emsec
Physical security
This is a component of COMSEC resulting from the application of measures designed to protect transmissions from interception and exploitation by means other than cryptanalysis or complex code breaking techniques used to review encrypted information.
Example:
Change radio frequencies
Implement radio silence
Use directional antennas
Transec
The component of COMSEC resulting from the provision and proper use of technically sound crypto systems is called what?
CRYPTOSEC
This subcategory of COMSEC determines protective measures that will deny unauthorized personnel access to classified and in some instances unclassified information and intelligence that might be derived from the interception and analysis of unintentionally emitted electrical signals from systems processing this information
EMSEC
This is another part of COMSEC that results from using all physical measures necessary to safeguard COMSEC material from access by unauthorized persons
Physical security
This is the transformation of plaintext into ciphertext and then recovering the plaintext data from its ciphertext form
Cryptography
Cryptography relies on what two basic components?
Algorithm and a Crypto-key
This is turning ordinary data plaintext into coded form Ciphertext.
Encryption
Turning ciphertext back into plaintext
Decryption
This is the mathematical function or formula used in encryption and decryption
Algorithm
This is also known as a key variable,is the parameter or numeric value used in encryption and decryption
Crypto-key
This is the act or science of deciphering a code or coded message without a prior knowledge of the key.
Cryptanalysis
Points in the program where people break the security provided.
Vulnerabilities
Actual or perceived actions that may cause harm to information or equipment
Threat
What are the two basic types of approved cryptographic systems?
Secret key and public-key systems
The system is also called secret key cryptography because an identical copy of keys is used in the cryptography process.
The symmetric key system
This is also called public-key cryptography
Asymmetric key system
This concept allows for a very secure means of telecommunications and is approved by the NSA for classified use
Symmetric (secret-key)
This cipher operates encrypting/decrypting one chunk of data at a time and is the MOST COMMON type of symmetric algorithm
Block ciphers
This symmetric algorithm cipher encrypts/decrypts varying links of data in a continuous stream.
Stream ciphers
This is a publicly known block cipher cryptographic algorithm that converts plaintext into ciphertext using a key that consist of 64 binary digits
It is considered unsecure an insufficient for classified use
Data encryption standard(DES)
This block cipher secret key algorithm was developed by the private sector as a countermeasure the shortfalls of DES
More secure than DES
Triple data encryption standard(3DES)
This block cipher algorithm and Encrpts the message, but the key to encrypt the message is itself encrypted with a key combined with two escrowed keys
Widely used in Fortezza card technology for voice encryption systems
SKIPJACK
This is a replacement for the unsecured DES made by the national Institute of standards and technology(NIST)
Advanced encryption standard(AES)
This key system uses two different keys a public-key for encryption and a private key for decryption
Asymmetric(Public-Key systems)
These systems secure data transmission to and from various types of terminal equipment such as desktop computers,servers, teletypes and etc.
Data encryption systems
What are some hardware devices approved by NSA for securing classified data?
KG-84(A)
KG-84C
KIV-7
What are some examples of encryption systems commonly used to secure classified voice transmissions?
KY-57
KY-58
KY-68
Secure terminal equipment (STE)
This encryption system is also known as trunk encryption devices or TEDs and are designed to encrypt and decrypt a trunk.
Bulk encryption systems
What are some examples of bulk encryption devices ?
KG-194
KIV-19
KG-175
These systems are employed to ensure secure, network-centric connections over satellite, WANs,Broadband,Dial-up, and wireless networks
Network encryption
What is the most common network encryption system used ?
KG-250 IP network encryptor
What are the 3 roles in COMSEC program management?
COMSEC Manager
COMSEC Responsible officer
COMSEC authorized user
This is information that must be safeguarded in the interest of national defense.
Classified information
This is the wing level manager for COMSEC
COMSEC manager
Subordinate to the COMSEC manager and is the squadron or flight liaisons between the users and the COMSEC manager
COMSEC responsible officer
What are the access requirements to gain unrestricted access to areas containing COMSEC materials ?
Need to know
Proper security clearance
Proper identification
These are areas or facilities containing military resources which could be targets for theft compromise or destruction into which entry must be limited in order to provide protection
Example Keesler Air Force Base
Controlled area
These are any areas under military jurisdiction in which special security measures are employed to prevent unauthorized entry
Example: the flightline
Restricted area
This is a restricted area room or group of rooms buildings or insulation where sensitive compartmented information(SCI) may be stored used discussed or electronically processed
Sensitive compartmented information facility
SCIF
This organization was formed to Provide continuity in the protection of classified items
General services administration
GSA
What is the top secret vault comprised of and what is The name of the vault?
A duel combo and two-person integrity and it is called a class A vault
Secret material must be stored in what type of class vault ?
Class B volt or higher
And use a single combination
KIV-7HS is used for what type of encryption?
Data
A GSA container will have what form attached to it ?
Standard form 702
SF702
When are lock combinations changed?
For combination locks it’s annually for cipher locks it’s monthly
also when a person who knows the combination no longer requires access to the container , container certified as locked just found open the combination is compromised and any repair work has been performed on the lock
This form is used to record daily,shift or local inventories of accountable COMSEC material
Used for inventory checklist
AFCOMSEC Form 16
These are used identify the level of accountability of a particular COMSEC item.
Accounting legend codes
ALCs
What does ALC-1 inventory include?
Short title, edition, registry number, and quantity
What does ALC-2 get inventoried by what two things?
Short title and quantity
True or false: no inventory is required for the ALC-4 unless the local COMSPEC manager directs it
True
What is ALC-6 reserved for?
Electronic keys
How many personnel are required when posting amendments?
2
The first person as the new pages then checks the removed pages against the amended instructions to make sure that the only obsolete pages are removed and then records the change on the record of amendments page in the basic document
The second person checks the pages of the basic documents against the current list of effective pages and records the check on the record page of checks page in the basic document
What form is used for COMSEC destruction reports?
Standard form 153
This type of destruction occurs when material is destroyed without proper authority or was destroyed before the supersession date
Premature destruction
This type of destruction occurs whens material are destroyed by accident
Inadvertent destruction