Chapter 18 - Security Flashcards
The purpose of __________________ is to reduce the vulnerability of Air Force missions by eliminating or reducing successful adversary collection and exploitation of critical information.
Operations Security
OPSEC
Is a process of identifying, analyzing, and controlling critical information that applies to all activities used to prepare, sustain, or employ forces during all phases of operations
Operations Security
OPSEC
Provides decision-makers with a means of weighing the risk to their operations
Operations Security Analysis
Is enhanced when commanders and other decision-makers apply operations security from the earliest stages of planning
Operational Effectiveness
Operations security principles must be integrated into________, _________, __________, _____________, ________________ to ensure a seamless transition to contingency operations
- Operational
- Support
- Exercise
- Acquisition planning
- Day-to-day activities
The operations security process consists of the following five distinct steps
- Identify critical information
- Analyze threats
- Analyze vulnerabilities
- Assess risk
- Apply appropriate operations security countermeasures
Are friendly, detectable actions and open-source information that can be interpreted or pieced together by an adversary to derive critical information
Operations Security Indicators
Is a characteristic of an indicator that is identifiable or stands out
Signature
In relation to OPSEC
Is the relationship of an indicator to other information or activities
Signature
In relation to OPSEC
Is used to map the local operating environment and capture process points that present key signatures and profiles with critical information value
Profiling Process
In relation to OPSEC
Is any difference observed between an activity’s standard profile and most recent or current actions
Contrasts
In relation to OPSEC
Refers to when and for how long an indicator is observed
Exposure
In relation to OPSEC
Is a subset of the Air Force security enterprise and consists of the core security disciplines (personnel, industrial, and information security) used to determine military, civilian, and contractor personnel eligibility to access classified information, ensure the protection of classified information released or disclosed to industry in connection with classified contracts, and protect classified information and controlled unclassified information that, if subject to unauthorized disclosure, could reasonably be expected to cause damage to national security
Information protection
Provide the guidance for managing classified information and controlled unclassified information
- DoD Manual 5200.01, Department of Defense Information Security Program
- AFI 16-1404, Air Force Information Security Program
Is designated accordingly to protect national security
Classified Information
Three levels of information classification
- Confidential
- Secret
- Top Secret
Shall be applied to information that the unauthorized disclosure of which reasonably could be expected to cause damage to the national security that the original classification authority is able to identify or describe
Confidential
Shall be applied to information that the unauthorized disclosure of which reasonably could be expected to cause “serious” damage to the national security that the original classification authority is able to identify or describe
Secret
Shall be applied to information that the unauthorized disclosure of which reasonably could be expected to cause “exceptionally grave” damage to the national security that the original classification authority is able to identify or describe
Top Secret
Is the most commonly used controlled unclassified information category. Is used as a dissemination control applied by the Department of Defense to unclassified information when disclosure to the public of that particular record, or portion thereof, would reasonably be expected to cause a foreseeable harm to an interest as identified in the Freedom of Information Act
For Official Use Only Information (FOUO)
Is information that requires access and distribution controls and protective measures, and may be referred to accordingly as: for official use only, law enforcement sensitive, Department of Defense unclassified controlled nuclear information, and limited distribution
Controlled Unclassified Information
Is the initial decision by an original classification authority that an item of information could reasonably be expected to cause identifiable or describable damage to the national security subjected to unauthorized disclosure and requires protection in the interest of national security
Original Classification
Is the incorporating, paraphrasing, restating, or generating classified information in a new form or document
Derivative Classification
All classified information shall be clearly identified by marking, designation, or electronic labelling in accordance with
DoD Manual 5200.01, Vol 2, Department of Defense Information Security Program: Marking of Classified Information
Every classified document must be marked to show the
Highest classification of information contained within the document
(In relation to Classification markings)
Are personally responsible for taking proper precautions to ensure unauthorized persons do not gain access to classified information
Everyone who works with classified information
Access to classified information
(1) security clearance eligibility
(2) a signed SF 312, Classified Information Non-Disclosure Agreement
(3) a need-to-know
Forms used to cover classified information outside of storage
- SF 705, Confidential
- SF 704, Secret
- SF 703, Top Secret
To record the end of the day security checks
SF 701, Activity Security Checklist