Chapter 18 - Security Flashcards

1
Q

The purpose of __________________ is to reduce the vulnerability of Air Force missions by eliminating or reducing successful adversary collection and exploitation of critical information.

A

Operations Security

OPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is a process of identifying, analyzing, and controlling critical information that applies to all activities used to prepare, sustain, or employ forces during all phases of operations

A

Operations Security

OPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Provides decision-makers with a means of weighing the risk to their operations

A

Operations Security Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is enhanced when commanders and other decision-makers apply operations security from the earliest stages of planning

A

Operational Effectiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Operations security principles must be integrated into________, _________, __________, _____________, ________________ to ensure a seamless transition to contingency operations

A
  • Operational
  • Support
  • Exercise
  • Acquisition planning
  • Day-to-day activities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The operations security process consists of the following five distinct steps

A
  • Identify critical information
  • Analyze threats
  • Analyze vulnerabilities
  • Assess risk
  • Apply appropriate operations security countermeasures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Are friendly, detectable actions and open-source information that can be interpreted or pieced together by an adversary to derive critical information

A

Operations Security Indicators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is a characteristic of an indicator that is identifiable or stands out

A

Signature

In relation to OPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is the relationship of an indicator to other information or activities

A

Signature

In relation to OPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is used to map the local operating environment and capture process points that present key signatures and profiles with critical information value

A

Profiling Process

In relation to OPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is any difference observed between an activity’s standard profile and most recent or current actions

A

Contrasts

In relation to OPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Refers to when and for how long an indicator is observed

A

Exposure

In relation to OPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is a subset of the Air Force security enterprise and consists of the core security disciplines (personnel, industrial, and information security) used to determine military, civilian, and contractor personnel eligibility to access classified information, ensure the protection of classified information released or disclosed to industry in connection with classified contracts, and protect classified information and controlled unclassified information that, if subject to unauthorized disclosure, could reasonably be expected to cause damage to national security

A

Information protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Provide the guidance for managing classified information and controlled unclassified information

A
  • DoD Manual 5200.01, Department of Defense Information Security Program
  • AFI 16-1404, Air Force Information Security Program
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is designated accordingly to protect national security

A

Classified Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Three levels of information classification

A
  • Confidential
  • Secret
  • Top Secret
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Shall be applied to information that the unauthorized disclosure of which reasonably could be expected to cause damage to the national security that the original classification authority is able to identify or describe

A

Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Shall be applied to information that the unauthorized disclosure of which reasonably could be expected to cause “serious” damage to the national security that the original classification authority is able to identify or describe

A

Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Shall be applied to information that the unauthorized disclosure of which reasonably could be expected to cause “exceptionally grave” damage to the national security that the original classification authority is able to identify or describe

A

Top Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Is the most commonly used controlled unclassified information category. Is used as a dissemination control applied by the Department of Defense to unclassified information when disclosure to the public of that particular record, or portion thereof, would reasonably be expected to cause a foreseeable harm to an interest as identified in the Freedom of Information Act

A

For Official Use Only Information (FOUO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Is information that requires access and distribution controls and protective measures, and may be referred to accordingly as: for official use only, law enforcement sensitive, Department of Defense unclassified controlled nuclear information, and limited distribution

A

Controlled Unclassified Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Is the initial decision by an original classification authority that an item of information could reasonably be expected to cause identifiable or describable damage to the national security subjected to unauthorized disclosure and requires protection in the interest of national security

A

Original Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Is the incorporating, paraphrasing, restating, or generating classified information in a new form or document

A

Derivative Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

All classified information shall be clearly identified by marking, designation, or electronic labelling in accordance with

A

DoD Manual 5200.01, Vol 2, Department of Defense Information Security Program: Marking of Classified Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Every classified document must be marked to show the

A

Highest classification of information contained within the document
(In relation to Classification markings)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Are personally responsible for taking proper precautions to ensure unauthorized persons do not gain access to classified information

A

Everyone who works with classified information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Access to classified information

A

(1) security clearance eligibility
(2) a signed SF 312, Classified Information Non-Disclosure Agreement
(3) a need-to-know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Forms used to cover classified information outside of storage

A
  • SF 705, Confidential
  • SF 704, Secret
  • SF 703, Top Secret
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

To record the end of the day security checks

A

SF 701, Activity Security Checklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Anyone finding classified material out of proper control must take custody of and safeguard the material and immediately notify their

A

commander, supervisor, or security manager

In relation to classified material out of proper control

31
Q

Is a security incident involving failure to comply with requirements which cannot reasonably be expected to, and does not, result in the loss, suspected compromise, or compromise of classified information

A

Infraction

In relation to classified material

32
Q

Are security incidents that indicate knowing, willful negligence for security regulations, and result in, or could be expected to result in, the loss or compromise of classified information

A

Violation

In relation to classified material

33
Q

Is a security incident (violation) in which there is an unauthorized disclosure of classified information

A

Compromise

In relation to classified material

34
Q

Occurs when classified information cannot be physically located or accounted for

A

Loss

In relation to classified material

35
Q

Occur when classified data is introduced either onto an unclassified information system, to an information system with a lower level of classification, or to a system not accredited to process data of that restrictive category

A
Data Spills
(In relation to classified material)
36
Q

Is to identify, in classified contracts, specific information and sensitive resources that must be protected against compromise or loss while entrusted to industry

A

Industrial Security

Air Force Policy

37
Q

Entails policies and procedures that ensure military, civilian, and contractor personnel who access classified information or occupy a sensitive position are consistent with interests of national security

A

The Personnel Security Program

38
Q

Is the designated authority to grant, deny, and revoke security clearance eligibility using the Department of Defense 13 adjudicative guidelines, while applying the whole person concept and mitigating factors

A

The Department of Defense Central Adjudication Facility

39
Q

Establishes a code of fair information practices that govern the collection, maintenance, use, and dissemination of personal information about individuals that is maintained in a system of records by federal agencies

A

The Privacy Act of 1974

40
Q

Prohibits the disclosure of information from a system of records without the written consent of the subject individual

A

The Privacy Act

In relation to Disclosure of Information

41
Q

Limits the collection of information to what the law or executive orders authorize

A

The Privacy Act

In relation to information collection

42
Q

Is a group of any records under the control of any agency from which information is retrieved by the individual’s name, number, or unique identifier

A

Privacy Act

System of Records

43
Q

Must be safeguarded to ensure “an official need to know” access of the records and to avoid actions that could result in harm, embarrassment, or unfairness to the individual

A

Personally Identifiable Information

44
Q

Provides access to federal agency records (or parts of these records) except those protected from release by specific exemptions

A

The Freedom of Information Act

45
Q

The Freedom of Information Act imposes mandatory time limits of

A

20 workdays to either deny the request or release the requested records. The law permits an additional 10-workday extension in the event that specific unusual circumstances exist

46
Q

Is defined as the prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications systems, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation

A

Cybersecurity

47
Q

This strategy must ensure that the confidentiality, integrity, and availability of all information owned or held in trust by the Air Force is protected

A

Cybersecurity Program Risk Management Strategy

48
Q

The Air Force Cybersecurity Program encompasses the five functions

A
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover
    (In relation to CYBERSEC)
49
Q

Consists of measures and controls that ensure confidentiality, integrity, and availability of information systems assets including: hardware, software, firmware, and information being processed, stored, and communicated

A

Computer security

50
Q

Government-provided hardware and software are for

A
  • Official use

- Limited authorized personal use onl

51
Q

Is a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information.

A

Information Systems

52
Q

Is any action, device, procedure, or technique that meets or opposes (counters) a threat, vulnerability, or attack by eliminating, preventing, or minimizing damage, or by discovering and reporting the event so corrective action can be taken

A

Countermeasures

53
Q

Include, but are not limited to, any circumstance or event with the potential to adversely impact any operation or function through an information system via unauthorized access, destruction, disclosure, modification of information, or denial of service

A

Threats

54
Q

Three steps involved in protecting information systems from viruses

A
  • Infection
  • Detection
  • Reaction
55
Q

Are information systems, such as portable electronic devices, laptops, smartphones, and other handheld devices that can store data locally and access Air Force managed networks through mobile access capabilities

A

Mobile computing devices

56
Q

Refers to measures and controls taken to deny unauthorized persons information derived from information systems of the U.S. Government related to national security and to ensure the authenticity of such information systems

A

Communications Security

57
Q

Is a component of communications security resulting from the provision and proper use of technically sound cryptosystems

A

Cryptosecurity

58
Q

Is a component of communications security resulting from the application of measures designed to protect transmissions from interception and exploitation by means other than cryptoanalysis

A

Transmission Security

59
Q

Is communications security resulting from the use of all physical measures necessary to safeguard communications security material from access by unauthorized persons

A

Physical Security

60
Q

Formerly known as emissions security, is protection resulting from all measures taken to deny unauthorized persons information of value that may be derived from the interception and analysis of compromising emanations from cryptographic equipment, information systems, and telecommunications systems

A

TEMPEST

61
Q

Are responsible for ensuring the timely collection processing, analysis, production, and dissemination of foreign intelligence, current intelligence, and national-level intelligence information concerning terrorist activities, terrorist organizations, and force protection issues

A
  • Deputy Chief of Staff for Intelligence, Surveillance and Reconnaissance (Air Force/A2)
  • Director for Intelligence, Surveillance, and Reconnaissance Strategy, Doctrine and Force Development (Air Force/A2D)
62
Q

Is the lead Air Force agency for collection, investigation, analysis, and response for threats arising from terrorists, criminal activity, foreign intelligence, and security services

A

Air Force Office of Special Investigations (AFOSI)

63
Q

A terrorism threat assessment requires

A

The identification of a full range of known or estimated terrorist threat capabilities (including the use or threat of use of chemical, biological, radiological, nuclear, or high-yield explosives and weapons of mass destruction)

64
Q

At least annually, commanders conduct

A

Comprehensive field and staff training to exercise antiterrorism plans, to include antiterrorism physical security measures, continuity of operations, critical asset risk management, and emergency management plans

65
Q

Shall develop and implement a random antiterrorism measures program that will include all units on the installation

A

Installation commanders

66
Q

Introduce uncertainty to an installation’s overall force protection program to defeat surveillance attempts and to make random antiterrorism measures difficult for a terrorist to accurately predict our actions

A

Random antiterrorism measures

67
Q

Suspicious Packages or Mail

A

Unusual or unknown place of origin; no return address; excessive amount of postage; abnormal size or shape; protruding strings; aluminum foil; wires; misspelled words; differing return address and postmark; handwritten labels; unusual odor; unusual or unbalanced weight; springiness in the top or bottom; inflexibility; crease marks; discoloration or oily stains; incorrect titles or title with no name; excessive security material; ticking, beeping, or other sounds; or special instruction markings, such as “personal, rush, do not delay, or confidential” on any packages or mail received

68
Q

Is a category of intelligence derived from information collected and provided by human sources and collectors, and where the human being is the primary collection instrument

A

Human intelligence

69
Q

Is the systematic effort to procure information to answer specific collection requirements by direct and indirect questioning techniques of a person who is in the custody of the forces conducting the questioning

A

Interrogation

70
Q

Is the process of questioning cooperating human sources to satisfy intelligence requirements, consistent with applicable law

A

Debriefing

71
Q

Human Intelligence Threat Areas

A
  • Espionage
  • Subversion
  • Sabotage
  • Terrorism
72
Q

Is defined as any exchange of information directed to an individual, including solicited or unsolicited telephone calls, e-mail, radio contact, and face-to-face meetings

A

Contact

In relation to intelligence

73
Q

Armed Forces have a special obligation to report information regarding the safety and protection of the U.S. President or anyone else anyone under the protection of the U.S. Secret Service

A

AFI 71-101, Volume 2, Protective Service Matters