Crypto Devices Flashcards
What are HJ times?
Bio grams wich tells us when to change crypto.
Does kyk13 store HJ times and short titles?
No fills only
Protocol to send a fill SKL - KYK13?
DS102 (smart to dumb)
Protocol to send a fill CYZ10 - SKL?
DS101 (dumb to smart)
Name security threats/methods with a brief description?
Imint - info gained from aerial recon flights and sat platforms
Sigint - used to describe communication intelligence
Comint - exploitation of electromagnetic transmissions and electronic int
Humint - includes patrol reports, interrogation, espionage and loose talk
Loss or compromise - theft, loss, destruction, disclosure or modification of government assets
Name principle sources of information?
Surveillance and reconnaissance Radio and communications Non comms emissions Document and information technology system Loose talk Discussions/brief Private correspondence Private telephone calls The media The Internet Civilians
Main threads to security and explain?
Espionage - obtaining info about organisation or a society that is considered secret or confidential without permission of the holder of the information
Sabotage - deliberate action aimed at weakening on enemy, oppressor or employer through subversion, obstruction disruption and/on destruction
Subversion - action designed to weaken the military, economic or political strength of a nation by undermining the morale loyalty or reliability of its citizens
Terrorism - unlawful use of or threatened use of force or violence against individuals or property to coerce or intimate government or societies, often to achieve political, religious or ideological objectives
Non traditional - events such as natural disasters, or actions by investigative journalists, criminals, disaffected or dishonest staff computer hackers and viruses
Four common causes to security breaches?
Handling
Custody
Access
Discussion
Name the 3 veting States?
Bc
Sc
Dv
When should you change combination?
1st brought into service Any one with access leaves or no longer requires access Intervals no longer than six months After any form of repairs by a locksmith After any inspection on the locks Suspected compromise
Name four ways of destruction?
Incineration
Shredding
Wet pulping
Mechanical disintegration
What does USO stand for and who does he report to?
Unit security officer and reports to the commanding officer
What is the action of loss of a classified document?
Conduct a thorough search up to a hour
Inform USO
extend the search
What are the action of compromise ?
100% check of contents
Inform the USO
Change the combination
What does TEMPEST stand for?
Transient Electromagnetic Pulse Emanation Standard
-unintentional radiation of intelligence bearing signals
Name 3 crypto statuses?
Current
Reserve
Superseded
What form do you use to account for your crypto?
MOD 371
What do you need to do before a road move with crypto?
Get authorisation from CDA Hereford
Be in possession of courier and escort documents
Have a locked container possibly bolted down
2 people in the vehicle (one person must be crypto authorised)
Never leave vehicle unattended
How many fills does a kyk take?
6
How many fills can a crazy 10 hold?
1000
How long do you have to replace a battery in a crazy10?
30 sec
When starting up a crazy 10 you get a cold boot, what does this mean?
Zeroised and you have to re initialise the CIK
What does the green light on top the SKL mean?
The kov 21 card is logged in or faulty
How many fills does a SKL hold?
500 000
SKL power source must be replaced within ?
2min
What’s the battery life of the SKL?
Standard battery - 50 h
Extended battery - 100h
What are the battery life’s for the crazy 10?
33v battery
19v battery
3*3v battery - 6months
1*9v battery - 3months
What is the correct closing down roc endure of the SKL?
File, save database, file, exit, session, log out, power button
What does the following stand for? KV's KEK OTAD OTAR TEK TSK
Key variables Key encryption key Over the air distribution Over the air rekeying Traffic encryption kv Transec variable
WHAT SEPARATES THE RED FROM THE BLACK DATA ON THE SKL?
Kov 21 card
WHAT IS THE CES OF THE SKL (9 ITEMS)?
AN-PYQ 10 STANDARD BATTERY HEAVY DUTY BATTERY CHARGER PSU 2 X KETTLE LEADS, UK & US FILL LEAD QUICK REFERENCE GUIDE STANDARD USB TO MINI USB CONVERTER
What is the classification of a ledger if the items are classified below SECRET?
Restricted
What is the MOD name for the register of Crypto items?
MOD Form 1728
Name the two types of Crypto compromises?
Physical and Crypto
What must we never do to the SKL?
Carry out a card self-test, never reset the card, never just turn it off
What access does DV give the holder?
FREQUENT AND UNCONTROLLED ACCESS TO ASSETS MARKED TOP SECRET
Name four aspects of physical security.
FENCES, LIGHTING, GUARDS, GATE CONTROL, ACCESS CONTROL, KEEP AREAS, STRONG ROOMS
What must we be logged in as to set the date and time on the PYQ- 10?
SSO
What are the Crypto short titles for Brent, MBITR and SKL?
BID/2010/1, AN PRC 148, AN PYQ 10
WHAT INFORMATION SHOULD BE WRITTEN ON THE SIDE OF A KYK13
Short title only
WHAT CLASIFICATION OF KEYS CAN THE CYZ 10 HOLD?
UP TO TOP SECRET
WITHIN WHAT TIMEFRAME SHOULD EXPIRED KEYMAT/FILLS BE DESTROYED/DELETED?
72 hrs
BEFORE ISSUING OUT CRYPTO, WHAT DO YOU NEED TO CHECK ABOUT THE INDIVIDUAL. WHO WISHES TO TAKE RECEIPT?
ESTABLISH ID
ENSURE INDIVIDUAL HAS CORRECT CLEARANCE
ENSURE THEY ARE CRYPTO AUTHORISED
How would you confirm a store on the KYK-13?
SELECT RELEVANT STORE. SWITCH KYK-13 OFF. PRESS GREY NIPPLE.
When cryptographic material and equipment is in use what are the six periodic checks to be carried out in the field?
HOTO INITIAL ISSUE BEFORE & AFTER MOVE DAILY BY DET COMMANDER SOPS ENDEX
Name 4 vulnerabilities to IT security?
Hacking Social Networks Virus/malware/spyware/trojan Loss or theft of laptops usb classified docs occifical docs
Name 5 TEMPEST HAZARDS?
Equipment again Equipment compatibility Siting Mains voltage variations The human factor
Explain why impex policy is used?
To ensure the correct policy is followed in regards to placing marked material onto one system from another without any compromise. normally carried out by a single individual or controlled from a single point of contact.