Cyber Transport Block 2 Flashcards
What are the two broad categories for official information and materials?
Classified
Unclassified
This is information that is owned by, and produced or is subject to the control of the United States government and supported agencies.
Official information
This information is information that must be safe guarded in the interest of national security, and that of our allies.
Classified information
What are the three classification levels that are assigned by who?
Top secret
Secret
Confidential
NSA is who assign the levels of classification
This is the highest NSA classification and is given to any information and material that is expected to cause exceptional “grave” damage to national security if it were to fall in the wrong hands.
Top secret
What information is held to the highest degree of protection?
Top secret
This is the NSA classification given to any information that is expected to cause a serious level of damage to national security if revealed.
Secret
This is the NSA classification given to any information that is expected to cause “damage” or identifiable damage to national security
Confidential
True/false
Unclassified information needs no limited degree of control or protection
False
This is any information that requires minimum safeguarding to prevent widespread distribution to the public.
For official use only
FOUO
What act does for official use only fall under to prevent the release to the public?
Freedom of information act.
True or false
Markings are required for documents containing FOUO.
True
What are the two unclassified FOUO information?
Privacy act
Critical information
What year was the privacy act enacted?
1974
What are some examples of the privacy act govern?
Social security number
Date of birth
Name
How long do you keep privacy act information, and how is it disposed of?
Only as long as necessary and must be destroyed.
What is critical information?
Any unclassified information providing clues in regards to US and friendly forces activities, capabilities, intentions or limitations.
According to AF133-201V1, what is COMSEC?
Refers to measures and controls taken to deny any unauthorized persons information derived from information systems of the United States government related to national security and to ensure the authenticity of such information systems.
What are the components of COMSEC?
TRANSEC
CRYPTOSEC
EMSEC
Physical security
True/false:
TRANSEC techniques are not used to protect or secure transmitted classified or sensitive information.
(If false, make it true)
True
What are authorized TRANSEC Methods?
Changing radio frequencies Cancel or alter communications patterns Implement radio silence Use frequency hopping systems Use directional antennas
This is a component of COMSEC resulting from the application of measures designed to protect transmission from intercepting and exploitation by means other than “cryptanalysis” or complex code-breaking techniques used to reveal encrypted information
Transmission security (TRANSEC)
What is crypto security?(CRYPTOSEC)
Provisions and proper use of technically sound crypto systems.
This security is the part of the COMSEC that results from using all physical measures necessary to safeguard information or material from access by unauthorized persons.
Physical security
This determines protective measures that will deny unauthorized personnel access to classified and in some instance, unclassified information and intelligence that might be derived from the interception and analysis of unintentionally emitted electrical signals from system processing this information.
Emission security (EMSEC)
Cryptography relies on what two basic components?
Algorithm
Crypto-key
What is cryptography?
The transformation of ordinary plain text in to code from(cipher text) and then recovering the plaintext data from its cipher text form
This is authorized use of cryptographic system to return encrypted information to its original, readable form
Decryption
This is the mathematical function or formula used in encryption and decryption
Algorithm
This is known as a key “variable” is the parameter or numerical value used in encryption and decryption
Crypto-key
The act or science of deciphering a code or coded message without a prior knowledge of the key.
Cryptanalysis
Who approves all cryptographic systems and techniques used by or on the behalf of DOD activities to encrypt ______ and certain _______ ________ information.
NSA
Classified
Sensitive information
Who approves all techniques and system used to encrypt unclassified sensitive information?
National institute of standards and technology
NIST
What are two types of approved cryptographic systems?
Secret-key
Public-key
What high encryption/decryption key speed using hi tech crypto system
Symmetric (secret-key)
True/false:
Symmetric (secret-key) encrypt is approved by odd and the NSA to use to encrypt classified information.
True