Information Protection (IP) Operations study1 Flashcards
ACP 122(F)
ACP 122 (F) COMMUNICATIONS INSTRUCTIONS (SECURITY)
AFH31-602
Industrial Security Program
1.2. Purpose. This instruction implement Executive Order 12829, National Industrial Security Program, DOD 5220.22-M, National Industrial Security Program Operating Manual (NISPOM), and DOD 5220.22-R, Industrial Security Regulation (ISR) and AFPD 31-6, Industrial Security.
***It assigns functional responsibilities and establishes a system of review that identifies outdated, inappropriate and unnecessary contractual security requirements. It outlines and provides guidance for establishing on-base integrated contractor visitor groups.
AFI33-115
- Purpose. This instruction defines AF IT Service Management and assigns responsibilities for the configuration, provisioning, maintenance, and management of AFIN using an IT Service Management (ITSM) framework to further integrate capabilities and maintain configuration control of AF networks and data servers. This instruction serves as the single reference for AF IT Service Management policy and applies to all personnel who manage, configure, operate, maintain, defend, or extend any portion of the AFIN or provide support within the AF for the DoDIN and the Joint Information Environment (JIE). 1.1. Procedural guidance supporting this AFI is contained in Methods and Procedures Technical Orders (MPTOs) directing standard processes for management, standardization, and maintenance of AF IT Services applicable to all AF personnel, see paragraph 7.3. 1.2. Cyberspace operational orders as defined in AFI 10-1701 (e.g., AF Cyber Tasking Orders, Cyber Control Orders, AF Time Compliance Network Orders) shall take precedence over information contained in this AFI and supporting MPTOs if there is a conflict.
AFI33-200
Information Assurance (IA) Management
AFI33-230
Information Assurance Assessmentand Assistance Program
AFI33-332
Information Management
Certification and Accreditation
A process for implementing information security. A systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system in in operation.
What AFI is the Air Force Certification and Accreditation program defined in?
AFI 33-210
A comprehensive assessment of the management, operational, and technical security controls in an information system, made in support of security accreditation, to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.
Certification
The official management decision given by a senior agency official to authorize operation of an information system and to explicitly accept the risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals based on the implementation of an agreed-upon set of security controls.
Accreditation
Another factor of the cert and accreditation process which we must consider. Ensures continuity of operations as changes are validated, approved, and implemented on the Air Force Networks.
Change Management
The process of verifying an identity that is bound to the person that asserts it.
Identification and Authentication
The validation of a claimed identity.
Authentication
Knowledge-Based, Possession-Based, Biometric-Based, Location-Based, Multi-Factor Authentication
Authenticators
Require the user to provide a pre-established piece or several pieces of information in order to authenticate the presented identity.
Based on the on the concept that the user is the only one who knows what the information system expects and therefore is the person identified.
Examples: passwords, PINs
Knowledge-Based Authenticator