Information Protection (IP) Operations study1 Flashcards

1
Q

ACP 122(F)

A

ACP 122 (F) COMMUNICATIONS INSTRUCTIONS (SECURITY)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AFH31-602

A

Industrial Security Program

1.2. Purpose. This instruction implement Executive Order 12829, National Industrial Security Program, DOD 5220.22-M, National Industrial Security Program Operating Manual (NISPOM), and DOD 5220.22-R, Industrial Security Regulation (ISR) and AFPD 31-6, Industrial Security.

***It assigns functional responsibilities and establishes a system of review that identifies outdated, inappropriate and unnecessary contractual security requirements. It outlines and provides guidance for establishing on-base integrated contractor visitor groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AFI33-115

A
  1. Purpose. This instruction defines AF IT Service Management and assigns responsibilities for the configuration, provisioning, maintenance, and management of AFIN using an IT Service Management (ITSM) framework to further integrate capabilities and maintain configuration control of AF networks and data servers. This instruction serves as the single reference for AF IT Service Management policy and applies to all personnel who manage, configure, operate, maintain, defend, or extend any portion of the AFIN or provide support within the AF for the DoDIN and the Joint Information Environment (JIE). 1.1. Procedural guidance supporting this AFI is contained in Methods and Procedures Technical Orders (MPTOs) directing standard processes for management, standardization, and maintenance of AF IT Services applicable to all AF personnel, see paragraph 7.3. 1.2. Cyberspace operational orders as defined in AFI 10-1701 (e.g., AF Cyber Tasking Orders, Cyber Control Orders, AF Time Compliance Network Orders) shall take precedence over information contained in this AFI and supporting MPTOs if there is a conflict.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AFI33-200

A

Information Assurance (IA) Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AFI33-230

A

Information Assurance Assessmentand Assistance Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AFI33-332

A

Information Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Certification and Accreditation

A

A process for implementing information security. A systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system in in operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What AFI is the Air Force Certification and Accreditation program defined in?

A

AFI 33-210

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A comprehensive assessment of the management, operational, and technical security controls in an information system, made in support of security accreditation, to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.

A

Certification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The official management decision given by a senior agency official to authorize operation of an information system and to explicitly accept the risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals based on the implementation of an agreed-upon set of security controls.

A

Accreditation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Another factor of the cert and accreditation process which we must consider. Ensures continuity of operations as changes are validated, approved, and implemented on the Air Force Networks.

A

Change Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The process of verifying an identity that is bound to the person that asserts it.

A

Identification and Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The validation of a claimed identity.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Knowledge-Based, Possession-Based, Biometric-Based, Location-Based, Multi-Factor Authentication

A

Authenticators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Require the user to provide a pre-established piece or several pieces of information in order to authenticate the presented identity.

Based on the on the concept that the user is the only one who knows what the information system expects and therefore is the person identified.

Examples: passwords, PINs

A

Knowledge-Based Authenticator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Require the user to have physical possession of a specific item (called a token). The user presents the token or performs some action that could only be done if the user had physical possession of their token.

Token contains contains info physically, magnetifcally, or electrically.

Examples: Manual Keys, Challenge-Response Generators, Smart Cards (CAC)

A

Possession-Based Authenticator

17
Q

Relies on a unique physical characteristic to verify the identity of a user. Common identifiers include fingerprints, written signatures, voice patterns, typing patterns, retinal/iris scans, and hand geometry.

Tend to cost more that knowledge or possession based authenticators.

A

Biometric-Based Authenticator

18
Q

Relies on a physical location of the user to verify their identity. The auth succeeds if the location is a known area you are in, or where you live.

Examples include GPS on phones and credit cards.

Vulnerability in this method is when people who know you well, or researched you start to use your information

A

Location-Based Authenticator

19
Q

The combination of two or more of the authenticators used to increase Identification and Authentication to a system or network.

A

Multi-Factor Authentication

20
Q

The uses of prescribed safeguards and controls to prevent reconstruction of the magnetic image/data that would disclose sensitive information to persons who do not have the proper clearance or need to know for this information.

A

Remanence Security

21
Q

The magnetic image/data that is still left on recordable magnetic media (i.e. floppy disk, tape, hard drive, etc.) after it is erased, overwritten or degaussed (cleared) using an electromagnetic device to null or clear the magnetic pattern/image on the media.

A

Magnetic Remanence

22
Q

Procedures for sanitizing magnetic media must be developed in accordance with this technical order.

A

TO 00-35B-5008, Remanence Security for Information systems.

23
Q

Who must develop procedures for clearing, sanitizing and destroying media properly to practice remanence security?

A

Client System Technicians (CST), operators, and users.