M1 Flashcards
What are the five pillars of information assurance?
Confidentiality - Unauthorized persons are not able to access information
Integrity - Information is not modified, altered, or changed in any way
Availability - Information system is usable and the information is accessible
Authentication - Person who is accessing the information is who they say they are.
Non-repudiation - No one can later deny their role in communications or that they accessed the information.
What is COMPUSEC?
Computer Security
What is a GFE?
Government Furnished Equipment
How long should you keep a password?
Up to 180 days
How many characters minimum should a secure password have?
14
How many consecutive characters should a secure password have?
No more than 3 consecutive characters
When making a new password, how many characters should change at a minimum from the last password?
Minimum 4 characters
You should stray away from ________ information and _____ phrases or __________ words when making a password.
personal information
common phrases
dictionary words
What is the difference between Sensitive and Critical information?
Sensitive information is information that the mishandling of could adversely affect the national interest, but that has not been specifically authorized to be kept secret (Sensetive, important but not specifically secret)
Critical information is the information needed by adversaries for them to plan so as to guarantee the failure of friendly missions. (Critical, helps bad guys guarantee our failure)
What is the OPSEC Five-Step Planning Process?
- Identify Critical Information (what info)
- Analyze Threats (Who wants info)
- Analyze Vulnerabilities (Where’s the weakness)
- Assess Risk (level of impact to the mission)
- Apply Countermeasures (smarter ways of doing task)
What does Confidentiality mean in the OPSEC Five-Step Planning Process?
Unauthorized persons are not able to access information
What does Integrity mean in the OPSEC Five-Step Planning Process?
Information is not modified, altered, or changed in any way
What does Availability mean in the OPSEC Five-Step Planning Process?
Information system is usable and the information is accessible
What does Authentication mean in the OPSEC Five-Step Planning Process?
Person who is accessing the information is who they say they are.
What does Non-repudiation mean in the OPSEC Five-Step Planning Process?
No one can later deny their role in communications or that they accessed the information.
What is the Executive Order dealing with Insider Threat?
EO 13587 directs U.S. Government executive branch departments to assess the effectiveness of insider threat programs
What are the three main types of Phishing?
Phishing
Spear Phishing
Whaling
What is Phishing?
Suspicious e-mails or pop-ups that induce individuals to reveal personal information (broad target)
What is Spear Phishing?
A type of Phishing attack that targets specific individuals, groups of people, or organizations (narrow target)
What is Whaling?
A complex and targeted phishing attack against high-level personnel (extremely specific and high-value)
Intelligence efforts focus on detecting and countering what threats?
Espionage, Terrorism, and Weapons of Mass Destruction
What is Intelligence Oversight?
Intelligence Oversight is the process that ensures intelligence-related activities are in accordance with the constitution, law, executive orders, and DOD directives
What are the two main objectives of Intelligence Oversight?
Ensure the DOD can conduct Intelligence and CI missions
Protect the statutory and constitutional rights of U.S. persons