M1 Flashcards
What are the five pillars of information assurance?
Confidentiality - Unauthorized persons are not able to access information
Integrity - Information is not modified, altered, or changed in any way
Availability - Information system is usable and the information is accessible
Authentication - Person who is accessing the information is who they say they are.
Non-repudiation - No one can later deny their role in communications or that they accessed the information.
What is COMPUSEC?
Computer Security
What is a GFE?
Government Furnished Equipment
How long should you keep a password?
Up to 180 days
How many characters minimum should a secure password have?
14
How many consecutive characters should a secure password have?
No more than 3 consecutive characters
When making a new password, how many characters should change at a minimum from the last password?
Minimum 4 characters
You should stray away from ________ information and _____ phrases or __________ words when making a password.
personal information
common phrases
dictionary words
What is the difference between Sensitive and Critical information?
Sensitive information is information that the mishandling of could adversely affect the national interest, but that has not been specifically authorized to be kept secret (Sensetive, important but not specifically secret)
Critical information is the information needed by adversaries for them to plan so as to guarantee the failure of friendly missions. (Critical, helps bad guys guarantee our failure)
What is the OPSEC Five-Step Planning Process?
- Identify Critical Information (what info)
- Analyze Threats (Who wants info)
- Analyze Vulnerabilities (Where’s the weakness)
- Assess Risk (level of impact to the mission)
- Apply Countermeasures (smarter ways of doing task)
What does Confidentiality mean in the OPSEC Five-Step Planning Process?
Unauthorized persons are not able to access information
What does Integrity mean in the OPSEC Five-Step Planning Process?
Information is not modified, altered, or changed in any way
What does Availability mean in the OPSEC Five-Step Planning Process?
Information system is usable and the information is accessible
What does Authentication mean in the OPSEC Five-Step Planning Process?
Person who is accessing the information is who they say they are.
What does Non-repudiation mean in the OPSEC Five-Step Planning Process?
No one can later deny their role in communications or that they accessed the information.
What is the Executive Order dealing with Insider Threat?
EO 13587 directs U.S. Government executive branch departments to assess the effectiveness of insider threat programs
What are the three main types of Phishing?
Phishing
Spear Phishing
Whaling
What is Phishing?
Suspicious e-mails or pop-ups that induce individuals to reveal personal information (broad target)
What is Spear Phishing?
A type of Phishing attack that targets specific individuals, groups of people, or organizations (narrow target)
What is Whaling?
A complex and targeted phishing attack against high-level personnel (extremely specific and high-value)
Intelligence efforts focus on detecting and countering what threats?
Espionage, Terrorism, and Weapons of Mass Destruction
What is Intelligence Oversight?
Intelligence Oversight is the process that ensures intelligence-related activities are in accordance with the constitution, law, executive orders, and DOD directives
What are the two main objectives of Intelligence Oversight?
Ensure the DOD can conduct Intelligence and CI missions
Protect the statutory and constitutional rights of U.S. persons
What is EO 12333?
EO 12333 establishes that the U.S. intelligence effort shall provide POTUS, NSC, HSC information concerning national interests and the development of policies from foreign security threats
What does DoD manual 5240.01 establish?
Procedures to enable DoD to conduct intel activities to protect U.S. persons
What are the two authorized intelligence activities?
Foreign Intelligence
Counterintelligence (CI)
What is foreign intelligence?
Information relating to the capabilities, intentions, and activities of foreign powers.
What is Counterintelligence?
Information used to identify, deceive, exploit, disrupt, or protect against espionage, sabotage, or assassinations conducted on behalf of foreign powers
What does DoD manual 5240.01 outline?
It outlines the DoD Intelligence Oversight program.
What is Title 50?
Titled War and National Defense, it governs foreign intelligence efforts
What is Title 10?
Titled Armed Forces, governs establishment, training, equipping, and readiness of the Armed Forces to conduct offensive operations when ordered by POTUS
What is Title 32?
Titled National Guard, governs the strength and organization of the Army and Air National guard.
What is NSD 42?
National Security Directive 42 establishes cybersecurity guidelines to secure national security systems, and assigns agency responsibilities
What is the purpose of the Intelligence Cycle?
To collect information and develop intelligence for use by IC customers
What are the six steps of the Intelligence Cycle?
Planning and Direction Collection Processing and Exploitation Analysis and Production Dissemination Evaluation and Feedback
What is Data?
A set of values or quantitive variables
What is Information?
Collected data processed into an intelligible form
What is Intelligence?
Information giving new insight to a given situation.
In the Intelligence Cycle, what is Planning and Direction?
Policymakers determine what issues need to be addressed and set intelligence priorities
In the Intelligence Cycle, what is Collection?
Collection refers to collecting information
In the Intelligence Cycle, what is Processing and Exploitation?
using highly trained and specialized personnel and equipment to turn large amounts of raw data into usable information
In the Intelligence Cycle, what is Analysis and Production?
Analysts examine and evaluate collected information, add context, and integrate findings into complete products
In the Intelligence Cycle, what is Dissemination?
Delivering the information to the people who make decisions based off of the information
In the Intelligence Cycle, what is Evaluation and Feedback?
Evaluate the product for relevance, bias, accuracy, and timeliness and to see if the process to ensure thoroughness and efficiency.
Feedback helps adjust and refine activities and outputs to help meet the customers’ information needs.
What is the definition of Disseminate?
To scatter or spread widely; broadcast; disperse
What are the six basic intelligence disciplines for collection?
GEOINT HUMINT IMINT MASINT OSINT SIGINT
What does CRITIC refer to?
Critical information
When should CRITIC reporting be based solely on unclassified information?
When that information is unlikely to be readily available to the President and the National Security Council.
What are events that meet CRITIC reporting requirements?
- Hostile Acts (attack/sabotage against US or allies; war; WMD; infrastructure; cyber attacks that affect Command+control, govt, or essential services; emergency cyber action)
- Terrorist Acts
- Political Disruption/Instability
- Cyber attacks that create immediate major humanitarian, environmental, or economic crises
Who is the DNI?
Director of National Intelligence, head of the IC
What does IC mean?
Intelligence Community
What is a SCC?
Service Cryptologic Component, relating to Armed Forces crypto activities
What are the five SCCs?
(Navy) - US Fleet Cyber Command (USFCC)/Commander Tenth Fleet (C10F)
(USMC) - Marine Cryptologic Support Battalion (MCSB)
Coast Guard Cryptologic Group (CGCG)
US Army Intelligence and Security Command (INSCOM)
Sixteenth Air Force (16 AF)
What is a CC?
Cryptologic Center, they perform critical SIGINT and cybersecurity mission ops focused on analysis and production
Where are the four CCs?
Colorado
Georgia
Hawaii
Texas
What is referred to when someone mentions the “five eyes”?
The NSA and its partners, Australia, Canada, New Zealand, and the United Kingdom
What are the NSA’s foreign second-party partners?
Australia
Canada
New Zealand
United Kingdom
What is a CCMD?
Combatant Command
What is the UCP?
Unified Command Plan, establishes mission responsibility and geographic areas of responsibility to each CCMD