Section 17D--Information Access, Cyber Security, and Mobility Flashcards
What time period must system of records notices be published in the federal register to allow the public to comment?
30-day
When may Department of Defense personnel disclose records to other federal government agencies or individuals?
When a discloser of records is a “routine use” published in the system of records notices or as authorized by a Privacy Act exception
What mandatory time limits does the Freedom of Information Act impose to either deny the request or release the requested records?
20 workdays
Which publication provides specific policy and procedures and Freedom of Information Act and for guidance on disclosing records to the public?
DoDM 5400.07-R and AFMAN 33-302
What disciplines comprise Cybersecurity?
a) Air Force Risk Management Framework
b) IT controls/countermeasures
c) Communications security
d) TEMPEST (formerly EMSEC)
e) Af Assessment and Authorization
What disciplines comprise Cybersecurity?
a) Air Force Risk Management Framework
b) IT controls/countermeasures
c) Communications security
d) TEMPEST (formerly EMSEC)
e) AF Assessment and Authorizatio Cybersecurity Workforce Improvement Program
Which AFI describes risk management and cybersecurity as representations of dynamic, multi-disciplinary sets of challenges?
AFI 17-130, Cybersecurity Program Management
What is ensured when cybersecurity capabilities are balanced, including safety, reliability, interoperability, and ease of use, while maximizing performance, as well as promoting transparency and interoperability with USAF mission partners?
Opertional agility
What are the five functions of the Air Force Cybersecurity Program
1) identify
2) Protect
3) Detect
4) Respond
5) Recover
T or F? Limited personal use may be of any duration and frequency as long as it does not adversely affect performance of official duties, overburden systems, or reflect adversely on the USAF or DOD
Falce
What are three steps involved in protecting information systems from viruses and other forms of malicious logic? These steps include a combination of human and technological countermeasures to ensure the protection is maintained throughout the lifecycle of the information system.
1) infection
2) Detection
3) Reaction
What refers to measures and controls taken to deny unauthorized persons information derived from information systems of hte US GOvernment related to national security and to ensure the authenticity of such information systems?
Communications security COMSEC
What results from applying security measures to communications and information systems generating, handling, storing, processing, or using classified or sensitive information, the loss of which could adversely affect national security interests?
Communications security protection
What is communications security resulting from the use of all physical measures necessary to safeguard communications security material from access by unauthorized persons?
Physical security
What is the area in which it would be difficult for an adversary with specialized equipment to attempt to intercept compromising emanations without being detected?
Inspectable space