Security Flashcards
What is the purpose of operations security? (17.7)
To reduce the vulnerability of USAF missions by eliminating or reducing successful adversary collection and exploitation of critical information
Which security process uses a cycle to identify, analyze, and control critical information that applies to all activities used to prepare, sustain, or employ forces during all phases of operations? (17.7)
Operations security
Which process do USAF units utilize to identify vulnerabilities and indicators of their day-to-day activities? (17.7)
A profiling process
What methodology do operations security program managers and signature managers use to apply measures or countermeasures to hide, control, or simulate indicators? (17.7)
Signature management
What three areas does operations security focus on? (17.1)
(a) Identify those actions that can be observed by adversary intelligence systems
(b) Determine what specific indications could be collected, analyzed, and interpreted to derive critical information in time to be useful to adversaries
(c) Select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation
What involves a series of analyses to examine the planning, preparation, execution, and post-execution phases of any operation or activity across the entire spectrum of military action and in any operational environment? (17.7)
Operations security
What type of analysis provides decision-makers with a means of weighing the risk to their operations? (17.7)
Operations security
True or False? Decision-makers must determine the amount of risk they are willing to accept in particular operational circumstances in the same way as operational risk management allows commanders to assess risk in mission planning. (17.7)
True
When is operational effectiveness enhanced? (17.7)
When commanders and other decision-makers apply operations security from the earliest stages of planning
What must be integrated into operational, support, exercise, acquisition planning, and day-to-day activities to ensure a seamless transition to contingency operations? (17.7)
Operations security principles
What five distinct actions comprise the operations security process? (17.1)
(1) Identify critical information
(2) Analyze threats
(3) Analyze vulnerabilities
(4) Assess risk
(5) Apply appropriate operations security countermeasures
What are friendly, detectable actions and open-source information that can be interpreted or pieced together by an adversary to derive critical information? (17.8)
Operations security indicators
What are the five basic characteristics of operations security indicators that make them potentially valuable to an adversary? (17.2)
(1) Signatures–a characteristic of an indicator that is identifiable or stands out
(2) Associations–the relationship of an indicator to other information or activities
(3) Profiles–each functional activity generates its own set of more-or-less unique signatures and associations; the sum of these signatures and associations is the activity’s profile
(4) Contrasts–any difference observed between an activity’s standard profile and most recent or current actions
(5) Exposure–refers to when and for how long an indicator is observed
What is a characteristic of an indicator that is identifiable or stands out? (17.8)
Signature
What is the active defense or exploitation of operational profiles at a given military installation? (17.8)
Signature management
What is accomplished by implementing measures to deny adversary collection of critical information? (17.8)
Defense of operational profiles
Each functional activity generates its own set of more-or-less unique signatures and associations. What is the sum of these signatures and associations? (17.8)
The activity’s profile
What is used to map the local operating environment and capture process points that present key signatures and profiles with critical information value? (17.8)
Profiling process
What refers to when and for how long an indicator is observed? (17.8)
Exposure
True or False? The longer an indicator is observed, the better chance an adversary can form associations and update the profile of operational activities. (17.8)
True
What is a subset of the USAF security enterprise and consists of the core security disciplines (personnel, industrial, and information security) used to determine military, civilian, and contractor personnel eligibility to access classified information, ensure the protection of classified information released or disclosed to industry in connection with classified contracts, and protect classified information and Controlled Unclassified Information (CUI) that, if subject to unauthorized disclosure, could reasonably be expected to cause damage to national security? (17.9)
Information protection
True or False? All personnel in the Air Force are responsible for protecting classified information and controlled unclassified information under their custody and control. (17.10)
True
Which source provides guidance for managing classified information and controlled unclassified information? (17.10)
DoDM5200.01V1_AFMAN16-1404V1
Classified information is designated accordingly to protect national security. What are its three levels of classification? (17.10)
Top Secret, Secret, and Confidential
Who is responsible for providing the proper safeguards for classified information, reporting security incidents, and understanding the sanctions for noncompliance? (17.10)
Each individual
Which level of classification shall be applied to information that the unauthorized disclosure of which reasonably could be expected to cause “exceptionally grave” damage to the national security that the original classification authority is able to identify or describe? (17.10)
Top Secret
Which level of classification shall be applied to information that the unauthorized disclosure of which reasonably could be expected to cause “serious” damage to the national security that the original classification authority is able to identify or describe? (17.10)
Secret
Which level of classification shall be applied to information that the unauthorized disclosure of which reasonably could be expected to cause damage to the national security that the original classification authority is able to identify or describe? (17.10)
Confidential
What is the information the government creates or possesses, or that an entity creates or possesses for or on behalf of the government, that a law, regulation, or Government-wide policy requires or permits an agency to handle using safeguarding or dissemination controls? (17.11)
Controlled unclassified information
Which publication provides the requirements, controls, and protective measures developed for controlled unclassified information materials? (17.11)
DoDI 5200.48_AFI 16-1403
What is it called when there is an initial decision by an original classification authority that an item of information could reasonably be expected to cause identifiable or describable damage to the national security subjected to unauthorized disclosure and requires protection in the interest of national security? (17.11)
Original classification
True or False? Only officials designated in writing may make original classification decisions. (17.11)
True
Consistent with which policy, does USAF identify, classify, downgrade, declassify, mark, protect, and destroy classified information? CUI will also be protected per it as well. (17.11)
National policy
Within the Department of Defense, what is the requirement for all cleared personnel to derivatively classify information? (17.11)
They must have received initial training before making derivative classification decisions, and refresher training every year
Which classification is the incorporating, paraphrasing, restating, or generating classified information in a new form or document? (17.11)
Derivative
Note: Derivative classifiers must use authorized types of sources for making decisions.
True or false? One of the most important responsibilities of the derivative classifier is to observe, but not respect the classification determinations made by an original classification authority. (17.11)
False
Note: One of the most important responsibilities of the derivative classifier is to “observe and respect” the classification determinations made by an original classification authority.
Which manual will be referenced to clearly identify all classified information by marking, designation, or electronic labelling? (17.11)
DoDM5200.01V2_AFMAN16-1404V2
What serves to: (a) alert holders to the presence of classified information; (b) identify the information needing protection; (c) indicate the level of classification assigned to the information; (d) provide guidance on downgrading (if any) and declassification; (e) give information on the sources of and reasons for classification; (f) notify holders of special access, control, or safeguarding requirements; and (g) promote information sharing, facilitate judicious use of resources, and simplify management through implementation of uniform and standardized processes. (17.11)
Marking classified information
How must every classified document be marked to show? (17.11)
Highest classification of information contained within the document
Note: The marking must be conspicuous enough to alert anyone handling the document that the document is classified.
What are the three most common markings on a classified document? (17.11)
(1) Banner lines, (2) Portion markings, and (3) Classification authority block
Note: Every document will contain the overall classification of the document, banner lines, portion markings indicating the classification level of specific classified information within the document, the classification authority block, date of origin, and downgrading instructions, if any, and declassification instructions.
True or False? Everyone who works with classified information is personally responsible for taking proper precautions to ensure unauthorized persons do not gain access to classified information. (17.11)
True
What must a person have before granting access to classified information? (17.11)
(1) Security clearance eligibility
(2) Signed Standard Form (SF) 312, Classified Information Non-Disclosure Agreement
(3) A need-to-know
Who must determine whether the person receiving the information has been granted the appropriate security clearance access by proper authority? (17.11)
Individual with authorized possession, knowledge, or control of the information
What must be placed on classified documents not in secure storage to prevent unauthorized persons from viewing the information? (17.11)
Coversheet
Note: An authorized person shall keep classified material removed from storage under constant surveillance.
What forms (Cover Sheets) are used to cover classified information outside of storage? (17.11)
(a) SF 703, Top Secret
(b) SF 704, Secret
(c) SF 705, Confidential
Which form is used to cover Top Secret classified information outside of storage? (17.11)
SF 703
Which form is used to cover Secret classified information outside of storage? (17.11)
SF 704
Which form is used to cover Confidential classified information outside of storage? (17.11)
SF 705
Which form, titled Activity Security Checklist, is used to record the end of the day security checks, ensuring all vaults, secure rooms, and containers used for storing classified material are checked? (17.11)
SF 701
Note: This form is required for any area where classified information is used or stored.
True or False? Classified information systems should specifically be stored in a general services administration approved safe or in buildings or areas cleared for open storage of classified. (17.11)
True
What must anyone finding classified material out of proper control do? (17.12)
Take custody of and safeguard the material, and immediately notify their commander, supervisor, or security manager
Which manual formally defines terms associated with security incidents? (17.12)
DoDM5200.01V3_AFMAN16-1404V3
What is a security incident involving failure to comply with requirements which cannot reasonably be expected to, and does not, result in the loss, of classified records, or in the suspected or actual compromise of classified information? (17.12)
Infraction
An infraction may be unintentional or inadvertent, and does not constitute a security violation; however, if left uncorrected, what could it lead to? (17.12)
Security violation or compromise
What security incidents require an inquiry to facilitate immediate corrective action but does not require an in-depth investigation? (17.12)
Infractions
What are security incidents that indicate knowing, willful, and negligent for security regulations, and result in, or could be expected to result in the loss of classified records or the compromise of classified information? (17.12)
Violations
What is a security incident (more specifically, a violation) in which there is an unauthorized disclosure of classified information (i.e., disclosure to a person(s) who does not have a valid clearance, authorized access, or a need to know)? (17.12)
Compromise
What is a security incident when records containing classified information cannot be physically located or accounted for? This could include classified records/equipment is discovered missing during an audit and which cannot be immediately located. (17.12)
Loss
What is a security incident when classified data is introduced either onto an unclassified information system or to an information system with a lower level of classification, or to a system not accredited to process data of that restrictive category? (17.12)
Data spill
What shall personnel do if classified information appears in the media or public internet sites, or if approached by a media representative? (17.12)
Do not make any statement or comment that confirms the accuracy of or verifies the information requiring protection
Note: Report the matter as instructed by the appropriate DoD Component guidance, but do not discuss it with anyone who does not, in the case of classified information, have an appropriate security clearance and need to know
True or False? USAF policy is to identify, in classified contracts, specific information and sensitive resources that must be protected against compromise or loss while entrusted to industry. (17.13)
True
Which program entails policies and procedures that ensure military, civilian, and contractor personnel who access classified information or occupy a sensitive position are consistent with interests of national security? This involves, for the most part, procedures for obtaining proper security clearances required for performing official duties. (17.14)
Personnel Security Program
Who is the designated authority to grant, deny, and revoke security clearance eligibility using the Department of Defense 13 adjudicative guidelines, while applying the whole person concept and mitigating factors? (17.14)
Department of Defense Central Adjudication Facility
What option is given to individuals if the security clearance eligibility is denied or revoked? (17.14)
Granted due process and may appeal
Which act (as amended) establishes a code of fair information practices that govern the collection, maintenance, use, and dissemination of personal information about individuals that is maintained in a system of records by federal agencies? (17.15)
Privacy Act of 1974
What provides individuals with a means by which to seek access to and amend their records, and sets forth agency recordkeeping requirements? (17.15)
The Privacy Act