Security Flashcards
What is the purpose of operations security? (17.7)
To reduce the vulnerability of USAF missions by eliminating or reducing successful adversary collection and exploitation of critical information
Which security process uses a cycle to identify, analyze, and control critical information that applies to all activities used to prepare, sustain, or employ forces during all phases of operations? (17.7)
Operations security
Which process do USAF units utilize to identify vulnerabilities and indicators of their day-to-day activities? (17.7)
A profiling process
What methodology do operations security program managers and signature managers use to apply measures or countermeasures to hide, control, or simulate indicators? (17.7)
Signature management
What three areas does operations security focus on? (17.1)
(a) Identify those actions that can be observed by adversary intelligence systems
(b) Determine what specific indications could be collected, analyzed, and interpreted to derive critical information in time to be useful to adversaries
(c) Select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation
What involves a series of analyses to examine the planning, preparation, execution, and post-execution phases of any operation or activity across the entire spectrum of military action and in any operational environment? (17.7)
Operations security
What type of analysis provides decision-makers with a means of weighing the risk to their operations? (17.7)
Operations security
True or False? Decision-makers must determine the amount of risk they are willing to accept in particular operational circumstances in the same way as operational risk management allows commanders to assess risk in mission planning. (17.7)
True
When is operational effectiveness enhanced? (17.7)
When commanders and other decision-makers apply operations security from the earliest stages of planning
What must be integrated into operational, support, exercise, acquisition planning, and day-to-day activities to ensure a seamless transition to contingency operations? (17.7)
Operations security principles
What five distinct actions comprise the operations security process? (17.1)
(1) Identify critical information
(2) Analyze threats
(3) Analyze vulnerabilities
(4) Assess risk
(5) Apply appropriate operations security countermeasures
What are friendly, detectable actions and open-source information that can be interpreted or pieced together by an adversary to derive critical information? (17.8)
Operations security indicators
What are the five basic characteristics of operations security indicators that make them potentially valuable to an adversary? (17.2)
(1) Signatures–a characteristic of an indicator that is identifiable or stands out
(2) Associations–the relationship of an indicator to other information or activities
(3) Profiles–each functional activity generates its own set of more-or-less unique signatures and associations; the sum of these signatures and associations is the activity’s profile
(4) Contrasts–any difference observed between an activity’s standard profile and most recent or current actions
(5) Exposure–refers to when and for how long an indicator is observed
What is a characteristic of an indicator that is identifiable or stands out? (17.8)
Signature
What is the active defense or exploitation of operational profiles at a given military installation? (17.8)
Signature management
What is accomplished by implementing measures to deny adversary collection of critical information? (17.8)
Defense of operational profiles
Each functional activity generates its own set of more-or-less unique signatures and associations. What is the sum of these signatures and associations? (17.8)
The activity’s profile
What is used to map the local operating environment and capture process points that present key signatures and profiles with critical information value? (17.8)
Profiling process
What refers to when and for how long an indicator is observed? (17.8)
Exposure
True or False? The longer an indicator is observed, the better chance an adversary can form associations and update the profile of operational activities. (17.8)
True
What is a subset of the USAF security enterprise and consists of the core security disciplines (personnel, industrial, and information security) used to determine military, civilian, and contractor personnel eligibility to access classified information, ensure the protection of classified information released or disclosed to industry in connection with classified contracts, and protect classified information and Controlled Unclassified Information (CUI) that, if subject to unauthorized disclosure, could reasonably be expected to cause damage to national security? (17.9)
Information protection
True or False? All personnel in the Air Force are responsible for protecting classified information and controlled unclassified information under their custody and control. (17.10)
True
Which source provides guidance for managing classified information and controlled unclassified information? (17.10)
DoDM5200.01V1_AFMAN16-1404V1
Classified information is designated accordingly to protect national security. What are its three levels of classification? (17.10)
Top Secret, Secret, and Confidential