Security Flashcards
____ is the protection of info, equipment, installations from unauthorized persons + sabotage
Unit Security
Personal Hazards to Sec (4) FCEPI
Faith, conceit, enthusiasm and pride, ignorance
Personal Hazards to Sec (1): ___ - trusting too much
Faith
Personal Hazards to Sec (2): ___ - satisfy ego or impress someone
Conceit
Personal Hazards to Sec (3)___ - common cause of indiscretion
Enthusiasm and pride
Personal Hazards to Sec (4)___ - not realizing value or importance of info
Ignorance
____ forms the weakest link in security chain
Personnel
____ an investigation that establishes security procedures and system
Survey
____ a check of existing security measures and regulations
Inspection
5 components of Unit Security: PPDOC
Physical, Personnel, Document, Operational, Communication
___ - system of barriers
Physical security
5 types of barriers - NAHSE
Natural, Animal, Human, Structural, Energy
____ - measures to prevent individuals of doubtful loyalty from access or employment
Personnel Security
Motives that cause disloyalty: (6) big ddr
blackmail, ideology, gain (material), debt, drugs, revenge
Prep and classification of classified matter rests with ____
originating office
____ - any recorded information regardless of physical form
documents
___ - to assign one of 4 security classifications to info
classify
____ - info of which should be safeguarded in the interest of national security
classified matter
4 classifications of documents: TSCR
top secret, secret, confidential, restricted
____ - refers to measures in conduct of operations to avoid compromise
Operational sec
3 elements of operational security (SC-POP)
surprise, conspiracy, proper operational planning
____ secret agreement to keep silent about a subject in order to protect interest
conspiracy
4 methods of opsec (CCCC)
compartmentation, cover, communication, cut-out devices
___ - separate into isolated units
compartmentation
____ - not openly shown, to conceal/screen/mask
cover
___ - avoidance of direct contact among personnel
cut-out devices
____ - protection resulting from denying unauth access, mislead unauth in interpretation of materials
Communication security
____ - technically sound notations on docus, knowledge of which is restricted
cryptographic security
_____ - protect transmission from intercepts
transmission security