Unit 4 Flashcards
TIA standard ________________ specifies the minimum requirements for telecommunications infrastructure in regards to data centers and computer rooms.
TIA-942
TIA standard __________ defines structured cabling system standards, for commercial offices and between switches in campus or campus-like environments.
TIA-568-D
TIA-569-C is a Commercial Building Standard which standardizes specific pathway and ______ ______ and ___________ practices in support of telecommunications media and equipment within buildings.
Space design, construction
List what physical security requirements for a facility are dependent upon?
- Type and level of the information handled in a facility
- Type of equipment
- Mission of the unit
4 Duty hours of the facility
List and define the three limited access areas.
Control Area- requires identification to get access- ex: base
Restricted Area- an area under military jurisdiction in which special security measure are employed- ex:flightlin
No Lone Zone- areas are required to be occupied by two or more appropriately cleared individuals who remain within sight of each other- ex: Classified burn or shred area
What is your main role when it comes to facility security?
To know the requirements of my unit of assignment and apply common sense security practices.
What activities does OPSEC apply to?
Operation Security applies to all activities that prepare, sustain, or employ forces during all phases of operations.
OPSEC is the process of __________, _______________, and ______________ critical information indicating friendly actions associated with military operations and other activities.
Identifying, analyzing, and controlling
Failure to properly implement OPSEC measures can result in what four things?
- Serious Injury/death to personnel
- Damage to weapons systems, equipment, and facilities
- Loss of sensitive technologies
- Mission degradation or failure
Critical information is best identified by _____________________ responsible for the planning and execution of the organization’s missions.
The individuals
A(n) __________ is a friendly detectable action and open source information that can be interpreted or pieced together by an adversary to derive critical information.
Indicator
What is one of the easiest ways for our adversaries to gather information about military operations?
Social Media
Which IA protective measure is defined as restricting system maintenance to only authorized personnel?
Controlling Maintenance Activities
Configuration Management
Ensure timely issuance and installation of software patches, system security enhancements, and configuration modifications.
Malicious Logic Protection
Protect information systems from malicious logic attacks(viruses)