Unit 4 Flashcards
TIA standard ________________ specifies the minimum requirements for telecommunications infrastructure in regards to data centers and computer rooms.
TIA-942
TIA standard __________ defines structured cabling system standards, for commercial offices and between switches in campus or campus-like environments.
TIA-568-D
TIA-569-C is a Commercial Building Standard which standardizes specific pathway and ______ ______ and ___________ practices in support of telecommunications media and equipment within buildings.
Space design, construction
List what physical security requirements for a facility are dependent upon?
- Type and level of the information handled in a facility
- Type of equipment
- Mission of the unit
4 Duty hours of the facility
List and define the three limited access areas.
Control Area- requires identification to get access- ex: base
Restricted Area- an area under military jurisdiction in which special security measure are employed- ex:flightlin
No Lone Zone- areas are required to be occupied by two or more appropriately cleared individuals who remain within sight of each other- ex: Classified burn or shred area
What is your main role when it comes to facility security?
To know the requirements of my unit of assignment and apply common sense security practices.
What activities does OPSEC apply to?
Operation Security applies to all activities that prepare, sustain, or employ forces during all phases of operations.
OPSEC is the process of __________, _______________, and ______________ critical information indicating friendly actions associated with military operations and other activities.
Identifying, analyzing, and controlling
Failure to properly implement OPSEC measures can result in what four things?
- Serious Injury/death to personnel
- Damage to weapons systems, equipment, and facilities
- Loss of sensitive technologies
- Mission degradation or failure
Critical information is best identified by _____________________ responsible for the planning and execution of the organization’s missions.
The individuals
A(n) __________ is a friendly detectable action and open source information that can be interpreted or pieced together by an adversary to derive critical information.
Indicator
What is one of the easiest ways for our adversaries to gather information about military operations?
Social Media
Which IA protective measure is defined as restricting system maintenance to only authorized personnel?
Controlling Maintenance Activities
Configuration Management
Ensure timely issuance and installation of software patches, system security enhancements, and configuration modifications.
Malicious Logic Protection
Protect information systems from malicious logic attacks(viruses)
User Awareness Training
All authorized users will receive initial IA orientation and annual awareness training to ensure they know, understand, and apply the IA requirements of Air Force information and information systems.
COMSEC Protection results from applying what security measures?
Cryptosec, Transec, and Emission security
_________________ is the use of coding systems to encrypt and decrypt information.
Cryptography
When safeguarding COMSEC information, what three issues are considered as additional physical security threats?
Improper destruction of waste, improper handling, and unauthorized viewing or possession of COMSEC material
What program is designed to identify vulnerabilities by studying incidents of unintentionally emitted signals and searching for ways to correct this significant problem?
TEMPEST
Which Protected Distribution System (PDS) affords significant security protection to the telecommunication lines and how?
Hardened Distribution System. Alarmed carrier, hardened conduit, constantly viewed area
All security measures taken to protect AF information systems fall under what security program?
COMPUSEC
Unauthorized access involves an unauthorized person gaining access to _______ _______, _______, or the information stored and processed by a computer system
Computer hardware, software
________ _________ is the primary means of preventing unauthorized access to a computer system.
Password Protection
What is a second, more common threat to computer systems, and what 3 ways can it be conducted?
Malicious logic
Computer viruses, spyware, and steal-ware
What is the most effective way to detect and eliminate viruses?
Antivirus software or virus scanners
______, _________, _____________ results from any intentional deception designed to unlawfully deprive the Air Force of something of value
Fraud, Waste, and Abuse
Which DoD system provides a structured, operational approach to uniformly increase or decrease a defensive posture, defends against unauthorized activity, and mitigate sustained damage to the Defense Information Infrastructure?
INFOCON
How many INFOCON conditions are there?
5
INFOCON _____________ is normal readiness
5
INFOCON _____________is maximum readiness
1