Unit 4 pgs 1-9 Security Flashcards

1
Q

Define OPSEC

A

OPSEC is a process of identifying, analyzing and controlling critical information indicating friendly actions associated with military operations and other activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of OPSEC?

A

Reduce the vulnerability of Air Force missions by eliminating or reducing successful adversary collection and exploitation of critical information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the five-step OPSEC process?

A
Step 1: Identify Critical Information
Step 2: Analyze Threats
Step 3: Analyze Vulnerabilities
Step 4: Assess Risk
Step 5: Apply Countermeasures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define step 1 of the OPSEC process

A

Identify critical information: The product of Step 1 is a CRITICAL INFORMATION LIST –>approved by commander –>identified at earliest stages of planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is critical information?

A

specific fact about friendly intentions, capabilities, and activities vitally needed by adversaries to guarantee failure or unacceptable consequences for friendly mission accomplishment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define step 2 of the OPSEC process

A

Analyze threats: identify threats (adversaries) with the capability and intent to undertake action detrimental to the success of program activities or operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define step 3 of the OPSEC process

A

Analyze vulnerabilities: vulnerabilities exists when the adversary is capable of collecting critical information or impact friendly objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define step 4 of the OPSEC process

A

Assess risk:

probability an adversary will gain knowledge of your critical information and the impact if the adversary is successful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define step 5 of the OPSEC process

A

Apply countermeasures: countermeasures are anything that effectively negates or mitigates an adversary’s ability to exploit vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define COMPUSEC

A

all measures to safeguard information systems (IS) and information against sabotage, tampering, denial of service, espionage, fraud, misuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the objective of COMPUSEC

A

employ countermeasures to protect confidentiality, integrity, availability, authentication and non-repudiation of US gov. info. processed by AF information systems (IS) (PHYSICAL PROTECTION)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Public Key Infrastructure?

A

combination of hardware, software, policies, and procedures to authenticate, protect, digitally sign, and encrypt email/documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an example of PKI?

A

CAC, SIPR token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define COMSEC

A

Communications Security – measures to deny unauthorized persons information derived from IS of the US gov. related to national security. (SOFTWARE PROTECTION)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the objective of Personnel Security?

A

Personnel Security Program is to ensure persons deemed eligible for national security positions remain reliable and trustworthy to access collateral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define JPAS

A

Joint Personnel Adjudication System – DoD personnel security clearance and access database

17
Q

Define SIF

A

collection of documents generated as a result of the discovery or development of unfavorable info which brings into question a person’s continuing eligibility for a security clearance or access to SCI.

18
Q

Define Physical Security

A

Part of security concerned with physical measures to safeguard personnel, prevent unauthorized access to equipment, etc.

19
Q

Define Access Control System

A

electromechanical, personal recognition

20
Q

Intrusion Detection System (IDS)

A

detect attempted or actual unauthorized human entry into SCIF

21
Q

INFOSEC

A

designed to protect calssified information and controlled unclassified information (CUI)

22
Q

Infraction

A

Failure to comply with requirements – does not result in loss or compromise of classified information

23
Q

Violation

A

Security incident due to knowing, willfull, and negligent security practices.

24
Q

Data Spillage

A

Classified info trasfered to lower classified systems through physical means (DVD, USB)

25
Q

Classified Message Incident (CMI)

A

when a higher classified level of data is transferred to a lower classification level