Block 2

The flashcards below were created by user jrenaud123 on FreezingBlue Flashcards.

  1. Information that is owned by, produced for or by, or is subject to the control of the United States Government and supporting agencies.
    Official Information
  2. Official information and materials are broken down into what two broad categories?
    Classified and Unclassified
  3. Information that must be safeguarded in the interest of National Defense and that of our allies.
    Classified Information.
  4. What are three classification levels assigned by the NSA to classified information?
    Top Secret, Secret, and Confidential
  5. Information and material that is expected to cause exceptionally grave damage to the national security if it were to fall into the wrong hands.
    Top Secret
  6. Top Secret information requires what degree of protection?
    The highest degree of protection.
  7. Information and material that is expected to cause a serious level of damage to national security if revealed to our enemies.
  8. Secret information requires what degree of protection?
    A substantial degree of protection.
  9. Information and material that is expected to cause "damage" or identifiable damage to national security if revealed to our enemies.
  10. Confidential information requires what degree of protection?
    A less stringent degree of protection.
  11. Information that can also be official information that requires a limited degree of control and protection.
    Unclassified Information
  12. Any information that requires minimum safeguards to prevent widespread distribution to the public.
    • For Official Use Only (FOUO)
    • or Sensitive but Unclassified information (SBU)
  13. What are two examples of unclassified FOUO information?
    Privacy Act and Critical Information
  14. Information the Air Force collects and maintains that is required to accomplish a mission and requires protection from unwarranted invasion to protect your privacy. Cann include SSN, name, DOB, etc.
    Privacy Act
  15. Any unclassified information providing clues in regards to US and friendly forces' activities, capabilities, intentions, or limitations that an adversary might need to gain a military, diplomatic, or technological advantage.
    Critical Information (CI)
  16. Measures and controls taken to deny unauthorized persons information derived from information systems of the United States Government related to national security and to ensure the authenticity of such information systems.
    Communications Security (COMSEC)
  17. COMSEC has been subdivided into what four manageable security programs?
    • Transmission Security (TRANSEC)
    • Cryptographic Security (CRYPTOSEC)
    • Emission Security (EMSEC)
    • Physical Security
  18. The component of COMSEC resulting from the application of measures designed to protect transmissions from interception and exploitation by means other than cryptanalysis, or complex code-breaking techniques used to reveal encrypted information.
  19. True or False: TRANSEC techniques are used to protect or secure transmitted classified or sensitive information.
  20. What are examples of authorized TRANSEC methods?
    • Change radio frequencies
    • Cancel or alter communication patterns
    • Implement radio silence
    • Use frequency hopping systems
    • Use directional antennas
  21. The component of COMSEC resulting from the provision and proper use of technically sound crypto systems.
  22. Provides protective measures that will deny unauthorized personnel access to classified information and intelligence that might be derived from the interception and analysis of unintentionally emitted electrical signals from systems processing classified information.
  23. The part of COMSEC that results from using all physical measures necessary to safeguard COMSEC material from access by unauthorized persons.
    Physical Security
  24. The transformation of ordinary text data (plaintext) into coded form (ciphertext) and then recovering the plaintext data from its ciphertext form.
  25. Cryptography relies on what two basic components?
    An algorithm and a Crypto-Key.
  26. Turning ordinary data (plaintext) into a coded form (ciphertext).
  27. The authorized use of cryptographic systems to return encrypted information to its original, readable form.
  28. The mathematical function or formula used in encryption or decryption.
  29. The parameter or numeric value used in encryption and decryption.
  30. What is another name for the Crypto-Key?
  31. The act or science of deciphering a code or coded message without prior knowledge of the key.
  32. Points in the program where people break the security provided.
  33. Actual or perceived actions that may cause harm to information or equipment.
  34. The organization that approves all cryptographic systems and techniques used by or on behalf of DOD activities to encrypt classified and certain sensitive information.
    The National Security Agency (NSA)
  35. The organization that approves all techniques and systems used to encrypt unclassified sensitive information.
    The National Institute of Standards and Technology (NIST)
  36. What are the two basic types of approved cryptographic systems?
    Secret-Key and Public-Key systems
  37. What is another name for Secret-Key system?
    Symmetric cryptography
  38. System of cryptography in which the key used by the receiver to decrypt the message must be a mirror image of the key that was used to encrypt the message by the transmitter.
    Secret-Key System
  39. What are the advantages of secret-key cryptography?
    • It allows for a very secure means of telecommunication and is approved by the NSA for classified use.
    • It has the ability to achieve high encryption/decryption speeds using hi-tech crypto systems, significantly faster than public-key sytems.
  40. What are the two type categories of algorithms utilized by secret-key cryptography?
    Block and Stream ciphers.
  41. Symmetric algorithms that operate by encrypting/decrypting one chunk of data at a time. The most common type of symmetric algorithm.
    Block ciphers
  42. Symmetric algorithms that encrypt/decrypt varying lengths of data in a continuous stream instead of a fixed chunk one at a time.
    Stream ciphers
  43. A stream of pseudo-random digits that are combined with plaintext to generate ciphertext in stream ciphers.
  44. What is the key-stream determined by?
    the crypto-key
  45. What is the problem with secret-key systems?
    The key must be distributed to all sides to establish a mirror image and if it is compromised, then messages encrypted with any copies of that key can easily be decrypted.
  46. A publicly known block cipher cryptographic algorithm that converts plaintext into ciphertext using a key that consists of 64 binary digits.
    It is considered unsecure and insufficient for classified use.
    Data Encryption Standard (DES)
  47. A block cipher secret-key algorithm that implements a three-fold compound operation for encryption/decryption.
    Triple Data Encryption Standard (3DES)
  48. A previously classified symmetric encryption/decryption block cipher algorithm developed by the U.S. Government that not only encrypts the message, but also the key to the encrypted message by means of a key combined from two escrowed key which is itself encrypted by a "family key."
    -Widely used in Fortezza card technology for voice encryption systems.
    -consists of a 64-bit codebook using a 80-bit crypto-variable session key.
  49. The National Institute of Standards and Technology (NIST) chose the new symmetric Advanced Encryption Standard (AES) on what basis?
    A combination of security, performance, efficiency and ease of implementation.
  50. What algorithm was chosen by NIST as the new symmetric block cipher AES and is the most popular in both the commercial and government sectors?
  51. What's another name for Public-Key Systems?
    Asymmetric cryptographic systems
  52. System of cryptography that uses two different keys (a public-key for encryption and the private-key for decryption.)
    Public-key system
  53. What is the advantage of asymmetric key cryptography?
    It uses keys that are so different that it would be possible to publicize one without danger of anyone being able to derive or compute the other.
  54. What determines the strength of an encryption device?
    The larger the key length, the more possible keys there will be to search through to break the code, and the information will be more secure.
  55. Telecommunication encryption systems have been divided into what four general applications?
    Data, Voice, Bulk, and Network
  56. Encryption systems that secure data transmission to and from various types of terminal equipment, such as desktop computers, servers, teletypes, and etc.
    Data Encryption
  57. What are some hardware devices approved by the NSA for data encryption?
    KG-84, KG-84A, KG-84C, and KIV-7HS
  58. KG-84 A and C can handle data at what levels of security?
    All levels of security, they will assume the classification level equal to that of the keying material used.
  59. The KIV-7HS can handle data at what levels of security?
    The KIV-7HS can provide security protection up to TOP SECRET.
  60. What are some encryption systems commonly used to secure classified voice transmissions?
    KY-57, KY-58, KY-68, and the Secure Terminal Equipment (STE)
  61. The KY-57 and KY-58 are approved by the NSA for voice encryption up to what security level?
  62. The KY-68 is approved by the NSA for voice encryption up to what security level?
  63. The U.S. Government's current, encrypted telephone communications system for wired or "landline" communications.
    Secure Terminal Equipment (STE)
  64. What are bulk encryption systems also known as?
    Trunk encryption devices (TEDS)
  65. A high-speed pipeline of aggregated frequencies created by using a device called a multiplexer to combine multiple signals from various data and/or voice sources into one T1, T3, or optical link.
    A trunk.
  66. What are some examples of TEDs (bulk encryption systems)?
    KG-194, KG-194A, KIV-19 and KG-175
  67. KG-194 and KG-194A TEDS can secure bulk traffic up to what security level?
    Top Secret
  68. A miniaturized KG-194 that is functionally equivalent and interoperable with the KG-194 and KG-194A.
    KIV-19 TED
  69. Products that protect classified data while in transit over Internet Protocol (IP) networks.
    Network encryption systems
  70. What is the most common network encryption system used in our field?
    The KG-250 IP Network Encryptor
  71. The material and information that deals with COMSEC is handled and controlled to a very high level because it involves what controlled cryptographic items (CCI)?
    Keying systems, code books, cryptographic operating instructions, and other materials used to military voice and data communication systems.
  72. What are the three management roles that the COMSEC authority has been locally delegated to bear the responsibility of ensuring the integrity and proper application of the program?
    • COMSEC Manager
    • COMSEC Responsible Officer (CRO)
    • Authorized User
  73. Person who is usually the wing-level manager for the base COMSEC account and all COMSEC programs and materials on base as well as the local point of contact for all matters pertaining to COMSEC.
    COMSEC Manager
  74. The squadron or flight liasons between the base COMSEC manager and authorized users.
    COMSEC Responsible Officer (CRO)
  75. What are some of the responsibilities of the CRO?
    • Administering the physical security procedures for his/her responsible sub-account.
    • Validating access to materials and training/certifying all authorized COMSEC users.
    • Ensuring that COMSEC users of his/her responsible sub-account have the materials (keys, manuals, equipment, etc.) needed to support mission requirements and that they are aware of all COMSEC policies and procedures in safeguarding, handling, and controlling the material.
  76. Individual designated by the CRO to use COMSEC materials and equipment to perform his/her mission and who must safeguard these assets at all times.
    COMSEC Authorized User
  77. All questions the authorized user has regarding COMSEC policies and procedures, the safeguarding and handling of materials, and account discrepancies will be directed to who?
    The CRO
  78. What are the three requirements must be verified and valid in order to be granted unrestricted (unescorted) access to areas containing COMSEC materials?
    • Need-to-Know
    • Proper Security Clearance
    • Proper Identification
  79. What are two areas protected by physical security?
    Controlled areas and restricted areas
  80. Facilities containing military resources, which could be targets for theft, compromise, or destruction and to which entry must be limited in order to provide protection.
    Controlled Areas
  81. Any areas under military jurisdiction in which special security measures are employed to prevent unauthorized entry.
    Restricted Areas
  82. A restricted area, room, group of rooms, buildings, or installation where sensitive compartmented information (SCI) may be stored, used, discussed, and/or electronically processed.
    Sensitive Compartmented Information Facility (SCIF)
  83. Information that refers to protecting materials and information from unwanted access, sometimes known as a breach.
    Safeguarding information
  84. A government agency that has worked to establish standards for storage containers used to safeguard materials classified under each of the three classifications.
    The General Services Administration (GSA)
  85. Top Secret information can be stored in what class of vault?
    Class "A" vault
  86. Classification of material that must be stored in an area that is alarmed and under continuous surveillance by armed guards.
    Top Secret
  87. GSA safes and vaults securing Top Secret material must be equipped with a lock with what capability?
    Dual-combo capability to ensure Two-Person Integrity
  88. Secret material must be stored in a GSA-approved safe or what class of vault?
    Class "B" vault (or Class "A" vault with TS)
  89. What must any approved GSA container have attached to it?
    A Standard Form 702, Security Container Check Sheet (SF 702)
  90. What is the SF 702 (Standard Form 702, Security Container Check Sheet) used to record?
    • Who opened/closed the container
    • What time it was opened/closed
    • Who checked the container to ensure it was secured properly
  91. How often are combinations changed for combination locks and how often for cipher locks?
    • Annually for combination locks
    • Monthly for cipher locks
  92. When must be combinations be changed immediately?
    • When:
    • a person who knows the combination no longer requires access to the container for any reason other than death.
    • a container certified as locked is found open.
    • the combination is compromised.
    • any repair work as been performed on the combination lock
  93. An access list should contain what information?
    The names, social security numbers, and security clearances of only those personnel who have a a sufficient need-to-know, therefore a need to access the area of information or material.
  94. Who signs the authorized access list for an individual user's area?
    The COMSEC manager or the CRO
  95. The arrival and departure of all personnel not named on authorized access lists is recorded on what?
    Visitor's Register Log or AF Form 1109
  96. A system of storage and handling required when dealing with Top Secret information and material that is designed to prohibit individual access to certain COMSEC keying material.
    Two-Person Integrity (TPI)
  97. What are the three goals of COMSEC inventory?
    • Personnel should know what materials they have,
    • where those materials are, and
    • that the materials are properly protected and accounted for
  98. Form used to record daily, shift, or local inventories of accountable COMSEC material.
    AFCOMSEC Form 16
  99. What are the four areas recorded on AFCOMSEC Form 16?
    • Short Title
    • Quantity
    • Edition
    • Registry/"Reg" Number
  100. Used to identify the level of accountability of a particular COMSEC item.
    Accounting Legend Codes (ALCs)
  101. ALC material that must be inventoried every day the storage container is opened.
  102. ALC material that are inventoried by short title and quantity rather than accounting control number.
  103. ALC material that does not require inventory unless the local COMSEC Manager directs it.
  104. ALC material that is reserved for Electronic Keys
  105. When must you perform page checks of classified COMSEC publications?
    • Before initial issue to any aircrew
    • After a change or amendment
    • Prior to destruction
    • At the COMSEC manager's discretion
  106. Who must ensure page checks of COMSEC publications are completed?
    The COMSEC manager and CRO
  107. How must you complete page checks?
    • Consulting the list of Effective & Sensitive Pages page or the document cover.
    • Checking that each page is exactly as described
    • Recording the check on the Record of Page Checks page or, if the publication has no Record of Page Checks page, on the Record of Amendments page or front cover
    • Annotate the date, signature, and command of the person making the check
  108. Where do you record a page check?
    • On the Record of Page Checks page
    • The Record of Amendments page (if no Record of Page Checks page)
    • The front cover
  109. What are the guidelines for making amendments of COMSEC material?
    • A first person must add the new pages, check the removed pages against the amendment instructions to make sure that only the obsolete pages are removed, and record the changes on the Record of Amendments page in the basic document.
    • A second person must check the pages of the basic document against the current list of effective pages and record the check on the Record of Page Checks page in the basic document.
  110. What form is commonly used as a destruction certificate of COMSEC material?
    (SF 153) Standard Form 153, COMSEC Destruction Report
  111. How many people must be present before destroying COMSEC material?
    Two; the individual performing the destruction and the witness
  112. The date at which COMSEC material becomes outdated (or superseded)
    The supersession date
  113. Destruction that occurs when material is destroyed without proper authority or is destroyed before the supersession date.
    Premature Destruction
  114. Destruction that occurs when material is destroyed completely by accident.
    Inadvertent Destruction
  115. What are the three conditions of destruction that take place?
    Normal, precautionary, and emergency
  116. Destruction that occurs when classified material no longer serves a useful purpose.
    Routine Destruction
  117. What are approved methods for routine destruction for Paper COMSEC Aids?
    Burning, (crosscut) shredding, and pulverizing/pulping
  118. What are approved methods for routine destruction for non-paper COMSEC Aids?
    burning, pulverizing or chopping, and chemical alteration
  119. Destruction that is performed any time there is imminent danger of classified material being compromised when attack by an enemy force is probable.
    Precautionary Destruction
  120. Term referring to actions planned for use during various scenarios (for example, fire, evacuation, and destruction)
    Emergency Action Plans (EAPs)
  121. Classified COMSEC material to destroy in an emergency should be separated into what three categories?
    Keying Material, COMSEC Documents, and Cryptographic Equipment
  122. What are the emergency destruction priorities for keying material?
    All superseded keying material will be destroyed first and then any current keying material.
  123. What are the emergency destruction priorities for COMSEC documents?
    Maintenance manuals will be destroyed first, then any other classified documents, and classified COMSEC files will be destroyed last.
  124. What are the emergency destruction priorities for cryptographic equipment?
    First destroy critical elements of the cryptographic equipment and if time permits, destroy specific cryptographic elements.
  125. What are two methods of emergency destruction which are not suitable for routine destruction?
    Sodium nitrate and thermite-incendiary devices
  126. Determines protective measures that will deny unauthorized personnel access to classified information and intelligence that might be derived from the interception and analysis of unintentionally emitted electrical signals from systems processing classified information.
  127. Unintentional intelligence-bearing signals which, if intercepted and analyzed, may disclose the information transmitted, received, handled, or otherwise processed by any information-processing equipment.
    Compromising emanations
  128. A codename referring to investigations and studies of compromising emission (CE)
  129. What is the goal of TEMPEST?
    To hinder an opponent's capability to collect information about the internal data flow of communications equipment.
  130. What is the purpose of Red/Black separation?
    It requires that electrical and electronic components, equipment, and systems processing plain text information (RED) be kept separate from those that process encrypted information (BLACK).
  131. How far should Red and Black equipment be separated?
    At least 3 feet
  132. How far should Black voice equipment be separated from Red equipment?
    At least 6 feet
  133. What is the goal of EMSEC and the RED/BLACK concept?
    To control compromising emanations and protect against Electromagnetic Pulse/High-altitude Electromagnetic Pulse (EMP/HEMP) by using proper grounding, bonding, and shielding methods as well as filtering and isolation techniques to create physical, electrical and electromagnetic barriers around equipment, aircraft and facilities.
  134. What agency must approve modifications to CCI?
    The NSA
  135. What are unauthorized (non-approved) modifications to CCI considered?
  136. What is done to prevent unauthorized modifications in the case of corporate or government ciphering devices?
    The equipment will normally be shipped right from the production line via courier directly to the customer who will then store it under lock-and-key.
  137. What is done to prevent unauthorized modifications in the case of a military client?
    The shipment goes right from the production line to a central COMSEC depot via a special courier, where it is checked out before being issued for use in the field.
Card Set:
Block 2
2013-05-19 14:35:04

Bryan Hall
Show Answers: