Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
7 Cards in this Set
- Front
- Back
Define Spillage
|
Overclassified data on the network
|
|
Procedures for correcting spillage
|
-Immediately notify CoC, CSM or CO
-If they may be involved, notify next higher authority or NCIS |
|
TPI
|
Measures taken to prevent single person access to COMSEC keying material and cryptographic maintenance manuals.
Accomplished by: -Two person presence -Two Combination Locks -Two Locking Devices *NO one person can have access to both locks |
|
Reportable PDS
|
-Premature out of sequence use
-Inadvertant destruction of COMSEC material -Unauthroized adjustments of preconfigured default password parameters on Local Management Devices |
|
Non-Reportable PDS
|
-Improperly completed accounting reports
-Late destruction -Removing Keying material from its protective packaging prior to issue for use -Receipt of a package with a damaged outer wrapper but an intact inner wrapper |
|
Purpose of the EKMS Manager
|
Electronic Key Management System
Responsible for the proper distribution, control, security and accountability of certain highly sensitive comms material, key, and related pubs. |
|
Explain the purpose of the Caveat, SCI
|
Sensitive Compartmental Information
Classiied info concerning, or derived from, intel sources, methods, or analytical processes requiring handling withing formal access control systems established by the Director Central Intelligence |