Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
23 Cards in this Set
- Front
- Back
Operations Security (OPSEC) purpose |
Reduce vulnerability of Air Force missions by eliminating or reducing successful adversary collection and exploitation of critical information |
|
OPSEC applies to all activities that _______, ______, ________during all phases of operations. |
Prepare, sustain, or employ forces |
|
The Air Force uses OPSEC measure to protect its _________. |
critical information |
|
________ is a specific fact about friendly intentions, capabilities, and activities vitally needed by adversaries for them to plan and act effectively so as to guarantee failure for friendly mission accomplishment. |
Critical information |
|
An _________ is a friendly detectable action and open-source information interpreted or pieced together by an adversary to derive critical information. |
indicator |
|
_________ is defined as measures that protect and defend information and information systems by ensuring availability, integrity, confidentiality, authentication, and non-repudiation. |
Information Assurance (IA) |
|
Information Assurance protective measures |
Identification and Authentication Access Control Controlling Maintenance Activities Configuration Management Malicious Logic Protection User Awareness Training |
|
______ protects information by using the proper application of cryptographic security, physical security, and transmission security. |
Communications Security (COMSEC) |
|
_______ is the conversion of data into a form that cannot be easily understood by unauthorized people. |
Encryption |
|
_______ is the restoration of encrypted data to its original plain text or other readily usable state |
Decryption |
|
_______ is the use of coding systems to encrypt and decrypt information |
Cryptography |
|
_______ is the science of rying to break a coding system so the information can be revealed |
Crypto-analysis |
|
What are the two programs under COMSEC? |
CRYPTOSEC TRANSEC |
|
Two types of Protected Distribution System (PDS) |
Hardened Distribution System Simple Distribution System |
|
_______ is a wire line or fiber-optic telecomm system that includes terminals and characteristics to permit its use for the encrypted transmission of classified info |
Protected Distribution System (PDS) |
|
_______ is all security measures taken to safeguard Air Force information system resources effectively and efficiently. |
Computer Security (COMPUSEC) |
|
Three categories of COMPUSEC vulnerabilities |
Unauthorized access Malicious logic Fraud, Waste, and Abuse |
|
A common threat to computer systems is ________ logic. It includes _______, _______, and ________. |
Malicious Computer viruses, spyware, and steal-ware |
|
Security of encrypted data is based on two things: |
Strength of cryptographic algorithm Secrecy of Key |
|
Two basic types of cipher cryptosystems |
Secret-key Public-key |
|
One key is used for both encryption and decryption |
Secret-key system |
|
In a __________, all users are issued two keys, a ______ key and a ______ key. |
Public key system public private |
|
In a public-key system, the public key is used to _______ data, the private key is used to _______ data. |
Encrypt Decrypt |