• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back

Operations Security (OPSEC) purpose

Reduce vulnerability of Air Force missions by eliminating or reducing successful adversary collection and exploitation of critical information

OPSEC applies to all activities that _______, ______, ________during all phases of operations.

Prepare, sustain, or employ forces

The Air Force uses OPSEC measure to protect its _________.

critical information

________ is a specific fact about friendly intentions, capabilities, and activities vitally needed by adversaries for them to plan and act effectively so as to guarantee failure for friendly mission accomplishment.

Critical information

An _________ is a friendly detectable action and open-source information interpreted or pieced together by an adversary to derive critical information.

indicator

_________ is defined as measures that protect and defend information and information systems by ensuring availability, integrity, confidentiality, authentication, and non-repudiation.

Information Assurance (IA)

Information Assurance protective measures

Identification and Authentication


Access Control


Controlling Maintenance Activities


Configuration Management


Malicious Logic Protection


User Awareness Training

______ protects information by using the proper application of cryptographic security, physical security, and transmission security.

Communications Security (COMSEC)

_______ is the conversion of data into a form that cannot be easily understood by unauthorized people.

Encryption

_______ is the restoration of encrypted data to its original plain text or other readily usable state

Decryption

_______ is the use of coding systems to encrypt and decrypt information

Cryptography

_______ is the science of rying to break a coding system so the information can be revealed

Crypto-analysis

What are the two programs under COMSEC?

CRYPTOSEC


TRANSEC

Two types of Protected Distribution System (PDS)

Hardened Distribution System


Simple Distribution System

_______ is a wire line or fiber-optic telecomm system that includes terminals and characteristics to permit its use for the encrypted transmission of classified info

Protected Distribution System (PDS)

_______ is all security measures taken to safeguard Air Force information system resources effectively and efficiently.

Computer Security (COMPUSEC)

Three categories of COMPUSEC vulnerabilities

Unauthorized access


Malicious logic


Fraud, Waste, and Abuse

A common threat to computer systems is ________ logic. It includes _______, _______, and ________.

Malicious




Computer viruses, spyware, and steal-ware

Security of encrypted data is based on two things:

Strength of cryptographic algorithm


Secrecy of Key

Two basic types of cipher cryptosystems

Secret-key


Public-key

One key is used for both encryption and decryption

Secret-key system

In a __________, all users are issued two keys, a ______ key and a ______ key.

Public key system




public


private

In a public-key system, the public key is used to _______ data, the private key is used to _______ data.

Encrypt


Decrypt