• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

Card Range To Study



Play button


Play button




Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

33 Cards in this Set

  • Front
  • Back

Primary source for U.S. law. The official, subject matter order, compilation of the Federal laws of a general and permanent nature currently in force. Divided into 52 titles.

U.S. Code

U.S. Code Title for role of commerce and trade

U.S. Code Title 15

U.S. Code Title for criminal and penal code

U.S. Code Title 18

U.S. Code Title for role of U.S. National Guard

U.S. Code Title 32

U.S. Code Title which outlines role of War and National Defense. Covers establishment of Council of National Defense

U.S. Code Title 50

Defines how joint forces use information operations (IO) to support national military strategy. Provides doctrine for planning, preparation, execution, and assessment of IO across range of military operations

Joint Doctrine for Information Operations (Joint Pub 3-13)

Explains Air FOrce perspective on information superiority and defines it as the degree of dominance in the information domain which allows friendly forces the ability to collect, control, exploit, and defend information without effective opposition.

Air Force Doctrine (AFDD 3-13)

What is the integrated employment of the capabilities of influence operations, electronic warfare operations, and network warfare operations? Works in concert with specified integrated control enablers to influence, disrupt, corrupt, or usurp adversarial human and automated decision making systems.

Information Operations (IO)

Provides predominantly non-kinetic capabilities to the warfighter.

Information Operations (IO)

___________ is a new term. It is NOT IO, but rather the "gain and exploit" capabilities critical to air, space, and IO.

Integrated Control Enablers (ICE)

Five policies established for network usage

Network usage policy

Internet usage policy

Personal software policy

Email usage policy

User account policy

Provides clear/concise instructions for safe and effective operations and maintenance of centrally-acquired and managed Air Force military systems.

Air Force Technical Order (TO)

Describes the Air Force TO System and provides guidance and general management procedures.

TO 00-5-1

INformation operation (IO) rules of engagement are developed based on the _________ needs of operational area commanders and the ____________ tasking order at hand.



IO rules of engagement (ROEs) involve planning, execution, coordination, targeting, monitoring, adjustment, and assessment of information and are integrated by the _______________.

Information Warfare Flight

Policy makers have yet to clearly define the ____________ that govern use of cyber weapons and capability.

rules of engagement

The ________________ was meant to bolster computer and network security within the US Gov't by mandating yearly audits.

Federal Information Security Management Act of 2002 (FISMA)

FISMA compliance is a matter of _________, and therefore is scrutinized at the highest level of government.

National security

Some FISMA requirements for agencies to provide their own network security are ___________, _____________, ____________.

system monitoring

intrusion detection systems

port and vulnerability scanning

Three examples of cyberspace security tools

Intrusion Detection System (IDS)

Port Scanning

Vulnerability Scanning

Government agency responsible for testing and deploying Intrusion Detection Systems (IDS)

Department of Homeland Security

Intrusion Detection System (IDS) that monitors network gateways of gov't departments and agencies in the U.S.


The ___________ monitors network activity across the Air Force's segment of the military's Global Information Grid (GIG)

Cyber Control System

Topics covered by cyber ethics

private data collections



intellectual property rights

digital rights management

accuracy and accessibility

censorship and filtering

Two documents that outline practices to clarify cyber ethics

Request for Comments (RFC) 1087

The Code of Fair Information Practices

What is the goal of the Information Security (INFOSEC) program?

Efficiently and effectively protect Air Force information by delegating authority to the lowest levels possible.

Information is _________ if it is associated with an individual and its disclosure might not be in the individual's best interests.


The most common condition for processing personally identifiable (PII) information is that the subject has given ___________ consent.


What is the communicated or documented knowledge that is owned, produced, or controlled by the Department of Defense (DoD)?

It is broken into two categories, ________ and ________.

Official Information

classified; unclassified

Classified information is information that must be safeguarded/require protection against unauthorized disclosure in the interest of __________.

Disclosure of classified information could cause damage to __________.

National DEFENSE


What prescribes the management, access, handling, and denial of access to records within a system of records.

Applies to personal information regarding living __________ and ___________.

Privacy Act of 1974

U.S. citizens; permanent resident aliens

The Air Force Privacy Act Program ____________, sets guidelines for personal information

AFI 33-332

The ________ allows certain types of information to be withheld from release to the public if, by its disclosure, a foreseeable harm would occur.

Freedom of Information Act (FOIA)