1/33
34 vocabulary flashcards covering the essential terms and definitions from Unit 7 Security Programs: COMPUSEC, TEMPEST, INFOSEC, OPSEC, and COMSEC.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
COMPUSEC
Security discipline focused on protecting the CONFIDENTIALITY, INTEGRITY, and AVAILABILITY (CIA triad) of computer systems and data.
CIA Triad
The three core goals of information security: Confidentiality, Integrity, and Availability.
Hashing
Integrity-checking technique that produces a fixed-length value to verify a file was not altered during transfer or storage.
Availability (in COMPUSEC)
Ensuring data and services are accessible when needed; supported through permissions, backups, fault tolerance, and clustering.
Clustering
Using multiple servers as one logical unit so another node can take over if one fails, thus preserving availability.
Fraud, Waste, and Abuse
Intentional deception that unlawfully deprives the Air Force (or any organization) of something of value.
TEMPEST
Program that identifies and mitigates vulnerabilities caused by compromising electromagnetic emanations from information systems.
Compromising Emanations
Unintentional electrical or electromagnetic signals that may disclose classified or sensitive information.
Electromagnetic Interference (EMI)
Energy radiated by electronic devices; present in ALL electronics and a concern for TEMPEST.
Red/Black Separation
TEMPEST rule requiring physical and electrical isolation between classified (red) and unclassified (black) circuits/cabling.
Fiber-Optic Cabling
Transmission medium not subject to TEMPEST separation requirements because it does not radiate compromising emanations.
INFOSEC
Discipline aimed at identifying and protecting classified information and Controlled Unclassified Information (CUI).
Information Protection (3 Disciplines)
Personnel Security, Industrial Security, and Information Security.
Controlled Unclassified Information (CUI)
Unclassified information that requires safeguarding or dissemination controls pursuant to law or policy.
FOIA (Freedom of Information Act)
U.S. law granting the public the right to request access to federal agency records.
FOUO (For Official Use Only)
Unclassified designation exempt from public release because disclosure could cause foreseeable harm.
Privacy Act of 1974
Federal statute governing collection, maintenance, use, and dissemination of personal information by federal agencies.
Personally Identifiable Information (PII)
Data that can identify an individual, e.g., Social Security Number; protected under the Privacy Act.
Top Secret (Classification)
Information whose unauthorized disclosure could cause EXCEPTIONALLY GRAVE damage to national security.
Secret (Classification)
Information whose unauthorized disclosure could cause SERIOUS damage to national security.
Confidential (Classification)
Information whose unauthorized disclosure could cause DAMAGE to national security; may be transmitted by any means approved for Secret or by USPS.
Transmission of Top Secret Information
Must use encrypted communication systems or cleared courier service specifically authorized for Top Secret material.
OPSEC (Operations Security)
Process for identifying, analyzing, and controlling critical information to reduce adversary exploitation across ALL phases of operations.
Critical Information
Specific facts about friendly intentions, capabilities, or activities that, if revealed, could harm mission success.
Indicator (in OPSEC)
Open-source piece of information that, when combined with other data, can reveal critical information to an adversary.
Social Media (OPSEC Risk)
One of the easiest avenues for adversaries to collect information about military operations through user posts and interactions.
COMSEC
Protective measures applied to communications and information systems that handle classified or sensitive data.
Encryption
Conversion of data into ciphertext so it cannot be easily understood without the proper key.
Decryption
Process of restoring encrypted data back to its original plaintext form.
Cryptography
Study and application of codes and ciphers used to encrypt and decrypt information.
Cryptanalysis
Science of breaking or decoding encrypted information without the key.
Cryptosecurity
Protection achieved through the proper, authorized use of cryptographic systems.
TRANSEC (Transmission Security)
Measures that protect transmissions from interception and exploitation by means other than cryptanalysis, e.g., frequency hopping.
GSA-Approved Safe
General Services Administration security container that provides physical protection for classified COMSEC material.