AFH 1 Section 11 "Security"

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/224

flashcard set

Earn XP

Description and Tags

26E5

Last updated 1:04 AM on 4/16/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

225 Terms

1
New cards

What is the purpose of security

Never permit the enemy to acquire an unexpected advantage

2
New cards

The lethal consequences of an enemy attack make the seurity of ______ forces a paramount concern

Friendly

3
New cards

Security applies to ____ USAF members at all times

all

4
New cards

Integrated defense does not stand alone to protect personnel and resources. How do planners create an effective security program

Coordination with other DOD and DAF programs

5
New cards

What does the protection and defense of air bases require

Coordination of emergency management, antiterrorism and other mission support function forces under the mission assurance umbrella

6
New cards

What program integrates multidisciplinary active, passive, offensive and defensive capabilities employed to mitigate potential risks and defeat threats to USAF ops

The USAF Integrated Defense Program

7
New cards

What is the goal of integrated defense

Neutralize security threats within a base boundary and the base security zone to ensure unhindered operation

8
New cards

Threat actors include, but are not limited to; terrorists, insiders, _____, foreign intelligence, and security services

criminals

9
New cards

What are the 4 potential hazards to a base

1)CBRNE attacks

2) Natural and man-made disasters

3) Major accidents

4) Accidental or deliberate release of hazardous materials, toxic industrial materials or chemicals

10
New cards

Integrated defense is a “All Airmen” program. What does the teaming effort create

A united, seamless defense, stronger than the defensive efforts of individuals or individual units

11
New cards

What does integrated defense enssure

All airmen are trained to defend themselves and integrate into defense operations

12
New cards

For additional information on integrated defense, refer to AFPD ____, Integrated Defense

31-1

13
New cards

What is the base perimeter

A physical boundary of the installation

14
New cards

The base boundary, as defined in JP ____, Joint Security Operations in Theater, is a line that delineates the surface area of a base for the purpose of facilitating coordination and deconfliction of operations

3-10

15
New cards

The base boundary should be established with consideration for Mission, Enemy, Terrain and Weather, Time, Troops Available and Civil Considerations (METT-TC). Why are these important

Balancing these factors ensures that Integrated Defense forces can control key terrain while effectively accomplishing the mission

16
New cards

______ ______ may not always coincide with the fenced perimeter, property lines or legal boundaries

Base boundaries

17
New cards

The base security zone is a USAF-unique concept and term to be used _________ only

intra-service

18
New cards

How does the USAF use the planning term base security zone

Describe the area of concern around an air base into support the establishment and adjustment of the base boundary

19
New cards

How is the base security zone defined?

The area outside the base perimeter from which the base may be vulnerable to standoff weapons and waterborne threats

20
New cards

Who is responsible for identifying and arranging the base security zone to be recognized as the base boundary?

The installation commander

21
New cards

What happens if the base boundary does not include all of the terrain of the base securities zone?

The installation Commander must either mitigate or accept the risk of enemy attack from the terrain outside the base boundary

22
New cards

Commanders, execute integrated defense with the objective of achieving nine desired effects based on the risk management process. what are those side effects?

1) Anticipate

2) Deter

3) Detect

4) asses

5) Defeat

7) Delay

8) Defend

9) Recover

23
New cards

What is the purpose of the anticipate effect in integrated defense?

To anticipate threat intentions and actions through intelligence preparation of the operational environment or crime trend analysis

24
New cards

How do commanders a turf threat activity as part of integrated defense

Through active community policing, boundary and internal circulation control, controlled area marking and prudent physical security measures

25
New cards

What methods are used to detect threats in integrated defense?

Detection is achieved through the use of lighting, intrusion detection systems/early warning systems, close circuit television, among other methods

26
New cards

In integrated defense, what tools or methods are used to assess and identify friend or foe

Using cameras, posted centuries, response forces, and intrusion detection systems, among other methods

27
New cards

In integrated defense, how are friendly forces warned of an adversary activity?

Through mass notification systems such as radio, public address, commanders, access channels, voice, hand and arm signals, cellular telephones, and instant messenger/short message system texting

28
New cards

What strategies are employed to defeat threats in the integrated defense?

Threats are defeated through appropriate, progressive force application, coordinated security force response, and integration of forces

29
New cards

The ___ effect in integrated defense applies defense in depth procedures to delay adversaries through barriers, obstacles, technology, physical security measures, and forces

Delay

30
New cards

In integrated defense, the defend effect integrates all friendly forces into a single comprehensive threat and effects based plan. How is this accomplished?

By ensuring friendly forces are trained and qualified on arming and use of force

31
New cards

The recover effect, an integrated defense involves applying effective command and control, and developing an exercising the comprehensive emergency management plan ____

10-2

32
New cards

Are integrated defense desired effects randomly applied to an installation

No, they are deliberately achieved through innovative and reliable tactics, techniques and procedures based on integrated defense risk management (IDRM) process and analysis

33
New cards

Who is the C2 center for Integrated Defense during routing and emergency operations

Base Defense Operations Center (BDOC)

34
New cards

Who establishes a BDOC to coordinate and direct, via the operational chain of command, the tactical control of Integrated Defense forces and supporting capabilities

The Defense Force Commander

35
New cards

Central security control, the _____ ______ and other security forces’ control centers will operate under the BDOC’s control at all locations

law enforcement

36
New cards

What process enables installation commanders, integrated defense working groups, defense force commanders and defense planners to produce effects-based, integrated defense plans by using a standardized model to identify risk and develop risk management strategies

The Integrated Defense Risk Management Process (IDRMP)

37
New cards

What does the IDRMP identify

At-risk assets

38
New cards

In the IDRMP, what are 3 assessments are involved in developing risk reduction decision

1) Assets criticality

2) Threat

3) Vulnerability assessments

39
New cards

How many security protection levels are there

4

40
New cards

Protection level ____ is assigned to resources where loss, theft, destruction, damage, misuse or compromise would cause unacceptable mission degradation to the strategic capability of the US or catastrophic consequences to the nation

PL-1

41
New cards

What does PL-1 security provide

Maximum means to detect and defeat hostile force before it is able to seize, damage or destroy resources

42
New cards

____ security examples include nuclear weapons in storage mated to a delivery system or in transit, designated C3 facilities, and aircraft designated to transport the US President

PL-1

43
New cards

Protection level ____ is assigned to resources where loss, theft, destruction, damage, misuse or compromise would cause significant mission degradation to the war fighting capability

PL-2

44
New cards

What level of deterrence against hostile acts must PL-2 security provide

Significant levels of deterrence

45
New cards

What are 4 examples of PL-2 security resources

1) Non-nuclear alert forces

2) Designated space and launch systems

3) Expensive, few in numbers or one-of-a-kind systems or facilities

4) Intelligence gathering systems

46
New cards

Protection level ____ is assigned to resources where loss, theft, destruction, damage, misuse or compromise would cause mission degradation

PL-3

47
New cards

What does PL-3 security provide

Reasonable degree of deterrence against hostile acts

48
New cards

_____ security examples include non-alert resources that can be generated to alert status, selected C3 facilities, systems and equipment, and non-launch-critical or non-unique space launch systems

PL-3

49
New cards

Protection level ____ is assigned to resources where loss, theft, destruction, damage, misuse or compromise would adversely affect the mission

PL-4

50
New cards

How are PL-4 resources secured

Containing them in controlled areas with owners or users responsible for their security

51
New cards

What are 3 examples of PL-4 security resources

1) Facilities storing Cat I, II or III sensitive conventional arms, ammo and explosives

2) Fuels and oxygen storage

3) USAF accounting and vault areas

52
New cards

What is operations security purpose

To reduce the vulnerability of USAF missions by eliminating or reducing successful adversary collection and exploitation of critical information

53
New cards

Operation security applies to all activities that prepare, ______ or employ forces during all phases of operations

Sustain

54
New cards

Who recommends modifying the day-to-day activities at an installation or organization to create variations in the status quo

Operations security signature managers

55
New cards

Why does operations security identify, analyze, and control critical information that indicates friendly actions associated with military operations and other activities

1) Identify actions that can be observed by adversary intelligence systems

2) Determine what specific indications could be used to derive critical information in time to be useful to adversaries

3) eliminate the vulnerabilities of friendly actions to adversary exploitation

56
New cards

OPSEC involves examining what 4 phases of operations or activities

1) Planning

2) Preparation

3) Execution

4) Post-execution phases

57
New cards

OPSEC analysis helps decision makers weight the ____ to operations and decide how much they are willing to accept in particular operational circumstances

Risks

58
New cards

Operational effectiveness is enhanced when OPSEC is applied in the _____ phase

Planning

59
New cards

Why is OPSEC incorporated into day-to-day operations

To ensure seamless transition to contingency operations

60
New cards

What 5 distinct action constitute the OPSEC process

1) Identify critical informations

2) Analyze threats

3) Analyze vulnerabilities

4) Assess risk

5) Apply appropriate OPSEC countermeasures

61
New cards

What are OPSEC indicators

Friendly, detectable actions and open-source info that can be interested by an adversary to derive critical information

62
New cards

What is the 5 basic characteristics of OPSEC indicators that make them potentially invaluable to a adversary

1) Signatures

2) Associations

3) Profiles

4) Contrasts

5) Exposure

63
New cards

Information protection is a subset of the USAF security enterprise and consists of what 3 core disciplines

1) Personnel

2) Industrial

3) Information

64
New cards

What are the 3 core security disciplines used for

1) Determine military, civilian and contractor personnel eligibility to access classified information

2) Ensure the protection of classified information released or disclosed to industry in connection with classified contracts

3) Protect classified information and CUI that, if subject to unauthorized disclosure, could reasonably be expected to damage national security

65
New cards

Who is responsible for protecting classified information and CUI under their custody and control

All USAF personnel

66
New cards

What are the three levels of classification

1) Confidential

2) Secret

3) Top Secret

67
New cards

What are the three levels of classified information designed to protect

National Security

68
New cards

The unauthorized disclosure of information classified as _____ could reasonably be expected to cause exceptionally grave, identifiable and describable damage to national security

Top Secret

69
New cards

The unauthorized disclosure of information classified as _____ could reasonably be expected to cause serious, identifiable and describable damage to national security

Secret

70
New cards

The unauthorized disclosure of information classified as _____ could reasonably be expected to cause identifiable and describable damage to national security

Confidential

71
New cards

____ refers to information created or possessed by an entity, for or on behalf of the government

CUI

72
New cards

Laws, regulations or government-wide policies require or permit an agency to handle CUI using safeguarding or ____ controls

dissemination

73
New cards

____ classification is the initial decision that an item of information could reasonably be expected to cause identifiable or describable damage to national security if subjected to unauthorized disclosure, and requires protection in the interest of national security

Original

74
New cards

Who may originally classify information

Officials who are designated in writing

75
New cards

The USAF handles classified information and CUI IAW ____ policy

National

76
New cards

All cleared DoD personnel are authorized to derivatively classify information, provided they have received initial training and ____ refresher training

annual

77
New cards

When is information derivatively classified

When it is incorporated, paraphrase, restated or generated in a new form or document

78
New cards

What is one of the most impoortant responsibilities of a derivative classifier

To observe and respect the classification determinations made by an original classification authority

79
New cards

DoDM5200.01V2_DAFMAN_______, Information Security Program: Marking of Information, is the guidance for clearly marking and identifying classified information

16-1404V2

80
New cards

Markings on classified material alert holders to the presence of classified information and identify the information needing protection. What are 3 more purposes

1)Indicate assigned classification level

2) provide guidance on downgrading or declassifying

3) Give information on the sources and reasons for classification

81
New cards

Every classified document must be conspicuously marked to show the ____ classification of information it occurs

highest

82
New cards

What 7 things must each classified document be marked with

1) Overall classification

2) Banner lines

3) Portion markings

4) Classification authority block

5) Date of origin

6) Downgrading instructions

7) Declassification information

83
New cards

What are 3 most common marking on a classified document

1) Banner lines

2) Portion marks

3) Classification authority block

84
New cards

Who is responsible for taking proper precautions to ensure that authorized persons do not gain access to classified information

Everyone who works with it

85
New cards

What are 3 things required before a person can be granted access to classified information

1) Security clearance

2) Signed SF312, Classified Information Non-Disclosure Agreement

3) A need to know

86
New cards

Classified material must be kept under ____ surveillance by authorized persons once removed from storage

constant

87
New cards

What 3 forms used to cover classified information outside of storage

1) SF 703 (TS)

2) SF 704 (S)

3 SF 705 (C)

88
New cards

The SF ___, Activity Security Checklist, is used to perform end of day security checks of classified material

701

89
New cards

How should classified information systems specifically be stored at the end of the day

In a GSA approved safe or in buildings cleared for open storage

90
New cards

What must you do if you find classified material out of proper control

1) Take custody and safeguard

2) Notify your security manager or supervisor

91
New cards

What 6 terms describe classified general security incidents

1) Infraction

2) Violation

3) Compromise

4) Loss

5) Data spill

6) Information in the public media

92
New cards

Describe an infraction-type security incident involving classified information

It involves a failure to comply with requirements that cannot reasonably be expected to, and does not, result in the loss of classified records, or in the suspected or actual compromise of classified information

93
New cards

Infractions involving classified information may be unintentional or _____

inadvertent

94
New cards

An infraction involving classified information requires a _____ to facilitate immediate corrective action

Inquiry

95
New cards

Describe an violation-type security incident involving classified information

Knowing, willful negligence regarding security regulations

96
New cards

What are two consequences that violations can result in, or be expected to result in

Loss or compromise of classified material

97
New cards

Describe a loss-type security incident involving classified information

When classified material cannot be physically located or accounted for

98
New cards

Describe an data spill-type security incident involving classified information

Introduction of classified data on:

1) Unclassified system

2) A IS with a lower classification

3) Systems not accredited to process data of that category

99
New cards

How are data spills handled

Treated as possible compromise of classified information Involving IS, networks and computer equipment until an inquiry determines whether an unatuhorized disclosure actually occurred

100
New cards

What should you do if classified information appears in the public media or you are approached by a media rep

Do not make any statements or comments on the accuracy of the information