Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

PDG

USAF Chapter 19 - Security

QuestionAnswer
In the Air Force, security applies to all members of the Air Force at all times
Information Assurance is the responsibility of everyone
In the Air Force, Information Assurance is the responsibility of everyone. Information Assurance is defined as measures that protect and defend information and information systems by ensuring their availability, integrity, confidentiality, authentication, and nonrepudiation
The Air Force implements the Information Assurance Program to secure its information and information technology (IT) assets. The Air Force achieves this by using three core information assurance disciplines: communications security (COMSEC), computer security (COMPUSEC), and emissions security (EMSEC)
The Air Force Information Assurance Program is comprised of three programs: Communications Security (COMSEC), Computer Security (COMPUSEC), and Emissions Security (EMSEC). COMPUSEC consists of measures that protect hardware, software, firmware, and information being processed, stored, and communicated
Any telecomm or computer-related equipment or interconnected system or subsystems of equipment used in the acquisition, storage, manipulation, management, movement, control, display, transmission, or reception of voice or data and includes software, firmw information system
An action, device, procedure, technique, or other measure that reduces a vulnerability to an acceptable and manageable level (mitigating the overall threat). countermeasure
Adversaries increasingly rely on unconventional tactics to offset our superiority in conventional forces and technology. What activities pose the greatest threats to communications and information systems? Information Operations (IO) and Information Warfare (IW
The Air Force protects information systems from malicious logic (virus, worm, Trojan horse, and Botnets) attacks by applying an appropriate mix of preventive measures to include all of these answers
The Air Force Information Assurance Program is comprised of three programs: Communications Security (COMSEC), Computer Security (COMPUSEC), and Emissions Security (EMSEC). COMSEC consists of measures that deny access to information by unauthorized persons and ensure its authenticity
The Air Force Information Assurance program is comprised of three programs: Communications Security (COMSEC), Computer Security (COMPUSEC), and Emissions Security (EMSEC). COMSEC itself is comprised of three programs: Cryptosecurity, Transmission Security, and Physical Security
The Communications Security (COMSEC) program is comprised of three components: Cryptosecurity, Transmission Security, and Physical Security. Cryptosecurity is a component that focuses on the provision and proper use of technically sound cryptosystems
The Communications Security (COMSEC) program is comprised of three components: Cryptosecurity, Transmission Security, and Physical Security. Transmission Security is a component that protects transmissions from interception and exploitation by means other than cryptoanalysis
The Communications Security (COMSEC) program is comprised of three components: Cryptosecurity, Transmission Security, and Physical Security. Physical Security is a component that uses all physical measures necessary to safeguard COMSEC material from access by unauthorized persons
The Air Force Information Assurance Program is comprised of three elements: Communications Security (COMSEC), Computer Security (COMPUSEC), and Emissions Security (EMSEC). Emissions Security consists of measures that deny access to information through interception and analysis of compromising emanations
The process of identifying, analyzing, and controlling critical information indicating friendly actions associated with military operations and other activities is Operations Security (OPSEC)
The purpose of Operations Security (OPSEC) is to reduce the vulnerability of Air Force missions by preventing adversary collection and exploitation of critical information
Air Force forces can be under observation at their peacetime bases and locations, in training or exercises, while moving, or when deployed to the field conducting actual operations. Therefore, OPSEC principles must be integrated into all of these answers
OPSEC should be incorporated into day-to-day activities to ensure a seamless transition to contingency operations. The OPSEC process consists of five distinct steps: identify critical information, analyze threats, analyze vulnerabilities, assess risk, and apply appropriate OPSEC measures
Sources of OPSEC indicators are friendly, detectable actions, and open-source information that can be pieced together by an adversary to derive critical information
OPSEC indicators have five basic characteristics that make them potentially valuable to an adversary: Signatures, Associations, Profiles, Contrasts, and Exposure
OPSEC indicators have five basic characteristics: Signatures, Associations, Profiles, Contrasts, and Exposure. Signatures refers to the characteristic of an indicator that makes it identifiable or causes it to stand out
OPSEC indicators have five basic characteristics: Signatures, Associations, Profiles, Contrasts, and Exposure. Associations refers to the relationship of an indicator to other information or activities
OPSEC indicators have five basic characteristics: Signatures, Associations, Profiles, Contrasts, and Exposure. Profiles are defined as how each activity has its own set of unique signatures and associations
OPSEC indicators have five basic characteristics: Signatures, Associations, Profiles, Contrasts, and Exposure. Contrasts are any difference observed between an activity’s standard profile and its recent or current actions
OPSEC indicators have five basic characteristics: Signatures, Associations, Profiles, Contrasts, and Exposure. Exposure is when and for how long an indicator is observed
The Air Force policy to identify, classify, downgrade, declassify, mark, protect, and destroy its classified information and material consistent with national policy is known as Information Security (INFOSEC)
The initial decision an item of information could cause damage to the nat secur if subject to unautho disclosure, and the interests of the nat sec are best served by applying the safeguards of the Information Security Program to protect it is known as Original Classification
The decision that an item of information could damage national security if subject to unauthorized disclosure is known as original classification. The decision to classify information may only be made by persons who all of these answers
A Security Classification Guide (SCG) identifies specific items or categories of information for each system, program, plan, or project requiring classification. The SCG identifies all of these answers
Derivative classification is the application of classification markings to a document as directed by a Security Classification Guide or other source material
Every classified document must be marked to show the highest classification of information it contains
Every classified document must be marked to show the highest classification of information it contains. The overall classification will be marked, stamped, or affixed on the front cover, the title page, the first page, and the outside of the back cover
Every classified document must show the agency, office of origin, and date of origin on the first page, title page, or front cover
Information must be declassified as soon as it no longer meets the standards for classification
Information must be declassified as soon as it no longer meets the standards for classification. There are 4 separate systems that can bring about the declassification of information: all of these answers
If reason exists to indicate a document has been classified improperly or unnecessarily, personnel should submit challenges of classification to the security manager or the classifier of the information
Classified information must be protected at all times by either of two methods A. storing it in an approved device or facility B. having it under the personal observation and control of an authorized individual both A and B
Heads of activities that process or store classified information must establish a system of security checks at the close of each working day to ensure the area is secure. What form is used to record these checks? SF 701, Activity Security Checklist
A person may not have access to classified information unless determined to have the proper security clearance and the need to know
No one may have access to classified information without the proper security clearance and need to know. The responsibility for determining if a person has the proper security clearance and requires access to classified information rests with the individual authorized possession, knowledge, or control of the information
Classified information at the Top Secret level is controlled and accounted for through top secret control account systems
Classified information at the Secret level is controlled and accounted for through internal controls as determined by unit commanders or staff agency chiefs
Confidential information is controlled and accounted for through routine administrative procedures
Material classified at this level does not require a receipt when transferring the material either through the mail or in person. confidential
DoD military and civilian personnel are subject to sanctions if they knowingly, willfully, or negligently disclose classified information to unauthorized persons. Sanctions include, but are not limited to A. warning, reprimand, suspension without pay and forfeiture of pay B. removal, discharge, and loss of access to classified information C. action under the UCMJ and under applicable criminal law *D. all of these answers
The Personnel Security Program involves determining the trustworthiness of individuals before they have access to classified information
The Personnel Security program requires commanders and supervisors to continually observe their subordinates' behavior. If warranted, the commander forwards unfavorable information to the _____________ for adjudication. Air Force Central Adjudication Facility
Personnel security clearances are recorded in the Joint Personnel Adjudication System (JPAS)
The Industrial Security Program involves identifying information in classified contracts that must be protected while entrusted to industry
The Air Force Integrated Defense (ID) Program employs active and passive, as well as offensive and defensive, multidisciplinary capabilities to mitigate potential risks and defeat adversary threats to Air Force operations
The Air Force Integrated Defense (ID) Program ensures all Airmen are trained to defend themselves and integrate into defense operations
Installation commanders determine Integrated Defense (ID) requirements based on a four-step process: (1) Determining and prioritizing the criticality of installation assets, (2) Analyzing the threats and operating environment, and Assessing installation vulnerabilities, and (4) Making ID decisions
The Air Force Integrated Defense (ID) Program is an “all-Airmen” program. However, _____________ have enterprise lead in ID operations. Air Force Security Forces
The goal of the Air Force Integrated Defense (ID) program is to neutralize security threats throughout the base boundary (BB) to ensure unhindered Air Force operations
The Integrated Defense (ID) program does not stand alone in protecting personnel and resources. The protection and defense of air bases requires the coordinated effort of A. Emergency Management (EM) B. Antiterrorism (AT) C. other forces under the Force Protection (FP) umbrella *D. all of these answers
Joint Publications define the base boundary (BB) as a line that delineates the surface area of a base. Which of the following statements about the BB is true? The Base Boundary is not necessarily the base perimeter.
The Base Security Zone (BSZ) is an Air Force unique concept and term. The Air Force uses the term to describe the area of concern around an air base and to support the establishment and adjustment of the Base Boundary
The ______________ is the area outside the base perimeter from which the base may be vulnerable from standoff threats such as mortars or rockets. Base Security Zone (BSZ)
The command and control center for Integrated Defense (ID) operations during routine and emergency operations is the Base Defense Operations Center (BDOC
This is an action group whereby the sec for staff S-2 function coordinates with subject matter experts (SME) from the Intelligence and AFOSI communities to collaborate and conduct intelligence preparation of the operational environment (IPOE). the Intelligence Fusion Cell (IFC)
An analytical methodology which is a continuous, four-part process that: (1) defines the operating environment, (2) describes the operating environment’s effects, (3) evaluates the enemy, and (4) determines enemy course of action. Intelligence Preparation of the Operational Environment (IPOE)
Intelligence Preparation of the Operational Environment (IPOE) is a continuous, four-part process. Which part involves comprehensive lists of tasked forces, terrain and weather, and background data on the operating environment? define the operating environment
Intelligence Preparation of the Operational Environment (IPOE) is a continuous, four-part process. Which part involves analyzing the data collected in Part 1 and describing how the factors affect operations, equipment, and personnel? describe the operating environment’s effects
Intelligence Preparation of the Operational Environment (IPOE) is a continuous, four-part process. Which part involves making logical predictions of Enemy Course of Action? determine Enemy Course of Action (ECOA)
This func provides instal comm, integrated defense working groups, defense force comman, and defense planners the ability to produce effects-based, integrated defense plans by using a standar model to identify risks and develop risk management strategies. Integrated Defense Risk Management Process (IDRMP)
The Integrated Defense Risk Management Process (IDRMP) has four main components: (1) the risk assessment, (2) the risk tolerance decision, (3) course of action determination, and decision and implementation
Although the Integrated Defense Risk Management Process has four main components, they are accomplished in 7 steps. Step 4, Develop the Risk Assessment, states that a quantitative measurement of risk can be determined using the following equation: risk = asset criticality multiplied by (threat multiplied by vulnerability)
There are four Security Protection levels. Protection Level 1 (PL1) is assigned to those resources for which the loss, theft, destruction, misuse, or compromise would result in great harm to the strategic capability of the United States
Protection Level 1 (PL1) is assigned to those resources for which the loss, theft, destruction, misuse, or compromise would result in great harm to the strategic capability of the United States. Examples of PL1 resources are A. nuclear weapons in storage, mated to a delivery system or in transit B. designated command, control, and communications (C3) facilities C. aircraft designated to transport the President of the United States *D. all of these answers
There are four Security Protection levels. Protection Level 2 (PL2) is assigned to resources for which the loss, theft, destruction, misuse, or compromise would cause significant harm to the war-fighting capability of the United States
Protection Level 2 (PL2) is assigned to resources for which the loss, theft, destruction, misuse, or compromise would cause significant harm to the war-fighting capability of the United States. Examples of PL2 resources are A. nonnuclear alert forces and designated space and launch systems B. expensive, few in number, or one-of-a-kind systems or facilities C. intelligence-gathering systems *D. all of these answers
Protection Level 3 (PL3) is assigned to resources for which the loss, theft, destruction, misuse, or compromise would damage United States war-fighting capability
Protection Level 3 (PL3) is assigned to resources for which the loss, theft, destruction, misuse, or compromise would damage United States war-fighting capability. Examples of PL3 resources are selected C3 facilities, systems, and equipment
The lowest protection level is Protection Level 4 (PL4) which is assigned to resources that do not meet the definitions of PL1, PL2, or PL3 resources, but for which the loss, theft, destruction, misuse, or compromise would adversely affect the operational capability of the Air Force
This program seeks to deter or limit the effects of terrorist acts by giving guidance on collecting and disseminating timely threat infor, providing training, developing plans to deter terrorist incidents, and implementing antiterrorism measures. Air Force Antiterrorism Program
The first step in developing an effective antiterrorism program is identifying the potential terrorism threat to DoD personnel and assets
At a strat level, who is responsible for ensuring the timely colle proc, analysis, prod, and dissemin of foreign intel, current intel, and national-level intel infor concerning terrorist activities, terrorist org, and force protection issues? the Deputy Chief of Staff for Intelligence, Surveillance and Reconnaissance (HQ USAF/A2)
The _______________ is the lead Air Force agency for the collection, investigation, analysis, and response to threats arising from terrorists, criminal activity, and foreign intelligence and security services. Air Force Office of Special Investigations (AFOSI)
The AFOSI is the lead Air Force agency for collection, investigation, analysis, and response for threats arising from terrorists, criminal activity and foreign intelligence and is primarily focused on countering adversary intelligence collection activities against U.S. forces
What program provides random, multiple security measures that consistently change the look of an installation's anti-terrorism program to defeat surveillance attempts and make it difficult for a terrorist to accurately predict our actions? DOD Random Antiterrorism Measures (RAM) Program
When traveling overseas, members should A. travel in small groups B. try to be inconspicuous when using public transportation C. adopt the dress, conduct, and mannerisms of the people in the area *D. all of these answers
Criminal and terrorist acts against individuals usually occur outside the home. Your most predictable habit is the route you travel from home to your place of duty or to commonly frequented local facilities
Before traveling overseas, consult _____________ to ensure you know and can meet all requirements for travel to a particular country DoD 4500.54-G, DoD Foreign Clearance Guide
Before traveling overseas, get an area of responsibility specific threat briefing from your security officer, ATO, or appropriate counterintelligence or security organization. This briefing must occur within 3 months of travel
_____________ is the intelligence derived from the intelligence collection discipline that uses human beings as both source and collectors and where the human being is the primary collection instrument. Human Resources Intelligence or HUMINT
Information gathered and activities conducted to protect against espionage, sabotage, or assassinations conducted by or on behalf of foreign governments, foreign organizations or foreign persons, or international terrorist activities is Counterintelligence (CI)
The act of obtaining, delivering, transmitting, communicating, or receiving infor about the national defense with intent or reason to believe the info may be used to the injury of the US or to the advantage of any foreign nation is known as Espionage
Any action designed to undermine the military, economic, psychological, or political strength or morale of a regime is known as Subversion
An act or acts with intent to injure, interfere with, or obstruct the nat defense of a country by willfully injuring or destroy, or attemp to injure or destroy, any nat defense or war mate, premises, or utilities, to include human and natural resources is Sabotage
The calculated use of unlawful violence or threat of unlawful violence to inculcate fear; intended to coerce or intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological is terrorism
The Human Resources Intelligence or HUMINT effort consists of three primary functions interrogation, source operations, and debriefing
The systematic effort to procure information to answer specific collection requirements by direct and indirect questioning techniques of a person who is in the custody of the forces conducting the questioning is Interrogation
Source Operations refers to how trained military HUMINT collection personnel may develop information through the elicitation of sources including A. “walk-in” sources, who without solicit make the first contact with HUMINT pers B. dev sources that are met over a period of time and provide info, based on oper requi C. unwitting persons, with access to sensitive infor *D. all of these answers
The process of questioning cooperating human sources to satisfy intelligence requirements, consistent with applicable law, is known as debriefing
What operation is not a primary HUMINT function and exploits captured documents and media? Document and Media Exploitation
AFI 71-101, Volume 4, Counterintelligence, requires individuals who have reportable contacts or acquire reportable information to report the contact or information, either verbally or in writing, to AFOSI within 30 days of the contact
AFI 71-101, Volume 4, Counterintelligence, requires individuals who have reportable contacts or acquire reportable information to report the contact or information within 30 days of the contact. “Contact” means A. any exchange of information B. solicited or unsolicited telephone calls C. email, radio contact, and face-to-face meetings *D. all of these answers
The AFOSI conducts all counterintelligence investigations, operations, collections, and other related activities for the Air Force. In the United States, the AFOSI coordinates these activities with the Federal Bureau of Investigation (FBI)
The AFOSI conducts all counterintelligence investigations, operations, collections, and other related activities for the Air Force. Outside the United States, the AFOSI coordinates these activities with the Central Intelligence Agency and the FBI
What agency is the installation-level training agency for counterintelligence (CI) awareness briefings and is the sole Air Force repository for the collection and retention of reportable information? the AFOSI the AFOSI
Air Force members and employees must notify their commanders, supervisors, or the AFOSI of information concerning the safety of anyone under the protection of the United States Secret Service. This includes A. the President and Vice President B. the President- and Vice President-elect C. any foreign head of state visiting the United States *D. all of these answers
A formal agreement between the DoD and U.S. Secret Service requires military members to report information to the Secret Service pertaining to the protect of the President. The ______ is the point of contact between the Air Force and the Secret Service. the AFOSI
Created by: newkmatt