Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

COMSEC

IPBC

QuestionAnswer
COMSEC Communication Security. refers to the procedures, processes, and those items designed to secure or authenticate telecommunications and the transfer of information.
COMSEC vs TRANSEC COMSEC--> protect the data; provides end-to-end data encryption TRANSEC--> protect the circuit, provides the Anti-jam/LPD/LPI/frequency hopping
COMSEC components CRYPTO, crypto equipment, COMSEC material, TPI, keying material, COMSEC equipment
Crypto marking or designator that identifies all comsec keying material
COMSEC material keying material, COMSEC equipment, COMSEC related equipment
TPI two person integrity. system of handling and storing designed to prevent single-person access to certain comsec material and equipment
keying material type of comsec aid which supplies either encoding or decoding means for cryptosystems
COMSEC equipment designed to provide security to telecommunications by converting information to an unintelligible form
COMSEC related information policy, procedures, general publications
TPI requires the participation of 2 people to restrict access to information, requires authorized personnel to be in constant view of each other when material is handled,
TPI requires storage to have two combo locks, no one person should have both combos
TPI required when All TS keying material, when unencrypted TS is being generated/transferred/ relayed/received, when using equipment that generates TS keys, moving of comsec material
Emergency Action Plan designed to protect classified material. Should include emergency planning, protection, destruction
COMSEC material parts classification and serial number
Physical security physical measures necessary to safeguard classified materials, limit space access, "need to know", CO access list, maintain visitor log
PDS practices dangerous to security
Two types of PDS reportable, non-reportable
COMSEC bible EKMS 1B. policys and guidelines for use and storage. How often you have to do inspections. Essentially everything you need to know about EKMS.
Reportable PDS use of keying material before its effective date, inadvertent destruction of comsec material, not completing inventory, no inventory conducted during change of command, unauthorized adjustment of preconfigured password
Non-reportable PDS improper accounting reports, COMSEC material not listed on account, late destruction of KEYMAT, failure to maintain OTAT/OTAR logs
TRANSEC component of comsec, measures taken to protect transmission from intercept
TRANSEC practices uses minimum output transmit power, select best frequency with lowest output power, use directional antennas, change call signs
Transec Comm Deception ACP 122--> EEFI, Gingerbread, Beadwindow
EEFI Essential Elements of Friendly Information; specific information that could have a negative impact to mission if acquired by enemy
Gingerbread Intruder on a net
Beadwindow disclosure of EEFI
Emission Security EMCON--> control of all EM and acoustic radiations to prevent intercept
EMCON reference NWP-3.51-1
Gingerbread procedures ACP 122
Proper response to beadwindow "Roger Out"
EKMS Electronic Key Management System; NSA led program, generates and distributes electronic keys for all NSA encryption systems
OTAT Over-the-air-transfer. sending crypt over RF and enabling me to use/transfer use of crypto
OTAR over the air rekeying. sending crypto over RF and loading into machine. Does not allow me to extract key.
OTAT/OTAR is... common name for the method of changing or updating encryption keys in a two-way radio system over the radio channel
OTAT/OTAR benefit drastically reduces the distribution of physical keying material and the physical process of loading cryptographic devices with key
added benefit of OTAT allows me to use key as necessary (gives a local copy).
KIV-7 replacing KG-84 family, up to TS level, digital and voice communications
KG-94A used for DWTS (Digital Wideband Transmission System)
KG-40 used with Link 11, Airborne Tactical Data System, and Navy Tactical Data System
KGV-11 used with DAMA, and EHF SATCOM
TACLANE (KG-175) used in SIPRnet, legacy tactical IP systems
TPP two person protection. Comsec materials requiring two personnel handling at the same time.
OTAR/OTAT pub NAG 16
CCI controlled cryptographic item. something you need to keep track of but not considered classified (iridium phone and "sleve" that encrypts the circuit)
EKMS 3 security checklists for doing inspections
Two types of crypto Symmetric and Assymetric
Symmetric encryption key is the same with the decryption
Asymmetric uses two keys
TACLANE developed by NSA. provide network comms security over IP and ATM, deployed on SIPRnet
NES Network Encryption System is used to encrypt both classified and unclassified traffic over the same RF comms medium
VPN provide a secure means of extending the trusted enclave to remote locations.
Created by: aj72776
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards