click below
click below
Normal Size Small Size show me how
COMSEC
IPBC
| Question | Answer |
|---|---|
| COMSEC | Communication Security. refers to the procedures, processes, and those items designed to secure or authenticate telecommunications and the transfer of information. |
| COMSEC vs TRANSEC | COMSEC--> protect the data; provides end-to-end data encryption TRANSEC--> protect the circuit, provides the Anti-jam/LPD/LPI/frequency hopping |
| COMSEC components | CRYPTO, crypto equipment, COMSEC material, TPI, keying material, COMSEC equipment |
| Crypto | marking or designator that identifies all comsec keying material |
| COMSEC material | keying material, COMSEC equipment, COMSEC related equipment |
| TPI | two person integrity. system of handling and storing designed to prevent single-person access to certain comsec material and equipment |
| keying material | type of comsec aid which supplies either encoding or decoding means for cryptosystems |
| COMSEC equipment | designed to provide security to telecommunications by converting information to an unintelligible form |
| COMSEC related information | policy, procedures, general publications |
| TPI | requires the participation of 2 people to restrict access to information, requires authorized personnel to be in constant view of each other when material is handled, |
| TPI | requires storage to have two combo locks, no one person should have both combos |
| TPI required when | All TS keying material, when unencrypted TS is being generated/transferred/ relayed/received, when using equipment that generates TS keys, moving of comsec material |
| Emergency Action Plan | designed to protect classified material. Should include emergency planning, protection, destruction |
| COMSEC material parts | classification and serial number |
| Physical security | physical measures necessary to safeguard classified materials, limit space access, "need to know", CO access list, maintain visitor log |
| PDS | practices dangerous to security |
| Two types of PDS | reportable, non-reportable |
| COMSEC bible | EKMS 1B. policys and guidelines for use and storage. How often you have to do inspections. Essentially everything you need to know about EKMS. |
| Reportable PDS | use of keying material before its effective date, inadvertent destruction of comsec material, not completing inventory, no inventory conducted during change of command, unauthorized adjustment of preconfigured password |
| Non-reportable PDS | improper accounting reports, COMSEC material not listed on account, late destruction of KEYMAT, failure to maintain OTAT/OTAR logs |
| TRANSEC | component of comsec, measures taken to protect transmission from intercept |
| TRANSEC practices | uses minimum output transmit power, select best frequency with lowest output power, use directional antennas, change call signs |
| Transec Comm Deception | ACP 122--> EEFI, Gingerbread, Beadwindow |
| EEFI | Essential Elements of Friendly Information; specific information that could have a negative impact to mission if acquired by enemy |
| Gingerbread | Intruder on a net |
| Beadwindow | disclosure of EEFI |
| Emission Security | EMCON--> control of all EM and acoustic radiations to prevent intercept |
| EMCON reference | NWP-3.51-1 |
| Gingerbread procedures | ACP 122 |
| Proper response to beadwindow | "Roger Out" |
| EKMS | Electronic Key Management System; NSA led program, generates and distributes electronic keys for all NSA encryption systems |
| OTAT | Over-the-air-transfer. sending crypt over RF and enabling me to use/transfer use of crypto |
| OTAR | over the air rekeying. sending crypto over RF and loading into machine. Does not allow me to extract key. |
| OTAT/OTAR is... | common name for the method of changing or updating encryption keys in a two-way radio system over the radio channel |
| OTAT/OTAR benefit | drastically reduces the distribution of physical keying material and the physical process of loading cryptographic devices with key |
| added benefit of OTAT | allows me to use key as necessary (gives a local copy). |
| KIV-7 | replacing KG-84 family, up to TS level, digital and voice communications |
| KG-94A | used for DWTS (Digital Wideband Transmission System) |
| KG-40 | used with Link 11, Airborne Tactical Data System, and Navy Tactical Data System |
| KGV-11 | used with DAMA, and EHF SATCOM |
| TACLANE (KG-175) | used in SIPRnet, legacy tactical IP systems |
| TPP | two person protection. Comsec materials requiring two personnel handling at the same time. |
| OTAR/OTAT pub | NAG 16 |
| CCI | controlled cryptographic item. something you need to keep track of but not considered classified (iridium phone and "sleve" that encrypts the circuit) |
| EKMS 3 | security checklists for doing inspections |
| Two types of crypto | Symmetric and Assymetric |
| Symmetric | encryption key is the same with the decryption |
| Asymmetric | uses two keys |
| TACLANE | developed by NSA. provide network comms security over IP and ATM, deployed on SIPRnet |
| NES | Network Encryption System is used to encrypt both classified and unclassified traffic over the same RF comms medium |
| VPN | provide a secure means of extending the trusted enclave to remote locations. |