Communications Security Flashcards
(22 cards)
What color is a Top Secret Document and unauthorized disclosure of this info could cause______ damage!
Orange/ Exceptionally Grave
What color is a Secret Document and unauthorized disclosure of this info could cause _______ damage.
Red/ Serious
What color is a Confidential Document and unauthorized disclosure of this info could cause ______ to national security.
Blue/ Damage
These are used to communicate to the recipient the security classification of the material and the degree of protection required to safeguard against unauthorized disclosure of that material.
Security Markings
These are used to classify each section, part, paragraph, subparagraph, and any other portion of a classified document.
Portion Markings
_____ is the determination that classified material no longer requires any degree of protection against unauthorized disclosure.
Declassification
_______ is when it is determined that classified information exists at a higher degree of protection against unauthorized disclosure than required in the interest of national security.
Downgrading
COMSEC physical security is…..
physical measures taken to safeguard COMSEC material. (i.e. covered of laid face down, never discussing info or unsecured telephones, etc.)
A combination safes that hold COMSEC security must be changed at least…..
once every two years
This type of security refers to the measures taken to deny unauthorized persons information of value which might be derived from the interception and analysis of compromising RF emanations including UHF
COMSEC emissions security
The three categories of COMSEC material are..
Keying Material, Equipment, and Related Information
Two types of Keying Material are…
Paper keying material and Non-paper keying material
The protection against unauthorized interceptions, traffic analysis, and imitative deception of messages during their transmissions is…
Transmission Security
Crypto will be destroyed…
As soon as possible but no later than 12 hours after supersession
A real-time procedure used to alert circuit operators that an unauthorized disclosure has occurred over a non-secured circuit.
BEADWINDOW
The proper authorized reply to the BEADWINDOW message is…
ROGER OUT
This is the interception and rebroadcast of beacon signals used mainly on navigation equipment
Meaconing
Any attempt by the enemy to enter the US of allied communications systems and simulate friendly traffic to confuse or deceive is…
Intrusion
_____ is the deliberate use of electromagnetic signals with the objective of impairing communication circuits.
Jamming
_____degrades, disrupts, obstructs, or limits the effective performance of electronic or electrical equipment
Interference
Two-person control is…
control of Positive Control Material and devices at all times by a minimum of two authorized persons.
Two-person Integrity is defined…
a security measure taken to prevent single-person access to COMSEC keying material and cryptographic maintenance manuals.