Crypto Devices Flashcards

0
Q

What are HJ times?

A

Bio grams wich tells us when to change crypto.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Does kyk13 store HJ times and short titles?

A

No fills only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protocol to send a fill SKL - KYK13?

A

DS102 (smart to dumb)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protocol to send a fill CYZ10 - SKL?

A

DS101 (dumb to smart)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name security threats/methods with a brief description?

A

Imint - info gained from aerial recon flights and sat platforms
Sigint - used to describe communication intelligence
Comint - exploitation of electromagnetic transmissions and electronic int
Humint - includes patrol reports, interrogation, espionage and loose talk
Loss or compromise - theft, loss, destruction, disclosure or modification of government assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name principle sources of information?

A
Surveillance and reconnaissance 
Radio and communications
Non comms emissions 
Document and information technology system
Loose talk
Discussions/brief
Private correspondence 
Private telephone calls
The media
The Internet
Civilians
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Main threads to security and explain?

A

Espionage - obtaining info about organisation or a society that is considered secret or confidential without permission of the holder of the information

Sabotage - deliberate action aimed at weakening on enemy, oppressor or employer through subversion, obstruction disruption and/on destruction

Subversion - action designed to weaken the military, economic or political strength of a nation by undermining the morale loyalty or reliability of its citizens

Terrorism - unlawful use of or threatened use of force or violence against individuals or property to coerce or intimate government or societies, often to achieve political, religious or ideological objectives

Non traditional - events such as natural disasters, or actions by investigative journalists, criminals, disaffected or dishonest staff computer hackers and viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Four common causes to security breaches?

A

Handling
Custody
Access
Discussion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name the 3 veting States?

A

Bc
Sc
Dv

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When should you change combination?

A
1st brought into service
Any one with access leaves or no longer requires access
Intervals no longer than six months
After any form of repairs by a locksmith
After any inspection on the locks
Suspected compromise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name four ways of destruction?

A

Incineration
Shredding
Wet pulping
Mechanical disintegration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does USO stand for and who does he report to?

A

Unit security officer and reports to the commanding officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the action of loss of a classified document?

A

Conduct a thorough search up to a hour
Inform USO
extend the search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the action of compromise ?

A

100% check of contents
Inform the USO
Change the combination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does TEMPEST stand for?

A

Transient Electromagnetic Pulse Emanation Standard

-unintentional radiation of intelligence bearing signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name 3 crypto statuses?

A

Current
Reserve
Superseded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What form do you use to account for your crypto?

A

MOD 371

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What do you need to do before a road move with crypto?

A

Get authorisation from CDA Hereford
Be in possession of courier and escort documents
Have a locked container possibly bolted down
2 people in the vehicle (one person must be crypto authorised)
Never leave vehicle unattended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How many fills does a kyk take?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How many fills can a crazy 10 hold?

20
Q

How long do you have to replace a battery in a crazy10?

21
Q

When starting up a crazy 10 you get a cold boot, what does this mean?

A

Zeroised and you have to re initialise the CIK

22
Q

What does the green light on top the SKL mean?

A

The kov 21 card is logged in or faulty

23
Q

How many fills does a SKL hold?

24
SKL power source must be replaced within ?
2min
25
What's the battery life of the SKL?
Standard battery - 50 h | Extended battery - 100h
26
What are the battery life's for the crazy 10? 3*3v battery 1*9v battery
3*3v battery - 6months | 1*9v battery - 3months
27
What is the correct closing down roc endure of the SKL?
File, save database, file, exit, session, log out, power button
28
``` What does the following stand for? KV's KEK OTAD OTAR TEK TSK ```
``` Key variables Key encryption key Over the air distribution Over the air rekeying Traffic encryption kv Transec variable ```
29
WHAT SEPARATES THE RED FROM THE BLACK DATA ON THE SKL?
Kov 21 card
30
WHAT IS THE CES OF THE SKL (9 ITEMS)? 


AN-PYQ 10
STANDARD BATTERY
HEAVY DUTY BATTERY
CHARGER
PSU
2 X KETTLE LEADS, UK & US
FILL LEAD
QUICK REFERENCE GUIDE
STANDARD USB TO MINI USB CONVERTER
31
What is the classification of a ledger if the items are classified below SECRET?
Restricted
32
What is the MOD name for the register of Crypto items?
MOD Form 1728
33
Name the two types of Crypto compromises?
Physical and Crypto
34
What must we never do to the SKL?
Carry out a card self-test, never reset the card, never just turn it off
35
What access does DV give the holder?
FREQUENT AND UNCONTROLLED ACCESS TO ASSETS MARKED TOP SECRET
36
Name four aspects of physical security.
FENCES, LIGHTING, GUARDS, GATE CONTROL, ACCESS CONTROL, KEEP AREAS, STRONG ROOMS
37
What must we be logged in as to set the date and time on the PYQ- 10?
SSO
38
What are the Crypto short titles for Brent, MBITR and SKL?
BID/2010/1, AN PRC 148, AN PYQ 10
39
WHAT INFORMATION SHOULD BE WRITTEN ON THE SIDE OF A KYK13
Short title only
40
WHAT CLASIFICATION OF KEYS CAN THE CYZ 10 HOLD?

UP TO TOP SECRET
41
WITHIN WHAT TIMEFRAME SHOULD EXPIRED KEYMAT/FILLS BE DESTROYED/DELETED?
72 hrs
42
BEFORE ISSUING OUT CRYPTO, WHAT DO YOU NEED TO CHECK ABOUT THE INDIVIDUAL. WHO WISHES TO TAKE RECEIPT?
ESTABLISH ID ENSURE INDIVIDUAL HAS CORRECT CLEARANCE ENSURE THEY ARE CRYPTO AUTHORISED
43
How would you confirm a store on the KYK-13?
SELECT RELEVANT STORE. SWITCH KYK-13 OFF. PRESS GREY NIPPLE.
44
When cryptographic material and equipment is in use what are the six periodic checks to be carried out in the field?
``` HOTO INITIAL ISSUE BEFORE & AFTER MOVE DAILY BY DET COMMANDER SOPS ENDEX ```
45
Name 4 vulnerabilities to IT security?
``` Hacking Social Networks Virus/malware/spyware/trojan Loss or theft of laptops usb classified docs occifical docs ```
46
Name 5 TEMPEST HAZARDS?
``` Equipment again Equipment compatibility Siting Mains voltage variations The human factor ```
47
Explain why impex policy is used?
To ensure the correct policy is followed in regards to placing marked material onto one system from another without any compromise. normally carried out by a single individual or controlled from a single point of contact.