Deck 3 Flashcards
Get That MONEY!!! (200 cards)
Pass and Advanced
- When is a computer system operating in the multilevel security mode?
When it provides a capability permitting various categories and types of classified materials to be stored and processed concurrently in a computer system and permitting selective access to such material concurrently by un-cleared users and users having differing security clearances and need-to-know.
Pass and Advanced
- When is a computer system operating in the controlled security mode?
When at least some personnel (users) with access to the system have neither a security clearance nor a need-to-know for all classified material then contained in the computer system.
Pass and Advanced
- What data is unclassified data that requires special protection?
Sensitive unclassified data.
Pass and Advanced
- What Act imposes numerous requirements upon federal agencies to prevent the misuse of data about individuals, respect its confidentiality, and preserve its integrity?
The Privacy Act of 1974.
Pass and Advanced
- What are the major provisions of the Privacy Act that most directly involve computer security?
Limiting disclosure of personal information to authorized persons and agencies; requiring accuracy, relevance, timeliness, and completeness of records; and requiring the use of safeguards to ensure the confidentiality and security of records.
Pass and Advanced
- What has the Navy established to assure protection for AIS processing of sensitive unclassified data?
The limited AIS access security mode. ‘
Pass and Advanced
- When is a computer system or network operating in the limited access security mode?
When the type of data being processed is categorized as unclassified and requires the implementation of special access controls to restrict the access to the data only to individuals who by their job function have a need to access the data.
Pass and Advanced
- Why is AIS media protection important?
Because it is where data, information and programs are stored.
Pass and Advanced
- What does the amount of protection depend on?
The classification of data, the type of AIS storage media used, the value of the material on it, and the ease with which the material can be replaced or regenerated.
Pass and Advanced
- What items are considered AIS media?
Magnetic tapes, disks, diskettes, disk packs, drums, cathode-ray tube (CRT) displays, hard copy (paper), core storage, mass memory stoarage, printer ribbons, carbon paper, and computer output microfilm and microfiche.
Pass and Advanced
- For purposes of control, AIS media can be divided into what two types or categories?
Work copy media and finished media.
Pass and Advanced
- What media is temporary in nature?
Work copy media.
Pass and Advanced
- How long is working copy media retained?
180 days.
Pass and Advanced
- What procedures are designed to ensure that an adequate level of protection is provided?
Your activity?s standard operating procedures (SOPs).
Pass and Advanced
- Why is it important for your activity to have procedures for making AIS media?
To protect the media from unauthorized, accidental, or intentional disclosure, modification, destruction, or loss.
Pass and Advanced
- What must each magnetic tape, diskette, and disk pack be externally marked with?
A stick-on label with the overall security classification and a permanently assigned identification number.
Pass and Advanced
- When the tapes, diskettes, and disk packs are to be declassified by degaussing, when are all external labels indicating the classification not removed?
Not unless the media will be immediately used to store information of the same classification.
Pass and Advanced
- To what degree must the media be destroyed?
Beyond recognition.
Pass and Advanced
- What provides the basis for an AIS security program?
The risk analysis and higher authority instructions.
Pass and Advanced
- What are the steps to take that will help in planning an AIS security program?
Perform preliminary planning, perform a preliminary risk analysis, select and implement urgent ?quick fix? security measures, perform and document a detailed risk analysis, justify costs and document action plans, carry out the approved action plans, and repeat the detailed risk analysis and subsequent steps regularly, at least annually.
Pass and Advanced
- How can the AIS technical manager determine what changes, if any, should be made in the security program to keep it effective?
By evaluating changes in command mission, the local environment, the hardware configuration, and tasks performed.
Pass and Advanced
- What should you have a thorough knowledge of before implementing any security plan?
How numerous higher authority instructions relate to physical security, data protection, and security in general.
Pass and Advanced
- What are the instructions and manuals you can refer to in learning about AIS security and when making security decisions?
The Department of the Navy Automatic Data Processing Security, OPNAVINST 5239.1 with enclosures, Guidelines for Automatic Data Processing Risk Analysis, FIPS PUB 65 (enclosure 3 to OPNAVINST 5239.1), Department of the Navy Information Security Program Regulation, SECNAVINST 5510.36, and Department of the Navy Information Systems Security (INFOSEC) Program, SECNAVINST 5239.3.
Pass and Advanced
- When planning a security program, what things should the AIS technical manager be aware of?
The types of threats that may be encountered.