IDW: TechFundamentals/OPSEC/Security Flashcards Preview

Information Dominance Warfare > IDW: TechFundamentals/OPSEC/Security > Flashcards

Flashcards in IDW: TechFundamentals/OPSEC/Security Deck (50):
0

Frequency

Number of cycles that occur in one second; usually in hertz.

1

Wavelength

Physical distance of a wave or cycle

2

Ducting

Temperature or moisture conditions in atmosphere that allow a greater bending of radio waves.

3

Refraction

Waves that changes direction when passing from one medium to another.

4

Multiplexing

For simultaneous transmission of two or more signals over a common carrier wave.

5

Modulation

Impressing intelligence upon a transmission medium.

6

Demodulation

Removal of intelligence from a transmission medium.

7

Bandwidth

Space within the (RF) Radio Frequency spectrum that's signal occupies; expressed in Hertz.

8

Keying

Inserting noise or data onto a frequency.

9

Propagation

Movement through a medium.

10

Continuous Wave

Unmodulated frequency that doesn't carry additional modulated intelligence and is transmitted for use in some radio transmissions.

11

Azimuth

Angular measurement in the horizontal plane used in reference to altitude.

12

Define Operational Security.

Systematic, proven process that identifies, controls and protects generally sensitive, but unclassified information about a mission, operation or activity.

13

Air Search RADAR

Detect & determine position, course & speed of air targets; used as early warning devices.

14

Surface search RADAR

Used to detect presence of surface craft & low flying aircraft/navigational aid in coastal waters and poor weather conditions.

15

Fire Control RADAR has how many phases?

Three

16

What are the 3 phases of Fire Control RADAR?

Designation - Radar is directed to general location of desired target.

Acquisition - Radar searches small volume of space in a prearranged pattern until target is located.

Tracking - Once target is located, radar system automatically follows target motions.

17

What is the 5 step planning process?

Identify Critical Information (CI)

Analyze the threat

Analyze the vulnerabilities

Assess the risk

Apply the countermeasures

18

PAO

Target Audience - Public
Intent - Inform
Method - Public Release

19

OPSEC

Target Audience - Adversary
Intent - Deny
Method - Five-Step Process

20

Define Critical Information

Information about friendly activities, intentions, capabilities, or limitations an adversary seeks in order to gain a military, political, diplomatic, economic or technical advantage.

21

What directives govern personnel security?

5510.30: Personnel Security Manual

5510.36: Information Security Manual

22

Top Secret

Orange; cause grave damage to the national security.

23

Secret

Red; Cause serious damage to the national security.

24

Confidential

Blue; Could be expected to cause damage to national security.

25

SCI (Sensitive Compartmental Information)

Yellow; Requires a higher level of control (smaller group of ppl)

26

Unclassified

Green; Potential to the harmful.

27

What does "need to know" mean?

A determination that a recipient requires access to specific classified information in order to perform their job.

28

Top Secret Investigation

Favorably completed SSBI every 5 years

29

Secret Investigation

Favorably completed NACLC every 10 years.

30

Confidential Investigation

Favorably completed NACLC every 15 years.

31

Anti-Terrorism Force Protection (ATFP)

Adjustable defensive posture set for mitigation of potential threats.

32

Events to be reported to SSO.

Arrests and convictions.

Adverse involvement with law enforcement.

Bad credit

Alcohol abuse

Drug involvement

Mental health issues

Outside employment

Security violations

33

Purpose of EAP

Plan for safeguarding classified material in the event of an emergency; ties into Emergency Destruction.

34

Procedures for hard copy classified material for Hand Carry

Must have courier card or courier letter

Must go directly to destination

If stopped or pulled over, show military ID and courier card/letter

35

FPCON Levels

Normal: General global threat of possible terrorist threat; routine security posture

Alpha: Increased general threat of possible terrorist activity.

Bravo: More predictable threat of terrorist activity exists.

Charlie: Incident occurred or targeting personnel/facilities is likely.

Delta: Applies in imminent area where a terrorist where attack has occurred or Intel that an attack is imminent.

36

SF700

Security Container Information

37

SF701

Activity Security Checklist

38

SF702

Security Container Check Sheet

39

SF703

Top Secret Coversheet

40

SF312

Classified Non-disclosure agreement

41

What is a RAM

Random Anti-Terrorism Measure: Random implementation of higher FPCON measures in consideration of local terrorist capabilities.

42

What is PED (Personal Electronic Devices)?

Personal Electronic Device are prohibited in all classified spaces.

43

Difference between a Security Violation and Practice Dangerous to Security.

Security Violation: A compromise of classified info to persons not authorized to receive it.

PDS: Failure to comply with the provisions of security regulations which could cause a compromise of classified information.

44

Define an Access List

Personnel who need uninhibited access to a space to fully perform their duties.

45

Responsibilities of DONCAF

Authority on authorizing all clearances.

46

What is Two Person Integrity (TPI)

Ensures that no one person has complete access to sensitive information.

47

Procedures for sanitizing an area.

Removal of information from the media or equipment such that data recovery using any known technique or analysis is prevented.

48

What is Joint Personnel Adjudication System (JPAS)

Website used to hold personnel information involving security clearances.

49

Purpose of SF86

Approved method of requesting PSI products from OPM.