COMSEC Basics
Encryption
COMSEC Devices
Threats to COMSEC
COMSEC Policies
100

What does COMSEC sand for?

Communications Security

100

What is encryption in the context of COMSEC?

The proce4ss of converting plaintext into cyphertext to prevent unauthorized access

100

What is a common device used to secure voice communications? 

vIPer Phones and Secure Telephone Equipment (STE)

100

What is a common threat to COMSEC involving unauthorized individuals? 

Unauthorized disclosure is a common threat to Communications Security (COMSEC), where classified or sensitive information is revealed to individuals without the proper clearance or need-to-know, potentially allowing interception, analysis, and exploitation. This can occur through willful sharing, improper storage, or access to COMSEC equipment and keying materials, leading to system compromise without detection. Such incidents must be reported immediately and can result in legal consequences under U.S. federal law.

100

What US agency sets COMSEC standards, and what is its role in policy enforcement?

The NSA sets COMSEC standards for protecting classified communications. It develops cryptographic algorithms and certifies equipment. 

200

Whatis the primary goal for COMSEC? 

To protect communications from unauthorized access and ensure confidentiality, integrity and authenticity. 

200

What is the name of the encryption standard used widely in secure communications

Advanced Encryption Standard (AES)

200

What is the purpose of a Crypto Ignition Key?

It is used to activate or unlock cryptographic devices. 

200

What term describes an attack where and adversary intercepts and alters communications? 

Man in the middle attack. 

200

What is the purpose of a COMSEC Material Control System (CMCS) and how does it function? 

The COMSEC Material Control System (CMCS) tracks and manages COMSEC materials (e.g., keys, devices) to ensure accountability and prevent compromise. It functions through inventory controls, secure storage, transfer protocols, and destruction procedures, managed by COMSEC custodians who log all actions to maintain a chain of custody.

300

What are the three main principles of COMSEC?

Confidentiality, Integrity, and Availability 
300

What type of encryption uses the same key for both encryption and decryption? 

Symmetric Encryption or a TrKEK

300

What is the purpose of fill device COMSEC? 

To load cryptographic keys into a secure communication. 

300

What is a side channel attack in COMSEC?

An attack that exploits physical characteristics 

300

How does the two-person integrity rule enhance COMSEC, and in what scenarios is it mandatory?

It requires two authorized individuals to handle sensitive COMSEC materials to prevent unauthorized access and protect against insider threats. 

400

What term describes the protection of information from unauthorized disclosure? 

Confidentiality 

400

What is a key management system in COMSEC? 

Key Management Infrastructure (KMI) Used for generating, distributing, storing and destroying cryptographic keys securely.

400

What is a type 1 Cryptographic Product?

A device certified by the NSA for protecting classified U.S. government information 

400

What is the term, for unauthorized access to cryptographic keys to manage, safeguard and account for COMSEC materials and equipment?

Comprised Key

400

What are the consequence of a COMSEC incident, and how they are reported? 

A COMSEC incident (compromise, equipment loss etc.) can lead to unauthorized access, loss o classified data, or mission failure. Reporting involves immediate notifications to the COMSEC custodian, followed by a formal report to the NSA or controlling authority. The report details the incident, impact and mitigation steps followed by an investigation to prevnt recurrence. 

500

What is the difference between COMSEC and INFOSEC?

COMSEC focuses specifically on securing communications while INOSEC encompasses the broader protection of all information assets. 

500

What is the significance of quantum cryptography in COMSEC? 

It uses principles of quantum mechanics to provide theoretically unbreakable encryption 

500

What is the role of a COMSEC custodian?

To manage, safeguard and account for COMSEC materials and equipment

500

What are the implications of a supply chain attack on COMSEC systems, and ho can they be mitigated? 

A supply chain attack compromises COMSEC systems by inserting malicious hardware or software during manufacturing of distribution enabling backdoors or key leaks. Implications include widespread breaches of secure communications. Mitigation involves vetting suppliers using trusted foundries.  

500

How do international COMSEC agreements impact global operations, and what challengers do they pose? 

International COMSEC agreements ensure interoperability and security for allied communications using shared protocols and crypto systems.