![]() NSTSSI Security Education Standards |
6. COMSEC
a. General
(1) explain the impact of a COMSEC compromise;
(2) outline responsibilities for COMSEC accounting;
(3) identify the COMSEC custodian or COMSEC manager;
(4) explain how COMSEC material destruction and procedures can affect INFOSEC;
(5) describe methods of COMSEC material identification;
(6) identify responsibilities for COMSEC policy and guidance; and
(7) identify responsibilities associated with a controlling authority.
b. Technology
(1) identify cryptographic techniques;
(2) summarize the importance of the Electronic Key Management System to INFOSEC;
(3) evaluate encryption modes;
(4) define private key cryptography;
(5) define public key encryption;
(6) explain the concept of protective technology;
(7) discuss how the concept of two-person control may enhance information systems security; and
(8) associate voice communication security with INFOSEC.