Score:0

What is the Standard to protect classified, Secret and Top Secret information?

cn flag

Para 3 of Security Requirements for Cryptographic Module (FIPS 140-2) specifies the requirements that will be satisfied by a crypto module protecting sensitive but unclassified information.

What are the standards to protect classified, Secret and Top Secret information?

poncho avatar
my flag
I believe that those standards are themselves classified
Score:0
mc flag

Data classified up to top secret may be handled by CNSA algorithms (e.g. AES-256, RSA 3072, etc.) Above that, as poncho noted, the algorithms themselves are classified.

forest avatar
vn flag
@Swashbuckler ECI (Exceptionally Classified Information) is above Top Secret, but it is handled on a different scale and is not to be stored physically or digitally. As such, there are no algorithms that protect it.
fgrieu avatar
ng flag
Which begs for: how are the levels above top secret named and defined?
Swashbuckler avatar
mc flag
To the best of my knowledge, there is nothing above top secret. I believe the levels are controlled unclassified and then the three classified levels: confidential, secret and top secret.
Paul Uszak avatar
cn flag
"Code word" is above top secret: https://www.theatlantic.com/international/archive/2017/05/trump-russia-code-word/526833/
hft avatar
ng flag
hft
"Codeword" is not "above," it is "to the side." See the discussion of the lattice model in Ross Anderson's book "Security Engineering." For example, the codeword "Crypto" could be appended to a "Secret" classification to make it "{Secret, Crypto}." You would need both Secret and Crypto clearance to read it.
mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.