Information
PHYSICAL SECURITY
ADMINISTRATION
Threat
100

Random seemingly unrelated facts, numbers, words or statistics.

What is Data?

100

Holding the door open for your co-worker to enter the facility is called...............

What is PIGGYBACKING

100

To apply or maintain permissions to prevent an account from getting information they are not authorized to see while making the information available to those who are authorized.

What is Access Control?

100
They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.
Who are hackers?
200
A legal notification directing you or the bureau/office to preserve any documentary material that may berelevant to a pending or foreseable lawsuit or administrative adjudication.
What is Litigation Hold?
200

Who is responsible for adhering to the management and all implementation and direction of physical security at L3Harris

Who is YOU?

200
It is a word or phrase that verifies that you and only you had access to the account.
What is a Password?
200

Identify the weakest link in every organization.

Who are you? (Who am I?)

The one person who can through thoughtlessness, unawareness or accident, cause loss of work products through deletion, corruption or improperly safeguarding data.

300
Data compiled into documents, maps, charts, and other forms of information gives assets dollar _____________
What is Value?
300

The list of computers, laptops, software, equipment owned by an organization.

What is an Inventory?

300
An identifier that uniquely tracks actions to individuals.
What is an Account? (or Login ID)
300
Is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.
What is Insider threat?
400

Any combination of your name, your home address or phone number, credit card or account numbers or social security number.

What is PII? (or Personally Identifiable Information)

400

The two primary purposes of physical security are protection and....................

what is prevention?

400

What is the full name of the General Manager of Tactical Mission Division.

Who is Nathan J Smith?

400

U.S. companies must properly identify any foreign ownership, control or influence (FOCI) True or False

True:

Not only should US companies identify and foreign ownership, control or influence (FOCI) it must take appropriate security measures to protect against it.

500

All related security incidents, violations or suspected violations should be reported Will Paulsen or Ted Hartman True or False

FALSE

All related security incidents, violations or suspected violations should be reported to the FSO Kristin Covey (7138) or any one of the security members. Debra Dormio (7138) Lauren Semanski (7138) Wanda Lassiter (7130)

500

Employees wearing their ID badges is a good example of what type of security

What is point security?
500

A specific amount of time before informing security that you are traveling internationally

What is 30 days?

500

Information that is gathered and activities conducted to protect against espionage, other intelligence activities 

What is Counterintelligence?

M
e
n
u