Threat Awareness
Defensive Security
Security Classification
Reporting Requirements
Security Procedures & Duties
100
The practice of spying, or of using spies, typically by governments to obtain political and military information.
What is espionage?
100
The principle of sharing intelligence legally and responsibly with a cleared recipient.
What is Need to Know?
100
Unauthorized disclosure of this level of classified information could cause SERIOUS DAMAGE to national security.
What is Secret?
100
Security violations should be reported to this person/position.
Who is the FSO?
100
Notes, travel itineraries, papers, etc. should be placed here when no longer needed.
What is the shredding basket?
200
This type of theft can put private companies out of business.
What is proprietary information?
200
These are 2 examples of collection methods adversaries might use.
What are: Requests for information, Solicitation of marketing of services, Acquisition of technology Public venues, Official foreign visitors or joint R&D, Cyberattacks, Targeting U.S. travelers overseas.
200
Unauthorized disclosure of this level of classified information could cause DAMAGE to national security.
What is Confidential?
200
Information that negatively reflects on the integrity or character of a cleared employee, that suggests that his or her ability to safeguard classified information may be impaired, or that his or her access to classified information clearly may not be in the interest of national security.
What is Adverse Information?
200
An apparatus you use to discuss Classified Information.
What is a STE?
300
Information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations, or persons, or their agents, or international terrorist organizations or activities.
What is Counterintelligence?
300
This is a 5 phase analytical process to identify methods to mitigate risks.
What is OPSEC?
300
A set of classification instructions issued by an original classification authority.
What is a Security Classification Guide?
300
Any individual who tries to obtain illegal or unauthorized access to classified information, usually by approaching or interacting with a cleared employee.
What is a suspicious contact?
300
This is a system of security checks performed to ensure that classified material is stored properly.
What is an end-of-day check?
400
THIS type of threat is currently the most prevalent and dangerous threat to national security.
What is the Insider Threat?
400
An e-mail spoofing fraud attempt that targets a specific organization or person, seeking unauthorized access to proprietary or classified data.
What is phishing?
400
These documents are placed on the front and back of a classified document.
What are coversheets?
400
This occurs when classified information is not safeguarded but does not result in a compromise of material.
What is a security infraction?
400
The communication from one cleared facility to another that a traveler will be arriving, and will need access to classified information while on-site.
What is a visit request?
500
These are 2 examples of what an adversary might target.
What is classified data and proprietary information?
500
The manipulation of people into performing actions or divulging information.
What is social engineering?
500
These individuals reproduce, extract or summarize classified information.
What are derivative classifiers?
500
This method of reporting may be used only when an employee feels that reporting a matter to SCI Security would not be prudent.
What is the DoD Hotline?
500
The Non-Disclosure Agreement is binding for this amount of time.
What is life?
M
e
n
u