Method of logging in that requires more than just a password.
Multi-Factor Authentication
You should always wear this while on site to identify yourself.
company issued ID Badge
Exporting controlled technology to a foreign person in the U.S. is known as this.
Deemed Export
You receive a USB drive from an unknown source. What do you do?
Report it, DO NOT plug it in
Company security and Compliance policies are found where?
The employee handbook.
Something you should never share with coworkers, even if they ask nicely.
Password
Visitors must always do this when entering a business unit.
Sign in
The government agency that enforces the EAR.
Bureau of Industry and Security (BIS)
You see someone in the office without a badge. What's your next step?
Report them to security
How often must employees complete mandatory security training?
Annually
Emails that trick users into clicking malicious links.
Phishing
Propping this open can be a serious security violation.
Access-controlled door
A list used to screen international partners and customers.
Denied/Restricted Party List
You notice sensitive documents left on a shared printer. What should you do?
Secure/Shred them and inform the owner
You must do this before sharing controlled technical data with a foreign national.
Obtain licensing and approval.
This type of software is used to protect against unauthorized access.
Firewall
These devices record who enters and exits secure areas.
Access control systems or badge readers
The ITAR regulates exports related to this industry.
Defense Industry
Term describing someone withing the organization that poses a risk.
Insider Threat
This process evaluates whether a transaction involves high risk entities.
Restricted Party Screening
Practice that involves identifying and patching system weaknesses.
Vulnerability Management
The correct response when you see someone tailgating through a secure door.
Report the Incident
Agreement type allowing U.S. companies to provide defense services to foreign persons.
Technical Assistance Agreement (TAA)
The first thing you should do in a suspected data breach.
Report to IT security or your supervisor.
This policy defines what internet usage is allowed on company devices.
Acceptable Use Policy