The loss of this information causes exceptionally grave damage.
What is TOP SECRET Information?
The acquisition of trade secrets from business competitors.
What is Industrial Espionage?
OPSEC Symbol
What is the Purple Dragon?
Disgruntle employees, business partners, employees with admin capabilities.
What are types of insiders?
Travel outside of the U.S.
What is reporting Foreign travel?
The loss of this information causes serious damage.
What is SECRET information?
Information gathered to identify, disrupt, or protect against intelligence activities.
What is counterintelligence?
Identify,control,and protect sensitive unclassified information about a mission, operation, or activity.
What is OPSEC?
The accidental exposure of data through negligence or misunderstanding.
What is careless insider threat?
Reporting a person asking detailed questions about your job in an attempt to access protected information.
What is reporting suspicious contacts?
The loss of this information causes damage.
What is CONFIDENTIAL information?
Requests for information, solicitation, and/or social engineering.
What are outsider threat collection methods?
Insignificant documents such as notes and receipts.
What is trash that needs shredding?
The intentional stealing of data for finial or professional gain.
What is a malicious insider threat?
Reporting of the physical or electronic theft conducted by an employee.
What is reporting an insider threat?
The loss of this information causes Foreseeable Harm and Information protected by FOIA.
What is Controlled Unclassified Information (CUI)?
Referring an elicitor to a public website, changing the topic, or deflecting a question.
What are countermeasures?
Geotagging posted photos and/or ”checking in” at public locations.
What are social media clues?
The inadvertent distribution of data via social engpioneering/malware.
What is compromised insider treat?
Reporting recent arrests, alcohol or drug related problems, or financial difficulties.
What is Adverse information?
The loss, suspected compromise, or compromise of classified information.
What is Security Violation?
Foreign persons, business competitors, international organizations.
What are types of people who conduct Industrial Espionage.
Reduce the vulnerability of a person/group From successfully exploiting critical information.
What is the purpose of OPSEC?
Electronic theft, stolen credentials, and physical theft.
What are insider threat methods?
Reporting foreign citizen friends, relatives, and/or roommates.
What is reporting Foreign contacts?