Random seemingly unrelated facts, numbers, words or statistics.
What is Data?
Holding the door open for your co-worker to enter the facility is called...............
What is PIGGYBACKING
To apply or maintain permissions to prevent an account from getting information they are not authorized to see while making the information available to those who are authorized.
What is Access Control?
Who is responsible for adhering to the management and all implementation and direction of physical security at L3Harris
Who is YOU?
Identify the weakest link in every organization.
Who are you? (Who am I?)
The one person who can through thoughtlessness, unawareness or accident, cause loss of work products through deletion, corruption or improperly safeguarding data.
The list of computers, laptops, software, equipment owned by an organization.
What is an Inventory?
Any combination of your name, your home address or phone number, credit card or account numbers or social security number.
What is PII? (or Personally Identifiable Information)
The two primary purposes of physical security are protection and....................
what is prevention?
What is the full name of the General Manager of Tactical Mission Division.
Who is Nathan J Smith?
U.S. companies must properly identify any foreign ownership, control or influence (FOCI) True or False
True:
Not only should US companies identify and foreign ownership, control or influence (FOCI) it must take appropriate security measures to protect against it.
All related security incidents, violations or suspected violations should be reported Will Paulsen or Ted Hartman True or False
FALSE
All related security incidents, violations or suspected violations should be reported to the FSO Kristin Covey (7138) or any one of the security members. Debra Dormio (7138) Lauren Semanski (7138) Wanda Lassiter (7130)
Employees wearing their ID badges is a good example of what type of security
A specific amount of time before informing security that you are traveling internationally
What is 30 days?
Information that is gathered and activities conducted to protect against espionage, other intelligence activities
What is Counterintelligence?