Battle of the "SEC's"
Orange is the New Black
The Americans
Mr. Robot
Psych
100

Security discipline with policies and procedures that establish standards, criteria and guidelines for personnel security determinations. 

What is PERSEC (personnel security)

Slide #12

100

This hotline may be called to report deliberate abuse of Government materials for person gain or intentional misuse. Posters can be seen throughout the space.

What is the Fraud, Waste, Abuse and Corruption (FWAC) hotline.

Slide #67

100

While traveling overseas, the adversary may use techniques that include surveillance, hotel room bug, or elicitation.

What are foreign intelligence techniques.

Slide #64

100

The 2 documents required to get network access to our classified information systems. 

What is a NARF and GUAA


100

Classified material should have "this" item attached to the front and back. 

What is a coversheet.

Slide #49-50

200

Security discipline concerned with active and passive measures designed to prevent unauthorized access to personnel, equipment, installations and information and to safeguard them again espionage, sabotage, terrorism, damage and criminal activity.

What is PHYSEC (Physical Security)

200

This is required for meetings outside your organization so they can validate your clearance/accesses. 

What is a visit certification. 

Slide #38

200

Process by which we protect critical classified and unclassified information by forcing us to look through the eyes of the adversary. 

What is OPSEC (Operations Security)

Slide #27, 28

200

All users are required to read and accept this DoD disclaimer before processing on any information system.

What is a Notice and Consent Banner.

Slide #80

200

DoDI 5200.48 was published to establish a set standard for safeguarding this type of unclassified material.

What is Controlled Unclassified Material (CUI)

300

Security discipline designed to provide guidance to private sector firms/companies performing defense related classified contractor work for the Federal Government or DoD Organizations.

What is INDUSEC (Industrial Security)

Slide #26

300

Security regulators come in every two years and perform this action. 

What is a security inspection.

Slide #68

300

This is the communication or physical transfer of classified or controlled unclassified information to an unauthorized recipient.

What is unauthorized disclosure

Slide #66

300

This "policy" covers all removable media and transfers of data between different level networks.

What is the Media Protection and AFT SOP

Slide #84, 86

300

These markings are used to mark a picture or a paragraph in a classified document

What are portion markings

Slide #41, 45, 46, 47

400

Security discipline with policies which govern the protection of official government information in the interest of national security. 

What is INFOSEC (Information Security)

Slide #17, 18, 24

400

Any breach of security regulations, requirements, procedures or guidelines (such as a data spill, inadvertent disclosure) could result in this.

What is a security violation/incident.


400

The threat that an insider will use his or her authorized access, wittingly or unwittingly, to do harm to the security of the US. 

What is insider threat

Slide #63

400

This incident occurs when higher classification level of data is transferred to a lower classification system/device and sent via email. (Classified system to unclassified system)

What is a Classified Messaging Incident (CMI)

Slide #96

400

This type of classifier uses source material or the SCG to properly mark their document or material. 

What is a derivative classifier. 

Slide #40

500

Security discipline designed to protect data in transmission using strong encryption protocols to prevent unauthorized disclosure. 

What is COMSEC (Communications Security)

Slide #52

500

Information which could affect your access to classified information and areas if left unreported. Can report on yourself or a co-worker.

What is adverse information. 

Slide #29

500

This "plan" is put together to prevent the loss of critical technology through the use of Security Classification Guides and Critical Program Information (CPI).

What is a Program Protection Plan (PPP)

Slide #39

500

This "person" must approve Personally-Owned Electronic Devices (PEDs) allowed within Secure Areas. 

Who is the Program Security Officer (PSO)

Slide # 89

500

These documents and material must be tracked from cradle to grave and in many instances require two person integrity (TPI).

What is accountable material.

Slide # 51