Security discipline with policies and procedures that establish standards, criteria and guidelines for personnel security determinations.
What is PERSEC (personnel security)
Slide #12
This hotline may be called to report deliberate abuse of Government materials for person gain or intentional misuse. Posters can be seen throughout the space.
What is the Fraud, Waste, Abuse and Corruption (FWAC) hotline.
Slide #67
While traveling overseas, the adversary may use techniques that include surveillance, hotel room bug, or elicitation.
What are foreign intelligence techniques.
Slide #64
The 2 documents required to get network access to our classified information systems.
What is a NARF and GUAA
Classified material should have "this" item attached to the front and back.
What is a coversheet.
Slide #49-50
Security discipline concerned with active and passive measures designed to prevent unauthorized access to personnel, equipment, installations and information and to safeguard them again espionage, sabotage, terrorism, damage and criminal activity.
What is PHYSEC (Physical Security)
This is required for meetings outside your organization so they can validate your clearance/accesses.
What is a visit certification.
Slide #38
Process by which we protect critical classified and unclassified information by forcing us to look through the eyes of the adversary.
What is OPSEC (Operations Security)
Slide #27, 28
All users are required to read and accept this DoD disclaimer before processing on any information system.
What is a Notice and Consent Banner.
Slide #80
DoDI 5200.48 was published to establish a set standard for safeguarding this type of unclassified material.
What is Controlled Unclassified Material (CUI)
Security discipline designed to provide guidance to private sector firms/companies performing defense related classified contractor work for the Federal Government or DoD Organizations.
What is INDUSEC (Industrial Security)
Slide #26
Security regulators come in every two years and perform this action.
What is a security inspection.
Slide #68
This is the communication or physical transfer of classified or controlled unclassified information to an unauthorized recipient.
What is unauthorized disclosure
Slide #66
This "policy" covers all removable media and transfers of data between different level networks.
What is the Media Protection and AFT SOP
Slide #84, 86
These markings are used to mark a picture or a paragraph in a classified document
What are portion markings
Slide #41, 45, 46, 47
Security discipline with policies which govern the protection of official government information in the interest of national security.
What is INFOSEC (Information Security)
Slide #17, 18, 24
Any breach of security regulations, requirements, procedures or guidelines (such as a data spill, inadvertent disclosure) could result in this.
What is a security violation/incident.
The threat that an insider will use his or her authorized access, wittingly or unwittingly, to do harm to the security of the US.
What is insider threat
Slide #63
This incident occurs when higher classification level of data is transferred to a lower classification system/device and sent via email. (Classified system to unclassified system)
What is a Classified Messaging Incident (CMI)
Slide #96
This type of classifier uses source material or the SCG to properly mark their document or material.
What is a derivative classifier.
Slide #40
Security discipline designed to protect data in transmission using strong encryption protocols to prevent unauthorized disclosure.
What is COMSEC (Communications Security)
Slide #52
Information which could affect your access to classified information and areas if left unreported. Can report on yourself or a co-worker.
What is adverse information.
Slide #29
This "plan" is put together to prevent the loss of critical technology through the use of Security Classification Guides and Critical Program Information (CPI).
What is a Program Protection Plan (PPP)
Slide #39
This "person" must approve Personally-Owned Electronic Devices (PEDs) allowed within Secure Areas.
Who is the Program Security Officer (PSO)
Slide # 89
These documents and material must be tracked from cradle to grave and in many instances require two person integrity (TPI).
What is accountable material.
Slide # 51