Threat Awareness
Defensive Security
Security Classification
Reporting Requirements
Security Procedures & Duties
100
The act of obtaining, delivering, transmitting, communicating, or receiving information in respect to the national defense with an intent or reason to believe that the information may be used to the injury of the United States or to the advantage of any foreign nation.
What is espionage?
100
This condition is met when a potential recipient demonstrates the requirement for access to classified information.
What is Need to Know?
100
Unauthorized disclosure of this level of classified information could cause SERIOUS DAMAGE to national security.
What is Secret?
100
Security violations should be reported to this person/position.
Who is the FSO?
100
Lock combinations for a classified storage container should be classified at this level.
What is the same classification level of the information they are storing?
200
This is an espionage indicator.
What are: Sudden Unexplained Affluence Frequent Foreign Travel Abuse of Authority Removing Classified Information from the Office Excessive use of the Copier Bragging about Foreign Connections
200
These are two collection trends to watch out for on the internet.
What are: dual-use technologies, “off the shelf” hardware and software and suspicious contacts made on social media sites.
200
Unauthorized disclosure of this level of classified information could cause DAMAGE to national security.
What is Confidential?
200
Information that reflects unfavorably on the trustworthiness or reliability of a cleared employee and suggests that his or her ability to safeguard classified information may be impaired.
What is Adverse Information?
200
This should be placed on any doors to a room where work is being performed on classified material.
What is a Classified Work in Progress sign?
300
Anything that reduces the adversary’s ability to exploit vulnerabilities; can include changes in procedure, controlling dissemination, and cover/deception.
What are countermeasures?
300
A witness, though not required for this level (or lower) of classified material, should be used.
What is a requirement for the destruction of Secret material?
300
One of the three ways access to classified information can come to industry users.
What is a DD Form 254, Security Classification Guide, or classified source materials?
300
Any individual who tries to obtain illegal or unauthorized access to classified information, usually by approaching or interacting with a cleared employee.
What is a suspicious contact?
300
These are the options when a visitor or uncleared employee is present in the area while someone is working on classified information.
What is: covering the information, turning the information face down, or placing the information in an approved storage container?
400
THIS type of threat is currently the most prevalent and dangerous threat to national security.
What is the Insider Threat?
400
Before granting anyone access to classified information in your possession, clearance level and need-to-know confirmation for the potential receiver should come from this individual.
Who is the FSO?
400
Unauthorized disclosure of this level of classified information could cause EXCEPTIONALLY GRAVE DAMAGE to national security.
What is Top Secret?
400
These are 3 examples of Adverse Information.
What is: excessive indebtedness or recurring financial problems, unexplained affluence, use of illegal drugs or excessive use of intoxicants, bizarre behavior, mental or emotional problems, and criminal behavior.
400
This is who generally transmits classified information from one facility to another.
Who is the FSO or Security Office?
500
This information, which includes salary and wage lists, technical and research data, and proposals, should not be released outside of the company.
What is proprietary information?
500
Foreign Intelligence Services gather information of interest through one of these methods.
What are: Satellites, Signal Intercept, Open Sources, Foreign Students, Contractors (Elicitation), Recruited Agents, Entry (unauthorized/authorized)?
500
This agency has cognizance over DoD classified information marked Confidential, Secret, or Top Secret.
What is DSS (Defense Security Service)?
500
This method of reporting may be used when an employee feels that reporting a matter to CWU Security would not be prudent.
What is the DoD Hotline?
500
These are the two criteria that must never be used to generate an adverse information report.
What are rumor and innuendo?