what is the definition of insider threat?
insider who uses his/her access wittingly or unwittingly to harm national security interests or national security
When was the Privacy Act enacted?
1974
What is the goal of the Navy's suicide prevention program?
reduce suicides by producing resilient sailors
Define domestic abuse
domestic violence or a pattern of behavior resulting in emotion/psychological abuse, economic control, and/or interference with personal liberty
What are some examples of inappropriate behaviors that would fall on the far left side of the continuum or harm as related to sexual assault? Name 2
locker room style joking, spreading rumors, looking at questionable websites while on duty, displaying, forwarding, or posting inappropriate photos or graphics, making inappropriate/degrading remarks about appearance or sexual activity, degrading/inappropriate rituals (hazing)
Types of threats include: FIEs, Espionage, self-radicalization, workplace violence, inadvertent, and ______
Terrorism
Who oversees the Department's Privacy Program?
the DON CIO
what are some warning signs that a sailor may be vulnerable to acts of harming one's self?
legal action, intense relationship problems, academic failure, weapons purchase, increased substance use, social media posts
Physical, sexual, psychological
What is sexual harassment?
unwanted behavior of a sexual nature that creates a hostile work environment, including stalking, inappropriate texts, and emails. Escalating sexual harassment behaviors can lead to sexual assault.
How many countries target the US for information and technology?
97 countries
What month and year did the most notable breach occur?
June 2015
What is the acronym to remember warning signs?
IS PATH WARM
responsibility, beliefs, fear
What is sexual assault?
is intentional sexual contact characterized by use of force, threats, intimidation, abuse of authority, or when the victim does not or cannot consent.
Name 2 characteristics an individual might portray that would make them of potential target for coercion
Antisocial, narcissistic, impulsive, paranoid, entitled, vindictive
Name 2 items that are considered PII?
education, financial transactions, medical history, criminal or employment history, and information that can be used to distinguish or trace an individual’s identity, such as name, SSN (either full or truncated), date and place of birth, mother’s maiden name, address, phone number, biometric information
What are some unit level protective factors to help prevent suicides? Name 3
unit cohesion, peer support, belonging and purpose, engaged and concerned leaders, strong relationships, time for sleep and exercise, access to good nutrition, work life balance, professional environment
Name 2 effects on child witnesses of domestic violence
destructive behavior, emotional effects, effects on physical health, PTSD symptoms
What are the two reporting options?
Restricted vs unrestricted
You obtain a governmental security clearance and meet a new potential dating partner who is not a US citizen on a dating app. Your first couple dates go well and you plan to continue to seriously date; are you required to report this relationship to your security manager?
Yes
What is this definition describing: a criminal activity in which an adversary attempts to fraudulently acquire sensitive information by impersonating a trustworthy person or organization?
Phishing
Name two resources available to help sailors
military one source, national suicide prevention lifeline, veterans military crisis line, DOD safe helpline
Tactics used by abusers include (name 3)
controlling finances, controlling documents, using children, using male privilege, threatening, intimidating, isolating, inflicting emotional abuse
Name one type of retaliation?
reprisal, ostracism, maltreatment