Emails that trick users into clicking malicious links.
Phishing
Propping this open can be a serious security violation.
Access-controlled door
A list used to screen international partners and customers.
Denied/Restricted Party List
You notice sensitive documents left on a shared printer. What should you do?
Secure/Shred them and inform the owner
You must do this before sharing controlled technical data with a foreign national.
Obtain export authorization.
This type of software is used to protect against unauthorized access.
Firewall
These devices record who enters and exits secure areas.
Access control systems or badge readers
Wassenaar Arrangement, Chemical Weapons Convention, Nuclear Suppliers Group, Missile Technology Control Regime and Australia group are all a type of this...
Voluntary Export Control Regime
Term describing someone withing the organization that poses a risk.
Insider Threat
This process evaluates whether a transaction involves high risk entities.
Restricted Party Screening
Something you should never share with coworkers, even if they ask nicely.
Password
Visitors must always do this when entering a business unit.
Sign in
These export controls apply to unlisted goods such as coffee cups and baseball bats.
catch all controls
You see someone in the office without a badge. What's your next step?
Report them to security
How often must employees complete mandatory security training?
Annually
Method of logging in that requires more than just a password.
Multi-Factor Authentication
You should always wear this while on site to identify yourself.
company issued ID Badge
Transferring controlled goods or technologies to a foreign national within your home country by any means.
Deemed Export
You receive a USB drive from an unknown source. What do you do?
Report it, DO NOT plug it in
Company security and Compliance policies are found where?
Inside CW
Practice that involves identifying and patching system weaknesses.
Vulnerability Management
The correct response when you see someone tailgating through a secure door.
Report the Incident
The US uniquely controls the export of "defense services" using this kind of license.
Technical Assistance Agreement (TAA)
The first thing you should do in a suspected data breach.
Report to IT security or your supervisor.
This policy defines what internet usage is allowed on company devices.
Acceptable Use Policy