Acronyms
Physical Security
Security of Information
IT Security
Current Security Trends
100

TS

What is Top Secret?

100

An area where access is limited to personnel who work there and have a minimum of a Reliability Status.

What is an Operations Zone?

100

Information that could cause loss of reputation for an organization or an individual

What is Protected B information?

100

Solicitor-Client Privilege information is treated as being equal to this security designation.

What is Protected B?

100

The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

What is Phishing?

200

CSNI

What is Consolidated Secret Network Infrastructure?

200

The location on one's body where DND employee access cards must be displayed. 

What is between the waist and shoulder?

200

The marking for information which, if disclosed without authorization, could reasonably be expected to cause serious injury to the national interest

What is Secret information?

200

The most common IT Security infraction amongst the OJAG

What is connecting a personal device to the DWAN?
200

The gaining of unauthorized access to data in a system or computer

What is hacking?

300

CEO

What is Canadian Eyes Only?

300

Access codes for Common area doors (ex. entrance to the JAG Library) should be changed this amount of time, at a minimum.

What is 6 months?

300

These should appear at the top and bottom of each page, and can be centered, left or right aligned.

What is a security marking?

300
The maximum amount of days before a user must change their DWAN password.

What is 90 days?

300

The act of disguising a communication from an unknown source as being from a known, trusted source.

What is Spoofing?

400

FVEY

What is 5 Eyes?

400

An area that provides assurance of speech privacy in that it prevents the overhearing of Protected and Classified information at various levels of sound attenuation.

What is a Sensitive Discussion Area?

400

Information that is categorized as Confidential, Secret, or Top Secret

What is Classified information?

400

Wireless devices must be at least this far away from Classified IT equipment.

What is 1 metre?

400

A type of malicious software designed to block access to a computer system until a sum of money is paid.

What is Ransomware?

500

PKI

What is Public Key Infrastructure?

500

Integrated-lock cabinet combinations are to be changed in the following scenarios: 1. when the lock is first used, 2. at least every year, 3. when any person knowing the combination is transferred/released, and this final scenario.

What is compromisation of combination?

500

A test used by DND employees and CAF members to consider what could happen if information were compromised

What is the Injury Test?

500

This keyboard shortcut allows a user to lock their computer.

What is the Windows key+L?

500

The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes

What is Social Engineering?