TS
What is Top Secret?
An area where access is limited to personnel who work there and have a minimum of a Reliability Status.
What is an Operations Zone?
Information that could cause loss of reputation for an organization or an individual
What is Protected B information?
Solicitor-Client Privilege information is treated as being equal to this security designation.
What is Protected B?
The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
What is Phishing?
CSNI
What is Consolidated Secret Network Infrastructure?
The location on one's body where DND employee access cards must be displayed.
What is between the waist and shoulder?
The marking for information which, if disclosed without authorization, could reasonably be expected to cause serious injury to the national interest
What is Secret information?
The most common IT Security infraction amongst the OJAG
The gaining of unauthorized access to data in a system or computer
What is hacking?
CEO
What is Canadian Eyes Only?
Access codes for Common area doors (ex. entrance to the JAG Library) should be changed this amount of time, at a minimum.
What is 6 months?
These should appear at the top and bottom of each page, and can be centered, left or right aligned.
What is a security marking?
What is 90 days?
The act of disguising a communication from an unknown source as being from a known, trusted source.
What is Spoofing?
FVEY
What is 5 Eyes?
An area that provides assurance of speech privacy in that it prevents the overhearing of Protected and Classified information at various levels of sound attenuation.
What is a Sensitive Discussion Area?
Information that is categorized as Confidential, Secret, or Top Secret
What is Classified information?
Wireless devices must be at least this far away from Classified IT equipment.
What is 1 metre?
A type of malicious software designed to block access to a computer system until a sum of money is paid.
What is Ransomware?
PKI
What is Public Key Infrastructure?
Integrated-lock cabinet combinations are to be changed in the following scenarios: 1. when the lock is first used, 2. at least every year, 3. when any person knowing the combination is transferred/released, and this final scenario.
What is compromisation of combination?
A test used by DND employees and CAF members to consider what could happen if information were compromised
What is the Injury Test?
This keyboard shortcut allows a user to lock their computer.
What is the Windows key+L?
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes
What is Social Engineering?