Threat Awareness
Defensive Security
Security Classification
Reporting Requirements
Security Procedures & Duties
100
The practice of spying, or of using spies, typically by governments to obtain political and military information.
What is espionage?
100
The principle of sharing intelligence legally and responsibly with a cleared recipient.
What is Need to Know?
100
Unauthorized disclosure of this level of classified information could cause SERIOUS DAMAGE to national security.
What is Secret?
100
Security violations should be reported to this person/position.
Who is the FSO?
100
Lock combinations for a GSA-container should be classified at this level.
What is the highest classification level of the information contained in that drawer?
200
This type of espionage is based on not only the theft of classified information but also on theft of high-technology information, either for a monetary or political gain.
What is economic espionage?
200
These are 3 examples of what employees can do to reduce the risk of a cyber attack.
What are: use a secure password, do not open attachments from unfamiliar sources, do not click on links in emails, do not install any unfamiliar software, be aware of potentially spoofed email addresses, do not use the same password for multiple sites.
200
Unauthorized disclosure of this level of classified information could cause DAMAGE to national security.
What is Confidential?
200
Information that negatively reflects on the integrity or character of a cleared employee, that suggests that his or her ability to safeguard classified information may be impaired, or that his or her access to classified information clearly may not be in the interest of national security.
What is Adverse Information?
200
Unclassified notes, travel itineraries, working papers, etc. in the Boston Fusion office should be placed here when no longer needed.
What is the proprietary bin?
300
Information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations, or persons, or their agents, or international terrorist organizations or activities.
What is Counterintelligence?
300
A computer attack strategy that involves spoofing or infecting a known website that the target is likely to visit.
What is a watering hole attack?
300
A set of classification instructions issued by an original classification authority.
What is a Security Classification Guide?
300
Any individual who tries to obtain illegal or unauthorized access to classified information, usually by approaching or interacting with a cleared employee.
What is a suspicious contact?
300
This is a system of security checks performed to ensure that classified material is stored properly.
What is an end-of-day check? Daily Double: Describe Boston Fusion's end-of-day check procedure.
400
THIS type of threat is currently the most prevalent and dangerous threat to national security.
What is the Insider Threat?
400
An e-mail spoofing fraud attempt that targets a specific organization or person, seeking unauthorized access to proprietary or classified data.
What is spear phishing?
400
Unauthorized disclosure of this level of classified information could cause EXCEPTIONALLY GRAVE DAMAGE to national security.
What is Top Secret?
400
These are 3 examples of Adverse Information.
What is potential foreign influence; unexplained affluence; financial problems; excessive alcohol or drug use; emotional, mental and personality disorders; criminal conduct; misuse of IT systems; security violations and deviations; questionable allegiance to the United States; sexual behavior and personal conduct.
400
The communication from one cleared facility to another that a traveler will be arriving, and will need access to classified information while on-site.
What is a visit request?
500
This website is useful to check for foreign threat awareness before traveling overseas.
What is the State Department Travel website (http://www.state.gov/travel/)?
500
The art and science of engaging someone in simple, “innocent” conversation for the purpose of getting the targeted individual to speak openly and more in-depth and, possibly reveal classified information on topics of interest to Foreign Intelligence operatives.
What is elicitation?
500
This type of information indicates that sources & methods are revealed along with intelligence info.
What is SCI? (Sensitive Compartmented Information)
500
This method of reporting may be used only when an employee feels that reporting a matter to Boston Fusion Security would not be prudent.
What is the DoD Hotline? Daily Double: Where can an employee find this information (without asking the FSO for it?)
500
These are the three criteria that must be met in order to gain access to classified information.
What is 1) a security clearance at the appropriate level; 2) a need-to-know; and 3) a signed Classified Information Non-Disclosure Agreement (SF-312).