More Security
InduSec
InfoSec
PerSec
PhySec
100

Security Violations, Espionage, Workplace Violence, Unauthorized Disclosures and Unwitting actions that increase vulnerabilities are examples of this.

What is Insider Threat?

100

This form is called a Contract Security Classification Specification.

What is a DD Form 254?

100

DoDM 5200.01, Information Security Program has this many volumes.

What is three?

1. Overview, Classification, and Declassification 

2. Marking Classified Information

3. Protection of Classified Information

100

This system of verification has replaced JPAS.

What is DISS?

100

This instruction governs the DoD Physical Security Program.

What is DoD Instruction 5200.08?

200

The process of informing a person their need-to-know for access to classified information is no longer required or has been terminated.

What is debrief?

200

The system that is used to verify facility clearances.

What is the NISS?

National Industrial Security System

200

Incorporating, paraphrasing, restating, or generating in new form information that is already classified, and marking the newly developed material consistent with the classification markings that apply to the source information.

What is a Derivative Classification?

200

This eligibility can be granted with:

1. Proof of citizenship

2. Favorable FBI, SF86 and local files review

3. Open investigation

What is interim?

200

A situation or circumstance, which left unchanged, may result in the degradation, loss of life, or damage to mission-essential resources.

What is a vulnerability?

300

This unclassified information associated with a law, regulation, or government-wide policy and identified as needing safeguarding.

What is CUI?

(Controlled Unclassified Information)

300

This access must be approved to have access to a STE phone at a contractor location.

What is COMSEC?

300

Any knowing, willful, or negligent action that could reasonably be expected to result in an unauthorized disclosure of classified information. 

What is a violation?

300

A periodic review of the an individual’s background to determine whether they continue to meet the requirements for national security eligibility.

What is Continuous Evaluation?

300

Layered and complimentary security controls sufficient to deter, detect, and document unauthorized entry and movement within the facility or area. 

What is Security-in-Depth?

400

The acronym is FOCI.

What is Foreign, Ownership, Control or Influence?

400

This sequence of numbers and/or letters are used to research a facility clearance.

What is a cage code?

400

Individual appointed by the senior intelligence official to be responsible for the day-to-day security management, operation, implementation, use, and dissemination of SCI within an activity.

Who is the SSO?

(Special Security Officer)

400

SEAD 4 contains thirteen of these for eligibility guidance for access to classified information.

(Security Executive Agent Directive)

What are the Nation Security Adjudicative Guidelines?

400

These are used to reduce patterns, change schedules, and visibly increase the security profile of an installation

What are random antiterrorism measures?

500

There are this many federal investigative standard tiers.

What is 5?

500

This person must always approve an SCI contract on the DD Form 254.

Who is the SSO?

Special Security Officer

500

This order prescribes a uniform system for classifying, safeguarding, and declassifying national security information, including information relating to defense against transnational terrorism.

What is Executive Order (E.O.) 13526—Classified National Security Information Memorandum of December 29, 2009?

500

All personnel with national security eligibility will be given initial and an annual refresher of this.

What is security training?

500

A place (land, sea or air) in which there are special measures employed to prevent or minimize incursions and/or interference, where special security measures are employed to prevent unauthorized entry

What is a restricted area?