Security Violations, Espionage, Workplace Violence, Unauthorized Disclosures and Unwitting actions that increase vulnerabilities are examples of this.
What is Insider Threat?
This form is called a Contract Security Classification Specification.
What is a DD Form 254?
What Standard is used for safeguarding Secret Classification.
What is three SF 704?
This system of verification has replaced JPAS.
What is DISS?
This instruction governs the DoD Physical Security Program.
What is DoD Instruction 5200.08?
This Standard form has to be signed before someone is granted access to classified information.
What is SF 312?
DOD representative responsible for managing contractors.
What is the COR?
Incorporating, paraphrasing, restating, or generating in new form information that is already classified, and marking the newly developed material consistent with the classification markings that apply to the source information.
What is a Derivative Classification?
This eligibility can be granted with:
1. Proof of citizenship
2. Favorable FBI, SF86 and local files review
3. Open investigation
What is interim?
A situation or circumstance, which left unchanged, may result in the degradation, loss of life, or damage to mission-essential resources.
What is a vulnerability?
This type of unclassified information has replaced other classifications ie. FOUO
What is CUI?
(Controlled Unclassified Information)
Minimum access needed for a contractor access to the network.
What is Tier 1?
Any knowing, willful, or negligent action that could reasonably be expected to result in an unauthorized disclosure of classified information.
What is a violation?
A periodic review of the an individual’s background to determine whether they continue to meet the requirements for national security eligibility.
What is Continuous Evaluation?
Layered and complimentary security controls sufficient to deter, detect, and document unauthorized entry and movement within the facility or area.
What is Security-in-Depth?
The acronym is FOIA.
What is Freedom of information Act?
True or False
A contractor can have access to Fort Hood without having a Common access card.
What is a true?
Individual appointed by the Commander to oversea the Information program.
Who is the Security Manager?
SEAD 4 contains thirteen of these for eligibility guidance for access to classified information.
What are the Nation Security Adjudicative Guidelines?
These are used to reduce patterns, change schedules, and visibly increase the security profile of an installation
What are random antiterrorism measures?
There are this many federal investigative standard tiers.
What is 5?
This person must always approve an SCI contract on the DD Form 254.
Who is the SSO?
Special Security Officer
Security incident that occurs whenever classified data is misused on an unclassified information system
What is Spillage?
All personnel with national security eligibility will be given initial and an annual refresher of this.
What is security training?
A place (land, sea or air) in which there are special measures employed to prevent or minimize incursions and/or interference, where special security measures are employed to prevent unauthorized entry
What is a restricted area?