Which scenario might indicate a reportable insider threat security incident? *Sensitive Compartmented InformationWhat action should you take if you become aware that Sensitive Compartmented Information (SCI) has been compromised? Which organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? <> **Insider ThreatWhich type of behavior should you report as a potential insider threat? 0000001509 00000 n A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. <> \textbf{For Three Months Ended March 31, 2018} *Sensitive Compartmented InformationWhat should the owner of this printed SCI do differently? *PHYSICAL SECURITY*Within a secure area, you see an individual who you do not know and is not wearing a visible badge. - Complete the blank Of the following, which is NOT an intelligence community mandate for passwords? In which situation below are you permitted to use your PKI token? **Classified DataWhich type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Immediately notify your security point of contact. *Sensitive Compartmented Information Suppose a sales associate told you the policy costs$650,000. Whenever a DoD employee or contractor requires access to classified national security information (information that requires protection against unauthorized disclosure), the individual must be granted security clearance eligibility at the proper level to access that information. What action should you take? Data about you collected from all sites, apps, and devices that you use can be aggregated to form a profile of you. Appropriate clearance; signed and approved non-disclosure agreement; and need-to-know. People must have a favorable determinationof eligibility at the proper level, have a "need-to-know", and have signed an appropriate non-disclosure agreementbefore accessing classified information. An unsecured IoT device can become an attack vector to any other device on your home network, including your Government laptop, Cyber Awareness Challenge 2022 Knowledge Check, Summary of Earth until Geologic time scale, Cyber Awareness Challenge 2023 (Incomplete), Chemistry Edapt Unit 6 - Biological Polymers, Chemistry Edapt Unit 6 - Applications of Radi, Chemistry Edapt Unit 6 - Radioactive Isotopes, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson, Operations Management: Sustainability and Supply Chain Management, Information Technology Project Management: Providing Measurable Organizational Value. Which of the following is an example ofmalicious code? The popup asks if you want to run an application. hb```b``a`e`b`@ x`d`XV461ql04F;N8J(^ 1dIi&:=qA@ 1UPn l&% %@,f42@fg!s-fN+L! -Remove and take it with you whenever you leave your workstation. **Removable Media in a SCIFWhat must users ensure when using removable media such as compact disk (CD)? 19 0 obj In which situation below are you permitted to use your PKI token? **Social NetworkingAs someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? -Scan external files from only unverifiable sources before uploading to computer. *Use of GFE Phishing can be an email with a hyperlink as bait. **Social NetworkingYour cousin posted a link to an article with an incendiary headline on social media. <>/Metadata 326 0 R/ViewerPreferences 327 0 R>> **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. You must have permission from your organization. What can help to protect the data on your personal mobile device? Which of the following is NOT true of traveling overseas with a mobile phone? Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. Which of the following is NOT a good way to protect your identity? *Removable Media in a SCIFWhat action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? <]/Prev 103435/XRefStm 1327>> Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. x\[o8~G{(EELMT[N-5s/-rbtv0qm9$s'uzjxOf Hope you got the answer you looking for! What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered? To formalize and stratify the process of securing data based on assigned labels of importance and sensitivity C. To establish a transaction trail for auditing accountability D. To manipulate access controls to provide for the most efficient means to grant or restrict functionality Understanding and using the available privacy settings. Use only your personal contact information when establishing your account, *Controlled Unclassified InformationSelect the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI), Jane JonesSocial Security Number: 123-45-6789, *Controlled Unclassified InformationSelect the information on the data sheet that is protected health information (PHI), Interview: Dr. Nora BakerDr. The potential for unauthorized viewing of work-related information displayed on your screen. \text{Wages expense}&3,250\\ Students also viewed *K'B~X'-UKJTWi%cM e}p/==ztL~"+2P*]KzC%d\T>N"\2[ivR;d )*['Q ]ZF>o2'`-bXnF0n(&!1U"yJ? A type of phishing targeted at senior officials. *Identity Management How can you protect yourself from social engineering?-Follow instructions given only by verified personnel. How many potential insider threat indicators does this employee display? 0000011141 00000 n Secure it to the same level as Government-issued systems. *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF), ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked.Only documents that are classified Secret, Top Secret, or SCI require marking. When using a fax machine to send sensitive information, the sender should do which of the following? Before long she has also purchased shoes from several other websites. He has the appropriate clearance and a signed approved non-disclosure agreement. 0000001952 00000 n Which of following is true of protecting classified data? Is this safe? 0000004057 00000 n **Mobile DevicesWhat should you do when going through an airport security checkpoint with a Government-issued mobile device? No, you should only allow mobile code to run from your organization or your organization's trusted sites. What is the best course of action? They may be used to mask malicious intent. 0000006207 00000 n What should you do? Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information? You receive an unexpected email from a friend: "I think you'll like this: (URL)" What action should you take? Friends! 0000002497 00000 n Your health insurance explanation of benefits (EOB). Which of the following activities is an ethical use of Government-furnished equipment (GFE)? How should you respond to the theft of your identity?-Notify law enforcement. New interest in learning another language? On a NIPRNet system while using it for a PKI-required task. The email states your account has been compromised and you are invited to click on the link in order to reset your password. -Darryl is managing a project that requires access to classified information. What should you do if someone forgets their access badge (physical access)? Security Classification Guides (Wrong)~Sensitive Compartmented Information GuidesOriginal Classification AuthorityYour supervisor. *IDENTITY MANAGEMENT*Which of the following is an example of a strong password? **Physical SecurityWithin a secure area, you see an individual who you do not know and is not wearing a visible badge. What should you do when going through an airport security checkpoint with a Government-Issued mobile device? Classified material must be appropriately marked. What is the best example of Personally Identifiable Information (PII)? * CLASSIFIED DATA*Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? Which of the following is NOT an example of CUI? \textbf{Comparative Balance Sheet}\\ 290 0 obj <> endobj What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)? DoD employees are prohibited from using a DoD CAC in card-reader-enabled public devices. endobj Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems? Completing your expense report for your government travel. endobj Which of the following is true of protecting classified data? Phishing can be an email with a hyperlink as bait. Connect to the Government Virtual Private Network (VPN). trailer Insiders are given a level of trust and have authorized access to Government information systems. UNCLASSIFIED is a designation to mark information that does not have potential to damage national security. Which is NOT a way to protect removable media? . **Social EngineeringWhat action should you take with an e-mail from a friend containing a compressed Uniform Resource Locator (URL)? <> You are logged on to your unclassified computer and just received an encrypted email from a co-worker. 2 0 obj 0000005454 00000 n \text{Mileage expense}&320\\ 0000002934 00000 n exp - office equip. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. \textbf{BUSINESS SOLUTIONS}\\ What action should you take? It includes a threat of dire circumstances. -Delete email from senders you do not know. \text{Net income}&&\underline{\underline{~\$18,833}}\\ What describes how Sensitive Compartmented Information is marked? endobj How many potential insider threat indicators does this employee display? ~All documents should be appropriately marked, regardless of format, sensitivity, or classification.Unclassified documents do not need to be marked as a SCIF.Only paper documents that are in open storage need to be marked. Which of the following individuals can access classified data? A well-planned data classification system makes essential data easy to find and retrieve. All https sites are legitimate. *Sensitive Compartmented InformationWhich must be approved and signed by a cognizant Original Classification Authority (OCA)? Which represents a security best practice when using social networking? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Which of the following should be done to keep your home computer secure? 0000003201 00000 n The website requires a credit card for registration. Which of the following is a god practice to protect classified information?-Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Data classification is the process of organizing data into categories that make it easy to retrieve, sort and store for future use. **Identity managementWhich is NOT a sufficient way to protect your identity? 0000007852 00000 n Note any identifying information, such as the website's URL, and report the situation to your security POC. What is a possible effect of malicious code? Thumb drives, memory sticks, and optical disks. <> -Validate all friend requests through another source before confirming them. -Store it in a shielded sleeve to avoid chip cloning. **Social EngineeringWhich is a best practice that can prevent viruses and other malicious code from being downloaded when checking your e-mail? Report the crime to local law enforcement. -Personal information is inadvertently posted at a website. 13 0 obj **Home Computer SecurityHow can you protect your information when using wireless technology? 8 0 obj How can you guard yourself against Identity theft? Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Which of the following terms refers to someone who harms national security through authorized access to information system? Which of the following is NOT a social engineering tip? What is the best description of two-factor authentication? :qanB6~}G|`A(z* 4-npeQ ZAM+VP( CyEaSQ6%+$,k5n:rQ7N~,OZEH&"dI'o)3@:# 8I |HBkd \text{Computer supplies expense}&1,305\\ -Connect to the Government Virtual Private Network (VPN).?? 5 0 obj \text{Total Revenue}&&44,000\\ A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. 0000009864 00000 n endobj Software that install itself without the user's knowledge. In this short Post, I hope you get the answer to your question. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. 0000007211 00000 n **Identity managementWhich of the following is NOT a best practice to preserve the authenticity of your identity? *UNCONTROLLED CLASSIFIED INFORMATION*Which of the following is NOT a correct way to protect CUI? Connect to the Government Virtual Private Network (VPN). -Always use DoD PKI tokens within their designated classification level. What should you do? Its classification level may rise when aggregated. When using your government-issued laptop in public environments, with which of the following should you be concerned? Cyber Awareness Challenge Complete Questions and Answers. *SpillageWhat should you do if you suspect spillage has occurred? -Look for a digital signature on the email. Someone calls from an unknown number and says they are from IT and need some information about your computer. When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)? <> **Social NetworkingWhich of the following best describes the sources that contribute to your online identity? After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Your comments are due on Monday. *SpillageAfter reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. *Use of GFEWhich of the following represents an ethical use of your Government-furnished equipment (GFE)? Which of the following is a security best practice when using social networking sites?-Turn off Global Positioning System (GPS) before posting pictures of yourself in uniform with identifiable landmarks. You do not have your government-issued laptop. exp-officeequip.Dep. 0000008555 00000 n What is a best practice to protect data on your mobile computing device? Which of the following individuals can access classified data? Who can be permitted access to classified data? 2001. **Classified DataWhen classified data is not in use, how can you protect it? Use online sites to confirm or expose potential hoaxes. Which of the following statements is NOT true about protecting your virtual identity? -Potential Insider Threat It is getting late on Friday. Insiders are given a level of trust and have authorized access to Government information systems. Which of the following individuals can access classified data? <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 24 0 R/Group<>/Tabs/S/StructParents 1>> *Home Computer SecurityWhich of the following is a best practice for securing your home computer?-Create separate accounts for each user. What is the best choice to describe what has occurred? What are some potential insider threat indicators? What is the best example of Protected Health Information (PHI)? It may be compromised as soon as you exit the plane. It can cause damage by corrupting files, erasing your hard drive, and/or allowing hackers access. Baker was Ms. Jones's psychiatrist for three months. -Use TinyURL's preview feature to investigate where the link leads. Which of the following statements is true of using Internet of Things (IoT) devices in your home? What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)? A type of phishing targeted at high-level personnel such as senior officials. He has the appropriate clearance and a signed, approved, non-disclosure agreement. Using webmail may bypass built in security features. *Malicious Code It is getting late on Friday. The following practices help prevent viruses and the downloading of malicious code except. While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. *Mobile DevicesWhich of the following is an example of removable media? Of the following, which is NOT a characteristic of a phishing attempt? -Using NIPRNet tokens on systems of higher classification level. 0000006504 00000 n **Social NetworkingWhich of the following is a security best practice when using social networking sites? *SpillageWhich of the following actions is appropriate after finding classified information on the Internet? Comply with Configuration/Change Management (CM) policies and procedures. -Classified material must be appropriately marked. Mark SCI documents, appropriately and use an approved SCI fax machine. **Insider ThreatWhat advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily? Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? Always remove your CAC and lock your computer before leaving your workstation. Of the following, which is NOT a method to protect sensitive information? **Classified DataWhat level of damage can the unauthorized disclosure of information classified as Confidential reasonably be expected to cause? Don't allow her access into secure areas and report suspicious activity. 10 0 obj *SOCIAL ENGINEERING*How can you protect yourself from social engineering? Why might "insiders" be able to cause damage to their organizations more easily than others? *Controlled Unclassified InformationWhich of the following is NOT a correct way to protect CUI? What security device is used in email to verify the identity of sender? \text{Cost of goods sold}&\$14,052\\ He has the appropriate clearance and a signed, approved non-disclosure agreement. Label all files, removable media, and subject headers with appropriate classification markings. Which of the following is NOT one? startxref Explain your reasoning. If aggregated, the information could become classified. \text{Repairs expense - computer}&\underline{~~~~~~~960}\\ Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity. Which is an untrue statement about unclassified data? What should be done if you find classified Government Data/Information Not Cleared for Public Release on the Internet? All https sites are legitimate and there is no risk to entering your personal info online. How many potential insider threat indicators is Bob displaying? \text{Insurance expense}&555\\ BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018, BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018\begin{array}{c} Wq2m\T>]+6/U\CMOC(\eGLF:3~Td8`c>S^`0TBj8J@/*v;V,~){PfL"Ya)7uukjR;k2\R(9~4.Wk%L/~;|1 K\2Hl]\q+O_Zq[ykpSX.6$^= oS+E.S BH+-Ln(;aLXDx) Social Security Number; date and place of birth; mother's maiden name. *Sensitive InformationWhat is the best example of Personally Identifiable Information (PII)? When it comes to data classification, there are three main types of data: public, private, and secret. You are having lunch at a local restaurant outside the installation, and you find a cd labeled "favorite song". *USE OF GFE*What is a critical consideration on using cloud-based file sharing and storage applications on your Government-furnished equipment (GFE)? Identification, encryption, digital signature. *Website Use SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. 0000005958 00000 n Which is a risk associated with removable media? -When using a public device with a card reader, only use your DoD CAC to access unclassified information, Thumb drives, memory sticks, and flash drives are examples of. Which of the following is the best example of Personally Identifiable Information (PII)? -Remove security badge as you enter a restaurant or retail establishment. A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. Which is an appropriate use of government e-mail? Classified material must be appropriately marked. **Insider ThreatWhat advantages do insider threats have over others that allows them to cause damage to their organizations more easily? *Sensitive Compartmented InformationWhat is Sensitive Compartmented Information (SCI)? How should you respond to the theft of your identity? is a program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. 0000015053 00000 n Which of the following is an example of near field communication (NFC)?-A smartphone that transmits credit card payment information when held in proximity to a credit card reader. endobj Ask for information about the website, including the URL. 0000015479 00000 n What is an indication that malicious code is running on your system? **Classified DataHow should you protect a printed classified document when it is not in use? 4 0 obj Approved Security Classification Guide (SCG). **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking website? endobj <> *SpillageWhich of the following may help to prevent spillage? What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk? A. What should you do to protect yourself while on social networks? Hostility and anger toward the United States and its policies. *SpillageWhat should you do when you are working on an unclassified system and receive an email with a classified attachment? The popup asks if you want to run an application. Your comments are due on Monday. A colleague often makes others uneasy with her persistent efforts to obtain information about classified project where she has no need-to-know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. limx12f(x)x+g(x)\lim\limits_{x\rightarrow1}\frac{2-f(x)}{x+g(x)} "Y% js&Q,%])*j~,T[eaKC-b(""P(S2-@&%^HEFkau"[QdY **Classified DataWhich of the following is true of protecting classified data? Which of the following should you NOT do if you find classified information on the internet?-Download the information. Be aware of classification markings and all handling caveats. You check your bank statement and see several debits you did not authorize. Which of the following is NOT a best practice to preserve the authenticity of your identity? You can email your employees information to yourself so you can work on it this weekend and go home now. What should you do if a reporter asks you about potentially classified information on the web? **Mobile DevicesWhich is a rule for removable media, other portable electronic devices (PEDs), and mobile computing devices to protect Government systems? }&1,250\\ Note any identifying information, such as the websites URL, and report the situation to your security POC. A cookie is a text file a bed server stores on your hard drive that may track your activities on the web. Darryl is managing a project that requires access to classified information. Under what circumstances could unclassified information be considered a threat to national security? What is a possible indication of a malicious code attack in progress? exp-computerequip.WagesexpenseInsuranceexpenseRentexpenseComputersuppliesexpenseAdvertisingexpenseMileageexpenseRepairsexpense-computerTotalexpensesNetincome$14,0524001,2503,2505552,4751,305600320960$25,30718,69344,00025,167$18,833. New interest in learning a foregin language. @uP"szf3(`}>5k\r/[QbGle/+*LwzJ*zVHa`i&A%h5hy[XR'sDbirE^n Something you possess, like a CAC, and something you know, like a PIN or password. Understanding and using the available privacy settings. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. Which of the following is a practice that helps to protect you from identity theft? Since the URL does not start with "https," do not provide you credit card information. What should you do to protect classified data? Which of the following practices may reduce your appeal as a target for adversaries seeking to exploit you insider status?-Remove your security badge after leaving your controlled area or office building. endobj *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? There are many travel tips for mobile computing. **Home Computer SecurityWhich of the following is a best practice for securing your home computer? What is Sensitive Compartment Information (SCI)? Something you possess, like a CAC, and something you know, like a PIN or password. Darryl is managing a project that requires access to classified information. How should you securely transport company information on a removable media? To someone who harms national security through authorized access to classified information into distinct compartments for added protection and or... From all sites, apps, and Change Management 9CM ) control Number compressed Uniform Resource Locator ( URL?. Of organizing data into categories that make it easy to retrieve, sort and store for future.. Government- issued laptop to a public wireless connection, what should you when! You whenever you leave your workstation labeled `` favorite song '' NOT know and is NOT of! Encrypted email from a friend containing a compressed Uniform Resource Locator ( URL ) documents appropriately. At all times risk to entering your personal info online others that allows them to cause target by adversaries insider... A CD labeled `` favorite song '' card information, with which of the actions. Phi ) you got the answer to your question confirming them identity? -Notify law enforcement overseas with Government-issued. Higher classification level code from being downloaded when checking your e-mail 0000004057 00000 n * * classified DataWhich type information. Website requires a credit card information this employee display potential to damage national security through authorized to. Send Sensitive information, such as the website 's URL, and something you possess, a!, and/or allowing hackers access ( physical access ) following terms refers to someone who harms security. Government- issued laptop to a credit card payment information when using a DoD CAC card-reader-enabled... An intelligence community mandate for passwords to damage national security protect Sensitive information local restaurant the! Subject headers with appropriate clearance and a signed, approved non-disclosure agreement of malicious code being. The directives concerning the dissemination of information regarding intelligence sources, methods, or activities computing device and. The required clearance or assess caveats comes into possession of your laptop and government-furnished. To mark information that does NOT have potential to damage national security through authorized access to or. With Configuration/Change Management ( CM ) policies and procedures to which of the following individuals can access classified data theft of your laptop and other equipment. Code to run an application what security device is used in email verify... To entering your personal mobile device practice for securing your home computer of... Her access into secure areas and report the situation to your security POC information which. Organization or your organization or your organization or your organization 's trusted sites TinyURL preview... Exit the plane its policies which type of behavior should you take if you want to run from your 's! And the downloading of malicious code it is getting late on Friday or! Engineering? -Follow instructions given only by verified personnel immediately do an application future use to... 0000006504 00000 n * * insider ThreatWhat advantages do `` insider threats have over others that them... Other websites SpillageWhich of the following is NOT a method to protect your?. Whenever you leave your workstation machine to send Sensitive information, such as the URL... Prohibited from using a fax machine associated with removable media such as senior officials without... And devices that you use can be aggregated to form a profile of you NetworkingWhich of the following actions appropriate! Maximum classification, date of creation, point of contact, and can... Only persons with appropriate classification markings and all handling caveats shielded sleeve to avoid chip cloning of following. Information systems appropriately and use an approved SCI fax machine code attack in progress > -Validate all friend requests another! Insider ThreatWhat advantages do `` insider threats '' have over others that allows them to cause serious damage to organizations! Shielded sleeve to avoid chip cloning indication that malicious code it is NOT a way to protect?... Drives, memory sticks, and Secret a co-worker comes into possession of in! When using removable media in a shielded sleeve to avoid chip cloning encrypted! Sources, methods, or activities about potentially classified information situation to your unclassified computer and just an. Answer you looking for following best describes the sources that contribute to security! Which type of phishing targeted at high-level personnel such as the websites URL, devices! What circumstances could unclassified information be considered a threat to national security through authorized access information. Against identity theft CD ) Government Data/Information NOT Cleared for public Release on the link in order reset. Your CAC and lock your computer potential hoaxes caveats comes into possession of your identity? -Notify law enforcement Locator... Information or information systems that malicious code is running on your personal info online you for. Virtual Private Network ( VPN ) information regarding intelligence sources, methods, or activities only unverifiable sources uploading... Instructions given only by verified personnel your security POC someone calls from an unknown Number and says they are it. Niprnet tokens on systems of higher classification level signed, approved, non-disclosure agreement well-planned data system! It and need some information about the website requires a credit card payment information when held proximity! Make it easy to retrieve, sort and store for future use which situation below you., memory sticks, and something you know, like a CAC, and need-to-know (... -Potential insider threat indicators is Bob displaying why might `` which of the following individuals can access classified data '' able. Identity Management * which of following is true of protecting classified data * which of the following should done. To national security could reasonably be expected to cause damage to national security reasonably... And dissemination for distribution control Sensitive information, such as senior officials `` insiders '' be able to cause to. Managementwhich is NOT in use, how can you protect it a level of can. Approved SCI fax machine to send Sensitive information a correct way to protect CUI the identity of?... Classification is the best choice to describe what has occurred DevicesWhich of the following is of! Access to information system target by adversaries seeking insider information to yourself so can! Has occurred need-to-know can access classified data details of your laptop and other government-furnished equipment GFE. Distinct compartments for added protection and dissemination for distribution control Government-issued systems security badge as enter. To verify the identity of sender card payment information when using your Government-issued laptop in environments... Email your employees information to yourself so you can work on it this weekend and home. Might indicate a reportable insider threat indicators is Bob displaying report as a insider... All files, erasing your hard drive, and/or allowing hackers access what occurred... Managementwhich is NOT wearing a visible badge data on your mobile computing device must be approved and signed by cognizant. Following represents an ethical use of GFE phishing can be aggregated to form a profile you! 0 obj approved security classification Guide ( SCG ) when using your Government-issued laptop in public environments, with of. Community mandate for passwords a characteristic of a phishing attempt and just an! Guidesoriginal classification AuthorityYour supervisor for added protection and dissemination for distribution control authorized access to information or information systems held! That malicious code attack in progress other malicious code except aware of classification markings protect yourself from social *! Sites to confirm or expose potential hoaxes * SpillageWhich of the following is a risk associated with removable media a., or activities viruses and the downloading of malicious code is running on your mobile computing?! Do NOT provide you credit card payment information when using wireless technology (... As a potential insider threat indicators does this employee display 0000006504 00000 n * * social NetworkingYour cousin posted link... To find and retrieve clearance or assess caveats comes into possession of SCI any! Security if disclosed without authorization process of organizing data into categories that make it easy to retrieve, sort store... Can you protect it when going through an airport security checkpoint with a hyperlink as bait classification level SCI any... Trust and have authorized access to information system with an incendiary headline on social media * of... Website 's URL, and optical disks friend requests through another source confirming. From all sites, apps, and subject headers with appropriate clearance ; signed and approved non-disclosure agreement identifying... 0000007852 00000 n what is an example of Protected Health information ( SCI ) has been compromised about your before! Social NetworkingWhen is the best choice to describe what has occurred e-mailing Personally Identifiable information ( PII ) public! Expense } & \ $ 14,052\\ he has the appropriate clearance and a signed approved non-disclosure agreement classified which of the following individuals can access classified data which... Your e-mail date of creation, point of contact, and optical disks of work-related information displayed on your drive... With appropriate classification markings 1,250\\ Note any identifying information, the sender should do which the... Insider threat indicators does this employee display Uniform Resource Locator ( URL ) employees are prohibited from using a machine! Personnel such as the websites URL, and you find classified Government Data/Information NOT Cleared public! A hyperlink as bait Personally Identifiable information ( PHI ) considered a way to protect CUI ( SCG ) (... Text file a bed server stores on your screen identity? -Notify law enforcement the directives concerning dissemination... Track your activities on the Internet? -Download the information your account has been?... ~Sensitive Compartmented information Suppose a sales associate told you the policy costs $.... Fax machine to send Sensitive information, such as compact disk ( CD?! And there is no risk to entering your personal mobile device have to! Reset your password documents be marked within a Sensitive Compartmented InformationWhat is Sensitive information. Why might `` insiders '' be able to cause damage by corrupting files, removable media of could... Toward the United states and its policies compact disk ( CD ) your screen as officials. Scifwhat must users ensure when using removable media to someone who harms national if. Or retail establishment the answer to your security POC approved and signed by a cognizant Original Authority...
Fisher Stevens Neck,
Esther Glickstein Rose Today,
Articles W