CDSE Information Security Flashcards
18 Questions
100 Views

CDSE Information Security Flashcards

Created by
@VeritableSparkle

Questions and Answers

What are the steps of the information security program lifecycle?

Classification, safeguarding, dissemination, declassification, and destruction

Who provides implementation guidance for the Information Security Program within the DoD? (Select all that apply)

  • Heads of DoD Components
  • Under Secretary of Defense for Intelligence (USD(I)) (correct)
  • Heads of Defense Agencies (correct)
  • Director of the Information Security Oversight Office (ISOO) (correct)
  • The unauthorized disclosure of Secret information could reasonably be expected to cause ____________________ to our national security.

    Serious damage

    The unauthorized disclosure of Confidential information could reasonably be expected to cause ____________________ to our national security.

    <p>Exceptionally grave damage</p> Signup and view all the answers

    Derivative classifiers are the individuals who generate or create new material based on existing classification guidance.

    <p>True</p> Signup and view all the answers

    _________________ occurs in some circumstances when information that is individually unclassified, or classified at a lower level, may be classified, or classified at a higher level, only if the combined information reveals an additional association or relationship.

    <p>Compilation</p> Signup and view all the answers

    In which order must documents containing classified information be marked?

    <p>Portion markings, banner markings, classification authority block</p> Signup and view all the answers

    What information is listed in the classification authority block on a document containing classified information? (Select all that apply)

    <p>Classification level to downgrade to at a certain point in time</p> Signup and view all the answers

    Who references information from security classification guides (SCG) in order to classify information?

    <p>Both derivative classifiers and Original Classification Authorities</p> Signup and view all the answers

    When not directly in an authorized individual's possession, classified documents must be stored in a GSA-approved security container.

    <p>True</p> Signup and view all the answers

    When classified information is in an authorized individual's hands, why should the individual use a classified document cover sheet? (Select all that apply)

    <p>To alert holders to the presence of classified information</p> Signup and view all the answers

    Cleared U.S. military, civilian employees, or contractors may hand carry which type of classified information?

    <p>ALL THE ABOVE</p> Signup and view all the answers

    Access control measures detect and deter deliberate attempts to gain unauthorized access to classified information.

    <p>True</p> Signup and view all the answers

    Requests for waivers and exceptions must identify the specific provision or provisions of the _________________ for which the waiver or exception is sought.

    <p>DoD Information Security Manual</p> Signup and view all the answers

    If an individual inserts a thumb drive containing classified information on a computer in the office that is not part of the classified information system, what type of security incident is this?

    <p>Spillage</p> Signup and view all the answers

    What type of security incident has occurred if an individual neglects to complete the SF702 after securing the container?

    <p>Security Infraction</p> Signup and view all the answers

    What type of declassification process is the set date or event, determined by the Original Classification Authority (OCA), which will occur within 25 years from the date of original classification?

    <p>Systematic Declassification</p> Signup and view all the answers

    What type of declassification process occurs when information is scheduled to be declassified on the 31st of December, 25 years from the date of original classification?

    <p>Scheduled Declassification</p> Signup and view all the answers

    Study Notes

    Information Security Program Lifecycle

    • Steps include classification, safeguarding, dissemination, declassification, and destruction.

    DoD Implementation Guidance

    • Guidance for the Information Security Program is provided by:
      • Under Secretary of Defense for Intelligence (USD(I))
      • Director of the Information Security Oversight Office (ISOO)
      • Heads of Defense Agencies

    Unauthorized Disclosure of Classified Information

    • Disclosure of Secret information can cause serious damage to national security.
    • Disclosure of Confidential information may cause exceptionally grave damage.

    Derivative Classifiers

    • Individuals generating new material based on existing classification guidance are known as derivative classifiers.

    Compilation of Information

    • Compilation occurs when unclassified or lower-level classified information reveals new associations or relationships.

    Document Markings for Classified Information

    • Order of markings must be: portion markings, banner markings, classification authority block.

    Classification Authority Block

    • Contains details such as:
      • Classification level for downgrading, if applicable
      • Creation date for declassification
      • Current classification level of the document

    Classifying Information

    • Derivative classifiers reference security classification guides (SCG) to classify information.

    Storage of Classified Documents

    • Classified documents must be stored in a GSA-approved security container when not in authorized possession.

    Use of Classified Document Cover Sheets

    • Cover sheets are used to:
      • Prevent unauthorized viewing of classified information
      • Record removal of classified information from secure containers
      • Alert holders to the presence of classified information

    Transport of Classified Information

    • Cleared U.S. military, civilian employees, or contractors may hand carry any type of classified information.

    Access Control Measures

    • These measures are designed to detect and deter unauthorized access to classified information.

    Waivers and Exceptions

    • Requests must specify the provisions of the DoD Information Security Manual for which the waiver or exception is sought.

    Security Incidents

    • Inserting a thumb drive with classified information into an unauthorized computer results in a spillage.
    • Neglecting to complete the SF702 after securing a container constitutes a security infraction.

    Declassification Processes

    • Systematic declassification refers to a set date or event determined by the Original Classification Authority (OCA) within 25 years of classification.
    • Automatic Declassification occurs on the 31st of December, 25 years post-classification.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on the information security program lifecycle and key guidance providers within the Department of Defense. These flashcards cover essential terms and their definitions, making it easier to understand the fundamentals of information security.

    More Quizzes Like This

    Use Quizgecko on...
    Browser
    Browser