Podcast
Questions and Answers
How should you respond if you receive an inquiry for information not clear for public release?
How should you respond if you receive an inquiry for information not clear for public release?
Refer your order to PAO.
What will help prevent spillage?
What will help prevent spillage?
Follow procedures for transferring data to and from outside agency and networks.
What is the basis for handling classified data?
What is the basis for handling classified data?
Classification level and handling caveats.
Who designates classified data?
Who designates classified data?
Signup and view all the answers
Which of the following is a potential indicator of an insider threat?
Which of the following is a potential indicator of an insider threat?
Signup and view all the answers
What function do insider threat programs aim to fulfill?
What function do insider threat programs aim to fulfill?
Signup and view all the answers
What is a reportable insider threat?
What is a reportable insider threat?
Signup and view all the answers
When might you be subject to criminal, disciplinary, or administrative action due to online harassment, bullying, or stalking?
When might you be subject to criminal, disciplinary, or administrative action due to online harassment, bullying, or stalking?
Signup and view all the answers
Which of the following is a security best practice when using social networking sites?
Which of the following is a security best practice when using social networking sites?
Signup and view all the answers
How can you protect yourself on social networking sites?
How can you protect yourself on social networking sites?
Signup and view all the answers
Which designator marks information that does not have the potential to damage national security?
Which designator marks information that does not have the potential to damage national security?
Signup and view all the answers
What's true for Controlled Unclassified Information (CUI)?
What's true for Controlled Unclassified Information (CUI)?
Signup and view all the answers
What is the best way to transmit CUI?
What is the best way to transmit CUI?
Signup and view all the answers
Which CPCON establishes a protection policy focused on critical functions only?
Which CPCON establishes a protection policy focused on critical functions only?
Signup and view all the answers
What is an example of a strong password?
What is an example of a strong password?
Signup and view all the answers
What's true about Common Access Cards (CACs)?
What's true about Common Access Cards (CACs)?
Signup and view all the answers
What's true of sharing information in a Sensitive Compartmented Information Facility (SCIF)?
What's true of sharing information in a Sensitive Compartmented Information Facility (SCIF)?
Signup and view all the answers
What's true for transmitting Sensitive Compartmented Information (SCI)?
What's true for transmitting Sensitive Compartmented Information (SCI)?
Signup and view all the answers
What's true of Personal Electronic Devices (PEDs) in a SCIF?
What's true of Personal Electronic Devices (PEDs) in a SCIF?
Signup and view all the answers
What's true for downloading apps on government devices?
What's true for downloading apps on government devices?
Signup and view all the answers
How should you respond to the theft of identity?
How should you respond to the theft of identity?
Signup and view all the answers
How can you protect from social engineering?
How can you protect from social engineering?
Signup and view all the answers
What is a common indicator of a phishing attempt?
What is a common indicator of a phishing attempt?
Signup and view all the answers
What security issue is associated with compressed URLs?
What security issue is associated with compressed URLs?
Signup and view all the answers
What are the problems with public Wi-Fi?
What are the problems with public Wi-Fi?
Signup and view all the answers
What is a personally owned monitor you shouldn't connect to your Government Furnished Equipment (GFE)?
What is a personally owned monitor you shouldn't connect to your Government Furnished Equipment (GFE)?
Signup and view all the answers
What is a best practice for using removable media?
What is a best practice for using removable media?
Signup and view all the answers
How can you protect data on your mobile computing and portable electronic devices (PEDs)?
How can you protect data on your mobile computing and portable electronic devices (PEDs)?
Signup and view all the answers
What is the best practice for securing your home computer?
What is the best practice for securing your home computer?
Signup and view all the answers
Study Notes
Information Response Protocols
- Inquiries for information not clear for public release should be referred to the Public Affairs Office (PAO).
- Preventing data spillage involves strict adherence to procedures for transferring data to and from external agencies and networks.
Handling Classified Data
- Handling of classified data is determined by its classification level and associated handling caveats.
- Designation of classified data is the responsibility of the Original Classification Authority.
Insider Threat Awareness
- Indicators of potential insider threats include difficult life circumstances.
- Insider threat programs are designed to proactively identify potential threats and develop comprehensive mitigation strategies.
- A reportable insider threat includes unauthorized removal of sensitive information for telework purposes.
Social Networking Safety
- Participation or condoning of online harassment, bullying, or stalking may result in criminal, disciplinary, or administrative actions.
- A key security best practice on social media is to avoid posting personal identifiable information (PII), such as a mother's maiden name.
- Regularly delete posts that contain personal information to enhance security on social networking sites.
Controlled Unclassified Information (CUI)
- Unclassified information is marked appropriately to indicate it does not threaten national security.
- CUI requires specific disseminating controls to manage its distribution effectively.
- When transmitting CUI, ensure that recipients have a clear need-to-know and utilize encrypted email for security.
Physical Security Measures
- CPCON 1 focuses on establishing protection policies for critical functions only.
Identity Management Standards
- A strong password example includes complex characters, such as @rF+13gtK5!--.
- Common Access Cards (CACs) contain certificates necessary for identification, encryption, and digital signature functionalities.
Sensitive Compartmented Information (SCI)
- Avoid referencing derivative classified reports that are classified higher than the recipient's clearance level when sharing information in a Sensitive Compartmented Information Facility (SCIF).
- Transmission of SCI is permitted only if the individual is a courier briefed for SCI.
Use of Removable Media
- Personal electronic devices (PEDs) should only be connected to information systems of the same classification level when authorized.
- Always use government-approved and authorized applications when downloading apps on government devices to avoid malicious code.
Responding to Identity Theft
- In case of identity theft, contact reporting agencies and financial institutions, monitor credit card statements, and report the crime to law enforcement.
Protecting Against Social Engineering
- Verify the identities of individuals to protect against social engineering attempts.
- Common phishing indicators often involve claims that require updates or validation of personal information.
- Compressed URLs can mask malicious intent, posing additional security risks.
Issues with Public Wi-Fi
- Utilizing public Wi-Fi presents risks, including exposure of information to potential theft.
Guidelines for Government-Furnished Equipment (GFE)
- Personal monitors, such as USBs, should not be connected to GFE.
Mobile Device Security Practices
- Avoid inserting removable media with unknown content into computers to prevent malware and data breaches.
- Employ auto screen locking on mobile computing and portable electronic devices (PEDs) to protect data.
Home Computer Security
- Regularly install system security patches to keep home computers secure and up-to-date.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on cyber awareness and protocols for handling sensitive information in 2023. This quiz covers crucial terms and definitions related to data security and spillage prevention. Enhance your understanding of how to manage classified data appropriately.