Podcast
Questions and Answers
What should you do if a neighbor asks about a classified project?
What should you do if a neighbor asks about a classified project?
Attempt to change the subject to something non-work related, but neither confirm nor deny the article's authenticity.
Which of the following may help to prevent spillage? (Select all that apply)
Which of the following may help to prevent spillage? (Select all that apply)
What are some examples of malicious code?
What are some examples of malicious code?
Viruses, Trojan horses, or worms
What best describes the situation when classified data is drafted on an unclassified system without authorization?
What best describes the situation when classified data is drafted on an unclassified system without authorization?
Signup and view all the answers
What should you do when receiving an email with a classified attachment on an unclassified system?
What should you do when receiving an email with a classified attachment on an unclassified system?
Signup and view all the answers
Which of the following is NOT a way that malicious code spreads?
Which of the following is NOT a way that malicious code spreads?
Signup and view all the answers
After visiting a website on your Government device, a popup appears asking if you want to run an application. Is this safe?
After visiting a website on your Government device, a popup appears asking if you want to run an application. Is this safe?
Signup and view all the answers
What should you do if a reporter asks about classified information on the web?
What should you do if a reporter asks about classified information on the web?
Signup and view all the answers
Which of the following is NOT a type of malicious code?
Which of the following is NOT a type of malicious code?
Signup and view all the answers
What should you do if you suspect spillage has occurred?
What should you do if you suspect spillage has occurred?
Signup and view all the answers
What should you do if a registration website requires a credit card but does not start with 'https'?
What should you do if a registration website requires a credit card but does not start with 'https'?
Signup and view all the answers
Which of the following is a good practice to protect classified information? (Select all that apply)
Which of the following is a good practice to protect classified information? (Select all that apply)
Signup and view all the answers
How should you respond to the theft of your identity?
How should you respond to the theft of your identity?
Signup and view all the answers
What level of damage can the unauthorized disclosure of Confidential information cause?
What level of damage can the unauthorized disclosure of Confidential information cause?
Signup and view all the answers
You should only accept cookies from reputable, trusted websites.
You should only accept cookies from reputable, trusted websites.
Signup and view all the answers
Which classification level is given to information that may cause serious damage to national security?
Which classification level is given to information that may cause serious damage to national security?
Signup and view all the answers
How should printed classified documents be stored when not in use?
How should printed classified documents be stored when not in use?
Signup and view all the answers
Which best describes an insider threat? Someone who uses _______ access, _______________, to harm national security.
Which best describes an insider threat? Someone who uses _______ access, _______________, to harm national security.
Signup and view all the answers
What is a best practice that can prevent viruses and other malicious code from being downloaded when checking your email?
What is a best practice that can prevent viruses and other malicious code from being downloaded when checking your email?
Signup and view all the answers
What must an individual have to access classified data?
What must an individual have to access classified data?
Signup and view all the answers
What guidance is available for marking Sensitive Compartmented Information (SCI)?
What guidance is available for marking Sensitive Compartmented Information (SCI)?
Signup and view all the answers
What is TRUE of a phishing attack?
What is TRUE of a phishing attack?
Signup and view all the answers
What is true about using a DoD Public Key Infrastructure (PKI) token?
What is true about using a DoD Public Key Infrastructure (PKI) token?
Signup and view all the answers
Which of the following is a way to protect against social engineering?
Which of the following is a way to protect against social engineering?
Signup and view all the answers
What is whaling?
What is whaling?
Signup and view all the answers
Which of the following is a security risk when posted publicly on your social networking profile? (Select all that apply)
Which of the following is a security risk when posted publicly on your social networking profile? (Select all that apply)
Signup and view all the answers
What action should you take with an email from a friend containing a compressed URL?
What action should you take with an email from a friend containing a compressed URL?
Signup and view all the answers
What advantages do insider threats have over others?
What advantages do insider threats have over others?
Signup and view all the answers
How can you protect yourself from internet hoaxes?
How can you protect yourself from internet hoaxes?
Signup and view all the answers
What should you do if you receive a game application request that accesses personal information?
What should you do if you receive a game application request that accesses personal information?
Signup and view all the answers
Which may be a security issue with compressed URLs?
Which may be a security issue with compressed URLs?
Signup and view all the answers
When is the safest time to post vacation details online?
When is the safest time to post vacation details online?
Signup and view all the answers
What is a common indicator of a phishing attempt?
What is a common indicator of a phishing attempt?
Signup and view all the answers
What must users ensure when using removable media?
What must users ensure when using removable media?
Signup and view all the answers
Internet hoaxes can be part of a distributed denial of service (DDoS) attack.
Internet hoaxes can be part of a distributed denial of service (DDoS) attack.
Signup and view all the answers
Digitally signed emails are more secure.
Digitally signed emails are more secure.
Signup and view all the answers
Study Notes
Cyber Awareness Challenge 2024
- Classified information should not be discussed; redirect the conversation if approached by neighbors or unauthorized personnel.
- To prevent information spillage, label files and media with proper classification markings.
- Unauthorized movement of classified information to unclassified systems is classified as spillage.
- If receiving a classified attachment on an unclassified system, immediately contact security.
- When approached by reporters about classified matters, gather information about the inquiry and refer them to the appropriate public affairs office.
- In the event of suspected information spillage, contact your security point of contact without delay.
- Always be aware of classification markings to maintain data security.
- Upon encountering classified info online, document the URL and report it to security.
- Security practice dictates that classified data should be stored in GSA-approved containers when not in use.
- Access to classified data requires proper clearance, a non-disclosure agreement, and a legitimate need-to-know.
- "Secret" classification indicates potential serious harm to national security if disclosed.
- Proper labeling of classified material is crucial to ensure it remains protected.
- Unauthorized disclosure of "Confidential" information can cause harm to national security.
- Teleworking requires organizational permission and adherence to security protocols.
- Insider threats have unique advantages such as trust and authorized access to sensitive data.
- Report any concerning statements or behaviors from colleagues that may suggest hostility or unauthorized information seeking.
- Best practices for physical security include monitoring badge compliance and reporting suspicious actions.
- Two-factor authentication combines something you know (password) with something you have (token or CAC).
- Protecting Personally Identifiable Information (PII) involves using government-approved equipment and maintaining security through proper channels.
- Malicious code can include programs like viruses and worms; it spreads through methods such as phishing, but not through legitimate software updates.
- Use caution when sharing personal information online, especially on social networking platforms; always vet the credibility of links before clicking.
- In the event of identity theft, it's essential to report to local law enforcement.
- Cookies should only be accepted from trustworthy sites to safeguard personal data against exploitation.
- Adverse actions for online misconduct can occur if they also occur offline or at any time relative to work activities.
Insider Threat Awareness
- Insider threats pose risks through witting or unwitting misuse of authorized access to harm national security.
- Indicators of insider threats include unusual interest in classified information and the expression of grievances or financial issues.
- The assessment of potential insider threats should be proactive in identifying concerning behavior.
Communication and Event Reporting
- Reporting is critical for any unauthorized access or removal of sensitive materials.
- Maintain vigilance with online communication; inspect emails and attachments for credibility and security.
Best Practices
- Utilize strong, unique passwords for systems, avoid writing them down, and establish secure access protocols.
- During sensitive discussions, ensure everyone engaged has the appropriate clearance and need-to-know.
- Marking and securely handling Sensitive Compartmented Information (SCI) is regulated and must follow prescribed guidelines.
- When using removable media, proper labeling and controls must be practiced to avoid data breaches.
Phishing and Cybersecurity Threats
- Whaling is a specialized form of phishing aimed at high-ranking officials within an organization.
- E-mails from friends that include compressed URLs should be investigated to reveal their actual destination using the preview feature, ensuring safety before clicking.
- To avoid falling victim to internet hoaxes, cross-check information using reliable online verification sites.
- Compressed URLs may hide malicious intent, posing a security risk by obscuring the true link destination.
Indicators of Phishing and Hoaxes
- A common sign of phishing attempts includes threats of severe consequences to induce panic and trick victims into acting quickly.
- Internet hoaxes can sometimes lead to larger, coordinated cyberattacks, such as distributed denial of service (DDoS) attacks.
- Secure communication can be enhanced through digitally signed e-mails, providing verification of the sender's identity and ensuring message integrity.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on cybersecurity and the proper handling of classified information with this quiz. Learn about the best practices to prevent information spillage and how to respond to unauthorized inquiries. Stay informed on security measures necessary to maintain data integrity in the digital age.