Podcast
Questions and Answers
What should be your response when asked to comment on a classified project?
What should be your response when asked to comment on a classified project?
Which of the following may help prevent inadvertent spillage?
Which of the following may help prevent inadvertent spillage?
What is the best choice to describe when classified data is moved to a lower classification level system without authorization?
What is the best choice to describe when classified data is moved to a lower classification level system without authorization?
What should you do when you receive an email with a classified attachment while working on an unclassified system?
What should you do when you receive an email with a classified attachment while working on an unclassified system?
Signup and view all the answers
What should you do if a reporter asks about potentially classified information on the web?
What should you do if a reporter asks about potentially classified information on the web?
Signup and view all the answers
What is a proper response if spillage occurs?
What is a proper response if spillage occurs?
Signup and view all the answers
Which of the following is a good practice to aid in preventing spillage?
Which of the following is a good practice to aid in preventing spillage?
Signup and view all the answers
How can you protect classified data when it is not in use?
How can you protect classified data when it is not in use?
Signup and view all the answers
What is required for an individual to access classified data?
What is required for an individual to access classified data?
Signup and view all the answers
Which classification level is given to information that could reasonably be expected to cause serious damage to national security?
Which classification level is given to information that could reasonably be expected to cause serious damage to national security?
Signup and view all the answers
What is a good practice to protect classified information?
What is a good practice to protect classified information?
Signup and view all the answers
Which of the following is true regarding protecting classified data?
Which of the following is true regarding protecting classified data?
Signup and view all the answers
Which can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause?
Which can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause?
Signup and view all the answers
Which of the following is NOT considered a potential insider threat indicator?
Which of the following is NOT considered a potential insider threat indicator?
Signup and view all the answers
How many potential insider threat indicators does a colleague who shows several concerning behaviors display?
How many potential insider threat indicators does a colleague who shows several concerning behaviors display?
Signup and view all the answers
What advantages do insider threats have that allow them to cause damage to their organizations?
What advantages do insider threats have that allow them to cause damage to their organizations?
Signup and view all the answers
What should be reported as a potential insider threat?
What should be reported as a potential insider threat?
Signup and view all the answers
What is the safest time to post details of your vacation activities on social networking sites?
What is the safest time to post details of your vacation activities on social networking sites?
Signup and view all the answers
What should you do if you receive a game application request that includes permission to access your friends and profile information?
What should you do if you receive a game application request that includes permission to access your friends and profile information?
Signup and view all the answers
What is the best example of Personally Identifiable Information (PII)?
What is the best example of Personally Identifiable Information (PII)?
Signup and view all the answers
What is an example of Protected Health Information (PHI)?
What is an example of Protected Health Information (PHI)?
Signup and view all the answers
What must users ensure when using removable media such as compact disks?
What must users ensure when using removable media such as compact disks?
Signup and view all the answers
What are some examples of malicious code?
What are some examples of malicious code?
Signup and view all the answers
What is a risk associated with removable media?
What is a risk associated with removable media?
Signup and view all the answers
What is a valid response when identity theft occurs?
What is a valid response when identity theft occurs?
Signup and view all the answers
What is a best practice to protect data on your mobile computing device?
What is a best practice to protect data on your mobile computing device?
Signup and view all the answers
Study Notes
Spillage
- Spillage refers to the unauthorized movement of classified information to a lower classification level system.
- To prevent inadvertent spillage, label all files and removable media with appropriate classification markings.
- If you receive a classified email attachment while on an unclassified system, notify your security point of contact immediately.
- Report any spillage occurrences to your security point of contact without delay.
- Avoid confirming or denying the authenticity of classified information when asked by unauthorized individuals, such as reporters.
Classified Data
- Classified data must be stored in a GSA-approved vault/container when not in use.
- Required for access to classified data: appropriate clearance, signed non-disclosure agreement, and a need-to-know.
- Information classified as "Secret" can cause serious damage to national security if disclosed.
- Proper labeling of classified materials is crucial to protect classified information.
- Unauthorized disclosure of information classified as "Confidential" can lead to national security damage.
Insider Threat
- Insider threats are dangerous because insiders have trusted access to government systems.
- Potential indicators of insider threats include hostility toward U.S. policies or unusual behavior around classified information.
- A vacationing colleague with poor work quality may show signs of an insider threat but may have fewer indicators compared to more concerning behaviors.
- Report coworkers making hostile statements about the U.S. as potential insider threats.
- Actions like unauthorized removal of sensitive information or bringing personal devices into secure areas should also be reported.
Social Networking
- Delay posting vacation details on social networks until after returning home to protect privacy and security.
- Decline game application requests that ask for excessive personal information.
- Publicly shared personal information, such as place of birth, can pose a security risk.
Sensitive Information
- Personally Identifiable Information (PII) includes data like Social Security numbers, birth dates, and mother's maiden names.
- Protected Health Information (PHI) encompasses health-related data, including medical test results and insurance information.
- Unclassified documents should be marked with a special handling caveat if they contain sensitive information.
Physical Security
- Practice physical security by challenging individuals without proper identification and maintaining vigilance.
- Understand Cyberspace Protection Condition (CPCON) levels, with CPCON 1 focusing only on critical functions.
Identity Management
- Two-factor authentication involves something you possess (e.g., a CAC) and something you know (e.g., a PIN).
- Safeguarding your Common Access Card (CAC) by keeping it in your possession at all times enhances security.
Malicious Code and Cybersecurity
- Examples of malicious code include viruses, Trojan horses, and worms.
- Protect against social engineering by verifying instructions come from trusted personnel.
- Lock mobile devices and set strong passwords to secure sensitive data.
Removable Media and Devices
- Removable media must be properly labeled to indicate classification and point of contact.
- Avoid using personal media on government systems to prevent security breaches.
General Cybersecurity Practices
- Report any instances of identity theft to local law enforcement immediately.
- Indications of malicious code may include unexpected file corruption or warning pop-ups.
- Whaling refers to phishing attacks aimed at high-ranking officials or sensitive positions within organizations.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on cyber awareness concepts with this set of flashcards. Each card presents a key term associated with security protocols and the proper responses to classified information. Enhance your understanding and application of security measures in sensitive environments.