Podcast
Questions and Answers
What action should you take first upon receiving an email from OPM requesting personal information?
What action should you take first upon receiving an email from OPM requesting personal information?
How should you respond to a call from someone at the help desk who needs assistance?
How should you respond to a call from someone at the help desk who needs assistance?
Ask the caller, 'What's your full name and phone number?'
Which of the following is a way to protect against social engineering?
Which of the following is a way to protect against social engineering?
What should you do if a man you do not know asks to use your Government-issued phone?
What should you do if a man you do not know asks to use your Government-issued phone?
Signup and view all the answers
What action is appropriate after finding classified information on the internet?
What action is appropriate after finding classified information on the internet?
Signup and view all the answers
How should you respond to a reporter's inquiry about potentially classified information on the Internet?
How should you respond to a reporter's inquiry about potentially classified information on the Internet?
Signup and view all the answers
Which of the following best describes the sources that contribute to your online identity?
Which of the following best describes the sources that contribute to your online identity?
Signup and view all the answers
Which of the following information is a security risk when posted publicly on your social networking profile?
Which of the following information is a security risk when posted publicly on your social networking profile?
Signup and view all the answers
What is a best practice for physical security?
What is a best practice for physical security?
Signup and view all the answers
In which situation are you permitted to use your PKI token?
In which situation are you permitted to use your PKI token?
Signup and view all the answers
What actions should you take when faxing Sensitive Compartmented Information (SCI)?
What actions should you take when faxing Sensitive Compartmented Information (SCI)?
Signup and view all the answers
How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display?
How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display?
Signup and view all the answers
What is the best response if you find classified government data on the internet?
What is the best response if you find classified government data on the internet?
Signup and view all the answers
After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response?
After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. You know this project is classified. What should be your response?
Signup and view all the answers
What is a proper response if spillage occurs?
What is a proper response if spillage occurs?
Signup and view all the answers
What should you do if a reporter asks you about potentially classified information on the web?
What should you do if a reporter asks you about potentially classified information on the web?
Signup and view all the answers
A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. What is the best choice to describe what has occurred?
A user writes down details from a report stored on a classified system marked as Secret and uses those details to draft an unclassified briefing on an unclassified system without authorization. What is the best choice to describe what has occurred?
Signup and view all the answers
How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display?
How many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display?
Signup and view all the answers
Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause?
Which of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause?
Signup and view all the answers
Which classification level is given to information that could reasonably be expected to cause serious damage to national security?
Which classification level is given to information that could reasonably be expected to cause serious damage to national security?
Signup and view all the answers
When classified data is not in use, how can you protect it?
When classified data is not in use, how can you protect it?
Signup and view all the answers
Which is a good practice to protect classified information?
Which is a good practice to protect classified information?
Signup and view all the answers
Which of the following is a good practice to aid in preventing spillage?
Which of the following is a good practice to aid in preventing spillage?
Signup and view all the answers
What is required for an individual to access classified data?
What is required for an individual to access classified data?
Signup and view all the answers
What type of activity or behavior should be reported as a potential insider threat?
What type of activity or behavior should be reported as a potential insider threat?
Signup and view all the answers
Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information?
Which of the following practices reduces the chance of becoming a target by adversaries seeking insider information?
Signup and view all the answers
Which scenario might indicate a reportable insider threat security incident?
Which scenario might indicate a reportable insider threat security incident?
Signup and view all the answers
Why might 'insiders' be able to cause damage to their organizations more easily than others?
Why might 'insiders' be able to cause damage to their organizations more easily than others?
Signup and view all the answers
Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?
Which of the following is a best practice to protect information about you and your organization on social networking sites and applications?
Signup and view all the answers
What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk?
What should you do if an individual asks you to let her follow you into your controlled space, stating that she left her security badge at her desk?
Signup and view all the answers
Which represents a security best practice when using social networking?
Which represents a security best practice when using social networking?
Signup and view all the answers
Which is NOT sufficient to protect your identity?
Which is NOT sufficient to protect your identity?
Signup and view all the answers
Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?
Under which circumstances may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct?
Signup and view all the answers
As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?
As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project?
Signup and view all the answers
Which of the following is true about unclassified data?
Which of the following is true about unclassified data?
Signup and view all the answers
What are some potential insider threat indicators?
What are some potential insider threat indicators?
Signup and view all the answers
What information posted publicly on your personal social networking profile represents a security risk?
What information posted publicly on your personal social networking profile represents a security risk?
Signup and view all the answers
What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered?
What is an individual's Personally Identifiable Information (PII) or Protected Health Information (PHI) considered?
Signup and view all the answers
Under what circumstances could unclassified information be considered a threat to national security?
Under what circumstances could unclassified information be considered a threat to national security?
Signup and view all the answers
What type of unclassified material should always be marked with a special handling caveat?
What type of unclassified material should always be marked with a special handling caveat?
Signup and view all the answers
Which is true for protecting classified data?
Which is true for protecting classified data?
Signup and view all the answers
How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display?
How many potential insider threat indicators does a person who is playful and charming, consistently wins performance awards, but is occasionally aggressive in trying to access sensitive information display?
Signup and view all the answers
Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems?
Which of the following terms refers to harm inflicted on national security through authorized access to information or information systems?
Signup and view all the answers
What is the best example of Personally Identifiable Information (PII)?
What is the best example of Personally Identifiable Information (PII)?
Signup and view all the answers
What is the best example of Protected Health Information (PHI)?
What is the best example of Protected Health Information (PHI)?
Signup and view all the answers
When is the best time to post details of your vacation activities on your social networking website?
When is the best time to post details of your vacation activities on your social networking website?
Signup and view all the answers
What does Personally Identifiable Information (PII) include?
What does Personally Identifiable Information (PII) include?
Signup and view all the answers
What must you ensure if your work involves the use of different types of smart card security tokens?
What must you ensure if your work involves the use of different types of smart card security tokens?
Signup and view all the answers
What must you ensure before transmitting Personally Identifiable Information (PII) or Protected Health Information (PHI) via e-mail?
What must you ensure before transmitting Personally Identifiable Information (PII) or Protected Health Information (PHI) via e-mail?
Signup and view all the answers
What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)?
What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)?
Signup and view all the answers
What is a good practice for physical security?
What is a good practice for physical security?
Signup and view all the answers
Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC?
Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC?
Signup and view all the answers
What is a good practice when it is necessary to use a password to access a system or an application?
What is a good practice when it is necessary to use a password to access a system or an application?
Signup and view all the answers
What is the best description of two-factor authentication?
What is the best description of two-factor authentication?
Signup and view all the answers
What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card?
What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card?
Signup and view all the answers
What are the requirements to be granted access to SCI material?
What are the requirements to be granted access to SCI material?
Signup and view all the answers
What is a protection against internet hoaxes?
What is a protection against internet hoaxes?
Signup and view all the answers
What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities?
What organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities?
Signup and view all the answers
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI)?
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of Sensitive Compartmented Information (SCI)?
Signup and view all the answers
What describes a Sensitive Compartmented Information (SCI) program?
What describes a Sensitive Compartmented Information (SCI) program?
Signup and view all the answers
What describes how Sensitive Compartmented Information is marked?
What describes how Sensitive Compartmented Information is marked?
Signup and view all the answers
What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)?
What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)?
Signup and view all the answers
Which is a risk associated with removable media?
Which is a risk associated with removable media?
Signup and view all the answers
What is an indication that malicious code is running on your system?
What is an indication that malicious code is running on your system?
Signup and view all the answers
What are some actions you can take to try to protect your identity?
What are some actions you can take to try to protect your identity?
Signup and view all the answers
Which of the following is an appropriate use of Government e-mail?
Which of the following is an appropriate use of Government e-mail?
Signup and view all the answers
What can malicious code do?
What can malicious code do?
Signup and view all the answers
Which is true of cookies?
Which is true of cookies?
Signup and view all the answers
What is a common method used in social engineering?
What is a common method used in social engineering?
Signup and view all the answers
Which may be a security issue with compressed URLs?
Which may be a security issue with compressed URLs?
Signup and view all the answers
What type of phishing attack targets particular individuals, groups of people, or organizations?
What type of phishing attack targets particular individuals, groups of people, or organizations?
Signup and view all the answers
While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. You do not have your government-issued laptop. What action should you take?
While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. You do not have your government-issued laptop. What action should you take?
Signup and view all the answers
Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities?
Under what circumstances is it acceptable to use your Government-furnished computer to check personal e-mail and do other non-work-related activities?
Signup and view all the answers
Which are examples of portable electronic devices (PEDs)?
Which are examples of portable electronic devices (PEDs)?
Signup and view all the answers
What are some examples of removable media?
What are some examples of removable media?
Signup and view all the answers
What is a valid response when identity theft occurs?
What is a valid response when identity theft occurs?
Signup and view all the answers
What is a common indicator of a phishing attempt?
What is a common indicator of a phishing attempt?
Signup and view all the answers
What is whaling?
What is whaling?
Signup and view all the answers
Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?
Signup and view all the answers
Which of the following activities is an ethical use of Government-furnished equipment (GFE)?
Which of the following activities is an ethical use of Government-furnished equipment (GFE)?
Signup and view all the answers
Which is a wireless technology that enables your electronic devices to establish communications and exchange information when placed next to each other called?
Which is a wireless technology that enables your electronic devices to establish communications and exchange information when placed next to each other called?
Signup and view all the answers
Which of the following helps protect data on your personal mobile devices?
Which of the following helps protect data on your personal mobile devices?
Signup and view all the answers
What is a possible indication of a malicious code attack in progress?
What is a possible indication of a malicious code attack in progress?
Signup and view all the answers
What should you do if a commercial entity, such as a hotel reception desk, asks for Government identification so that they can make a photocopy?
What should you do if a commercial entity, such as a hotel reception desk, asks for Government identification so that they can make a photocopy?
Signup and view all the answers
When is conducting a private money-making venture using your Government-furnished computer permitted?
When is conducting a private money-making venture using your Government-furnished computer permitted?
Signup and view all the answers
What is a good practice to protect data on your home wireless systems?
What is a good practice to protect data on your home wireless systems?
Signup and view all the answers
Which must be approved and signed by a cognizant Original Classification Authority (OCA)?
Which must be approved and signed by a cognizant Original Classification Authority (OCA)?
Signup and view all the answers
What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)?
What portable electronic devices (PEDs) are allowed in a Secure Compartmented Information Facility (SCIF)?
Signup and view all the answers
What is a way to prevent the download of viruses and other malicious code when checking your e-mail?
What is a way to prevent the download of viruses and other malicious code when checking your e-mail?
Signup and view all the answers
What is a best practice to protect data on your mobile computing device?
What is a best practice to protect data on your mobile computing device?
Signup and view all the answers
Which of the following is NOT an example of sensitive information?
Which of the following is NOT an example of sensitive information?
Signup and view all the answers
Under what circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group?
Under what circumstances is it permitted to share an unclassified draft document with a non-DoD professional discussion group?
Signup and view all the answers
Which of the following is true of protecting classified data?
Which of the following is true of protecting classified data?
Signup and view all the answers
What advantages do 'insider threats' have over others that allow them to cause damage to their organizations more easily?
What advantages do 'insider threats' have over others that allow them to cause damage to their organizations more easily?
Signup and view all the answers
Which of the following should be reported as a potential security threat?
Which of the following should be reported as a potential security threat?
Signup and view all the answers
Which of the following does Cyberspace Protection Conditions (CPCON) establish during significant cyberspace events?
Which of the following does Cyberspace Protection Conditions (CPCON) establish during significant cyberspace events?
Signup and view all the answers
What is the best way to protect your Common Access Card (CAC)?
What is the best way to protect your Common Access Card (CAC)?
Signup and view all the answers
When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)?
When should documents be marked within a Sensitive Compartmented Information Facility (SCIF)?
Signup and view all the answers
Which of the following is a best practice for handling cookies?
Which of the following is a best practice for handling cookies?
Signup and view all the answers
Study Notes
Insider Threats
- Individuals in difficult life circumstances, such as substance abuse or divided loyalty, can display potential insider threat indicators.
- A coworker exhibiting persistent attempts to access classified information, financial difficulties, and signs of stress typically displays multiple threat indicators.
Handling Classified Information
- If classified information is found online, note the website’s URL and report to security personnel.
- Classified data must be stored securely when not in use, preferably in GSA-approved containers.
Responses to Information Requests
- If asked about classified projects, do not confirm or deny the information; change the subject to something non-work-related.
- When approached by a reporter about classified information, refer them to your organization’s public affairs office.
Security Protocols
- Immediately notify the security point of contact (POC) if spillage of classified information occurs.
- Maintain possession and secure storage of the Common Access Card (CAC) at all times.
Classification Levels
- Information that may cause serious damage to national security is classified as "Secret."
- Unauthorized disclosure of "Confidential" information could still damage national security.
Email and Digital Security
- When emailing Personally Identifiable Information (PII) or Protected Health Information (PHI), use encryption and government email accounts.
- Be cautious of phishing attempts that threaten dire consequences; legitimate emails should have digital signatures.
Physical and Cybersecurity Best Practices
- Always challenge individuals without proper identification in secure areas.
- Use privacy settings on social networking sites and avoid sharing sensitive personal information.
Handling Removable Media
- Removable media pose risks such as spillage and should comply with strict regulations when used in sensitive environments.
- Report any unauthorized access or attempts to remove sensitive information by coworkers.
Social Media Awareness
- Post vacation details only after returning home to avoid compromising security.
- Be aware that cookies can track online activity; adjust browser settings to maintain control over cookies.
Security Breaches and Misconduct
- Notify authorities if identity theft occurs and report any suspected misconduct or security threats observed.
- Recognize that engaging with foreign individuals seeking sensitive information requires reporting to security personnel.
Additional Security Measures
- Enforce the usage of unique passwords for different systems to avoid security breaches.
- Always encrypt sensitive emails and use secure methods to share documents, especially outside the Department of Defense (DoD).
Conclusion
- Adhering to established protocols and being vigilant about information security can significantly reduce risks associated with insider threats and cybersecurity incidents.
- Continuous education on best practices in cybersecurity helps protect personal and classified information alike.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your understanding of insider threat indicators and the appropriate actions when encountering classified data online. This quiz features flashcards designed to enhance your cyber awareness skills. Perfect for anyone needing to refresh their knowledge in cybersecurity.